A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Survey on Tor Encrypted Traffic Monitoring
2018
International Journal of Advanced Computer Science and Applications
Therefore, numerous of research has been performed on encrypted traffic analyzing and classification using machine learning techniques. ...
Next, there are comparison of the surveyed traffic classification and discussion on their classification properties. 114 | P a g e www.ijacsa.thesai.org encryption to uncover the next destination of the ...
This study also proposes modelling process using application attribute bigram that able to increase second-order Markov Chains state diversity. ...
doi:10.14569/ijacsa.2018.090815
fatcat:wmjcrz4jojhzxmjv3a52sf4toe
Classification of Markov Encrypted Traffic on Gaussian Mixture Model Constrained Clustering
2021
Wireless Communications and Mobile Computing
In order to solve the problem that traditional analysis approaches of encrypted traffic in encryption transmission of network application only consider the traffic classification in the complete communication ...
process with ignoring traffic classification in the simplified communication process, and there are a lot of duplication problems in application fingerprints during state transition, a new classification ...
Acknowledgments This work was supported by the National Natural Science Foundation of China (U1636208). ...
doi:10.1155/2021/4935108
fatcat:6h4sbcdhgvdjrm4iprpul6msli
A Survey on TLS-Encrypted Malware Network Traffic Analysis Applicable to Security Operations Centers
2021
Applied Sciences
To this end, in this survey article, we present existing research on NTA and related areas, primarily focusing on TLS-encrypted traffic to detect and classify malicious traffic with deployment scenarios ...
Security experts in SOCs and researchers in academia can obtain useful information from our survey, as the main focus of our survey is NTA methods applicable to malware detection and family classification ...
Classification of Encrypted Traffic with Second-Order Markov Chains and Application
Attribute Bigrams. IEEE Trans. Inf. Forensics Secur. 2017, 12, 1830–1843. [CrossRef]
92. ...
doi:10.3390/app12010155
fatcat:kdkvmdkbareb7cxgy7er7ncday
Detecting machine-morphed malware variants via engine attribution
2013
Journal in Computer Virology and Hacking Techniques
Our experiments confirm the applicability of the proposed approach in practice and indicate that engine attribution may offer a viable enhancement of current defenses against malware. ...
of 96% and higher. ...
Modeling morphing engine using Markov models To formalize the proposed approach we use Markov chain theory. ...
doi:10.1007/s11416-013-0183-6
fatcat:ghkq3t2e6bci7gmy5p3aluciiu
A Survey on Analyzing Encrypted Network Traffic of Mobile Devices
[article]
2020
arXiv
pre-print
Applications encrypt their communication to ensure the privacy and security of the user's data. ...
To that end, researchers are trying to develop techniques to classify encrypted mobile traffic at different levels of granularity, with the objectives of performing mobile user profiling, network performance ...
This research was supported by the Center for Artificial Intelligence and Robotics (CAIR) lab of Defence Research and Development Organisation (DRDO), India, Bangalore under the CARS scheme. ...
arXiv:2006.12352v1
fatcat:cysjaqpqdfbxjn7b2gsy6gyelu
Trends on Computer Security: Cryptography, User Authentication, Denial of Service and Intrusion Detection
2019
Zenodo
of privacy and anonymity forall users and his portable devices. ...
The new generation of security threats has beenpromoted by digital currencies and real-time applications, whereall users develop new ways to communicate on the Internet.Security has evolved in the need ...
In this context, performance evaluation is done through probabilistic analysis with the Markov chains. ...
doi:10.5281/zenodo.5710834
fatcat:q3h3xdhc7rd55k4u4kbb6qzncu
ML-based tunnel detection and tunneled application classification
[article]
2022
arXiv
pre-print
Second, we propose a complete pipeline to detect and classify tunneling protocols and tunneled applications. ...
Third, we present a thorough analysis of the performance of both network traffic metadata features and machine learning techniques. ...
order. ...
arXiv:2201.10371v1
fatcat:7ndn4rhxhjetvmesqs7dvee3hi
Attacking HTTPS Secure Search Service through Correlation Analysis of HTTP Webpages Accessed
2017
International Journal of Security and Its Applications
The purpose of this paper is to demonstrate that HTTPS traffic can be correlated and de-anonymized through HTTP traffic. ...
