A communication-channel-based method for detecting deeply camouflaged malicious traffic
出版年份 2021 全文链接
标题
A communication-channel-based method for detecting deeply camouflaged malicious traffic
作者
关键词
Transport layer security (TLS), Deeply camouflaged malicious traffic, Communication channel, Encrypted traffic classification, Feature selection
出版物
Computer Networks
Volume 197, Issue -, Pages 108297
出版商
Elsevier BV
发表日期
2021-07-10
DOI
10.1016/j.comnet.2021.108297
参考文献
相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。- DISTILLER: Encrypted traffic classification via multimodal multitask deep learning
- (2021) Giuseppe Aceto et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Toward Effective Mobile Encrypted Traffic Classification through Deep Learning
- (2020) Giuseppe Aceto et al. NEUROCOMPUTING
- Two-layer detection framework with a high accuracy and efficiency for a malware family over the TLS protocol
- (2020) Rongfeng Zheng et al. PLoS One
- Preprocessing Method for Encrypted Traffic Based on Semisupervised Clustering
- (2020) Rongfeng Zheng et al. Security and Communication Networks
- Attention-based bidirectional GRU networks for efficient HTTPS traffic classification
- (2020) Xun Liu et al. INFORMATION SCIENCES
- Deep packet: a novel approach for encrypted traffic classification using deep learning
- (2019) Mohammad Lotfollahi et al. SOFT COMPUTING
- Feature analysis of encrypted malicious traffic
- (2019) Anish Singh Shekhawat et al. EXPERT SYSTEMS WITH APPLICATIONS
- A Dive into the Dark Web: Hierarchical Traffic Classification of Anonymity Tools
- (2019) Antonio Montieri et al. IEEE Transactions on Network Science and Engineering
- Learning communication patterns for malware discovery in HTTPs data
- (2018) Jan Kohout et al. EXPERT SYSTEMS WITH APPLICATIONS
- Robust Smartphone App Identification via Encrypted Network Traffic Analysis
- (2018) Vincent F. Taylor et al. IEEE Transactions on Information Forensics and Security
- Multi-classification approaches for classifying mobile app traffic
- (2018) Giuseppe Aceto et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Leveraging LSTM Networks for Attack Detection in Fog-to-Things Communications
- (2018) Abebe Diro et al. IEEE COMMUNICATIONS MAGAZINE
- HTTP attack detection using n-gram analysis
- (2014) Aditya Oza et al. COMPUTERS & SECURITY
- Granular Computing: Perspectives and Challenges
- (2013) Jing Tao Yao et al. IEEE Transactions on Cybernetics
Create your own webinar
Interested in hosting your own webinar? Check the schedule and propose your idea to the Peeref Content Team.
Create NowAsk a Question. Answer a Question.
Quickly pose questions to the entire community. Debate answers and get clarity on the most important issues facing researchers.
Get Started