نتایج جستجو برای: encrypted traffic

تعداد نتایج: 104589  

Journal: :JCS 2014
Mehdi Barati Azizol Abdullah Nur Izura Udzir Mostafa Behzadi Ramlan Mahmod Norwati Mustapha

Due to growth of Cloud computing usage, the need to apply encrypted protocols to provide confidentiality and integrity of data increases dramatically. Attacker can take advantage of these protocols to hide the intrusion and evade detection. Many traditional attack detection techniques have been proposed to provide security in the networks but none of them can be implemented properly in encrypte...

Journal: :Iet Information Security 2022

The evergrowing diversity of encrypted and anonymous network traffic makes management more formidable to manage the traffic. An intelligent system is essential analyse identify accurately. Network needs such techniques improve Quality Service ensure flow secure However, due usage non-standard ports encryption data payloads, classical port-based payload-based classification fail classify secured...

Journal: :Wireless Communications and Mobile Computing 2022

The sharp increasing volume of encrypted traffic generated by malware brings a huge challenge to traditional payload-based malicious detection methods. Solutions that based on machine learning and deep are becoming mainstream. However, the learning-based methods limited manual-design features, which have problem highly correlated multicollinearity. And both rely heavily large number labeled sam...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه رازی - دانشکده فنی و مهندسی 1388

الحاق و پیوند ترافیک از جفت فرستنده-گیرنده های مختلف به مسیر نوری پرظرفیت ، آرایش ترافیک یا همان traffic grooming نامیده می شود. در این پایان نامه، به بررسی و ارائه الگوریتمی جهت آرایش ترافیک (traffic grooming) در شبکه های ip-over-wdm می پردازیم که برپایه بهینه سازی به روش کلونی مورچه ها (acs) بنا شده است و از تابع احتمالی که به دو پارامتر هزینه و مقدار فرومون وابسته است استفاده می کند. در ادا...

Journal: :Computer Vision and Image Understanding 2010
Hazim Kemal Ekenel Johannes Stallkamp Rainer Stiefelhagen

1077-3142/$ see front matter 2010 Elsevier Inc. A doi:10.1016/j.cviu.2009.06.009 q A demo video of the system can be downloaded ~ekenel/door_monitoring.mpg. * Corresponding author. E-mail addresses: [email protected] (H.K. Ekenel Stallkamp), [email protected] (R. Stiefelhage URLs: http://cvhci.ira.uka.de/~ekenel/ (H.K. Eke ~stiefel/ (R. Stiefelhagen). 1 Present address: Ruhr-Universität-...

2010
Irfan Ul Haq Sardar Ali Hassan Khan Syed Ali Khayam

Recent studies estimate that peer-to-peer (p2p) traffic comprises 40-70% of today’s Internet traffic [1]. Surprisingly, the impact of p2p traffic on anomaly detection has not been investigated. In this paper, we collect and use a labeled dataset containing diverse network anomalies (portscans, TCP floods, UDP floods, at varying rates) and p2p traffic (encrypted and unencrypted with BitTorrent, ...

Journal: :Neural Computing and Applications 2021

As the number of applications based on Internet is increasing, traffic becomes more and complex. So how to improve service quality security network becoming important. This paper studies application support vector machine in identification classify traffic. Through data collection feature generation methods screening methods, used as a classifier by using generalization capability machine, para...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید