Zobrazeno 1 - 10
of 916
pro vyhledávání: '"Encrypted Traffic"'
Publikováno v:
网络与信息安全学报, Vol 10, Iss 4, Pp 98-108 (2024)
With the development of information technology, network security has increasingly become a focal point for users and organizations, and encrypted data transmission has gradually become mainstream. This trend has driven the proportion of encrypted tra
Externí odkaz:
https://doaj.org/article/a7fe16275097491a9d869f026badae63
Autor:
Marziyeh Bayat, Javad Garshasbi, Mozhgan Mehdizadeh, Neda Nozari, Abolghasem Rezaei Khesal, Maryam Dokhaei, Mehdi Teimouri
Publikováno v:
BMC Research Notes, Vol 17, Iss 1, Pp 1-12 (2024)
Abstract Objectives Recognition of mobile applications within encrypted network traffic holds considerable effects across multiple domains, encompassing network administration, security, and digital marketing. The creation of network traffic classifi
Externí odkaz:
https://doaj.org/article/182778c2a94b4f1687190ddf19d82046
Publikováno v:
Heliyon, Vol 10, Iss 16, Pp e35962- (2024)
The current popular traffic classification methods based on feature engineering and machine learning are difficult to obtain suitable traffic feature sets for multiple traffic classification tasks. Besides, data privacy policies prohibit network oper
Externí odkaz:
https://doaj.org/article/fa72d1d965a14f4faec293ab8fce2fb8
Publikováno v:
Mathematical Biosciences and Engineering, Vol 21, Iss 3, Pp 4187-4209 (2024)
Low rate distributed denial of service attack (LR-DDoS) is a special type of distributed denial of service (DDoS) attack, which uses the vulnerability of HTTP protocol to send HTTP requests to applications or servers at a slow speed, resulting in lon
Externí odkaz:
https://doaj.org/article/9dfe18b7d33649d2863a4b36a3e42cea
Autor:
Keya Xu, Guang Cheng
Publikováno v:
Cybersecurity, Vol 7, Iss 1, Pp 1-16 (2024)
Abstract Fine-grained function-level encrypted traffic classification is an essential approach to maintaining network security. Machine learning and deep learning have become mainstream methods to analyze traffic, and labeled dataset construction is
Externí odkaz:
https://doaj.org/article/279283010c0146cd9b5765b49d2d6dba
Autor:
Idio Guarino, Giuseppe Aceto, Domenico Ciuonzo, Antonio Montieri, Valerio Persico, Antonio Pescape
Publikováno v:
IEEE Open Journal of the Communications Society, Vol 5, Pp 1299-1324 (2024)
Significant in lifestyle have reshaped the Internet landscape, resulting in notable shifts in both the magnitude of Internet traffic and the diversity of apps utilized. The increased adoption of communication-and-collaboration apps, also fueled by lo
Externí odkaz:
https://doaj.org/article/7010931810824407a693ed5a8da0778e
Publikováno v:
IEEE Access, Vol 12, Pp 9012-9024 (2024)
Digital forensics is a prime professional field for law enforcement organizations. This is a major active research topic in the field of cybersecurity. Although traffic and content analysis are leading tasks in this field, most Internet traffic is no
Externí odkaz:
https://doaj.org/article/349ab0fda3a34095b59e73986b6e56ea
Publikováno v:
IEEE Access, Vol 12, Pp 1786-1793 (2024)
Most of the traffic on the Internet is encrypted traffic, and the detection of encrypted traffic is the current difficulty, because the internal features of the data are destroyed after encryption, and it is difficult to detect. Most of the existing
Externí odkaz:
https://doaj.org/article/4217e1b3fe93447aa0fd7b93f05a38c3
Publikováno v:
Egyptian Informatics Journal, Vol 26, Iss , Pp 100475- (2024)
As network infrastructures continue to grow and traffic encryption technologies evolve at a rapid pace, the task of classifying encrypted traffic has become significantly more intricate. These emerging encryption methods render conventional approache
Externí odkaz:
https://doaj.org/article/92774df4576e443fb5df385964e17dcf
Publikováno v:
Array, Vol 21, Iss , Pp 100338- (2024)
As data privacy issues become more and more sensitive, increasing numbers of websites usually encrypt traffic when transmitting it. This method can largely protect privacy, but it also brings a huge challenge. Aiming at the problem that encrypted tra
Externí odkaz:
https://doaj.org/article/71aff49f37014a4eb124cc6b0bc0b335