We propose a novel approach for attacking secure search through correlating analysis of encrypted search with unencrypted webpages the user visits subsequently. ...
Acknowledgments This work was supported in part by the National Natural Science Foundation of China under Grant 61571144. ...
doi:10.14257/ijsia.2017.11.7.03
fatcat:wjhecu2w5vhizk4ez3ewcmul5u
Trends on Computer Security: Cryptography, User Authentication, Denial of Service and Intrusion Detection
[article]
2019
arXiv
pre-print
The new generation of security threats has been promoted by digital currencies and real-time applications, where all users develop new ways to communicate on the Internet. ...
Security has evolved in the need of privacy and anonymity for all users and his portable devices. ...
context, performance evaluation is done through probabilistic analysis with the Markov chains. ...
arXiv:1903.08052v1
fatcat:dri2rwc2frcdhk7ryjt343dbui
Survey of Network Intrusion Detection Methods from the Perspective of the Knowledge Discovery in Databases Process
[article]
2020
arXiv
pre-print
In addition, we also present the characteristics and motivations behind the use of each of these techniques and propose more adequate and up-to-date taxonomies and definitions for intrusion detectors based ...
In this survey, we review the methods that have been applied to network data with the purpose of developing an intrusion detector, but contrary to previous reviews in the area, we analyze them from the ...
In [17] , only records with low classification confidence are incorporated to the model in order to capture new classes of traffic. ...
arXiv:2001.09697v1
fatcat:uyaqwh2ncngorgta5vzyraqfr4
File Packing from the Malware Perspective: Techniques, Analysis Approaches, and Directions for Enhancements
2022
ACM Computing Surveys
This paper then surveys 23 methods proposed in academic research for the detection and classification of packed portable executable (PE) files and highlights various trends in malware packing. ...
With the growing sophistication of malware, the need to devise improved malware detection schemes is crucial. ...
We would also like to thank Eitam Sheetrit for his inputs on how to improve our proposed packing classification solution using the TPF classification algorithm, Lastly, we would like to thanks Tomer Panker ...
doi:10.1145/3530810
fatcat:c6horhx3i5bevk5ibtu5y42rim
D2.4 Profiling Analytics and Privacy Methodological Foundations Release I
2018
Zenodo
The results reported in the previous three deliverables of WP2 (D2.1, D2.2 and D2.3) will be aggregated in one deliverable, which will be independently assessed by the Ethics Advisory Board of ChildRescue ...
This encryption will take place on top of the usual traffic encryption and will ensure that no information regarding user password credentials is stored unencrypted. ...
User GPS logs or social media posts are examples of the first category, whilst mobile network traffic and anonymous smart-card transactions fall under the second. ...
doi:10.5281/zenodo.2542731
fatcat:ecplhyb5hrapffb4amahnfr6ry
Deep Learning Approach for Intelligent Intrusion Detection System
2019
IEEE Access
Due to the dynamic nature of malware with continuously changing attacking methods, the malware datasets available publicly are to be updated systematically and benchmarked. ...
All the experiments of DNNs are run till 1,000 epochs with the learning rate varying in the range [0.01-0.5]. ...
They would also like to thank Computational Engineering and Networking (CEN) department for encouraging the research. ...
doi:10.1109/access.2019.2895334
fatcat:lownnwdnovfndhruhpdt2up5ia
Computer and Information Science, Vol. 3, No. 1, February, 2010
2010
Computer and Information Science
Section III focuses on the proposed system model for the call admission control based on higher order Markov chains. ...
The applications considered for the study involves conversation traffic, interactive traffic and background traffic. ...
For instance, table 1 denotes a Knowledge base space of weather classification (Shi, 1998; Miao et al., 2002) , in which weather is sorted N or P according to condition attribute set { a 1 (Outlook),a ...
doi:10.5539/cis.v3n1p0
fatcat:lest4lycincrhb3aojneniqgci
Data Leakage Prevention for Secure Cross-Domain Information Exchange
2017
IEEE Communications Magazine
If we represent the language model of document d as a timehomogeneous Markov chain of order n, it follows that the probability of observing the particular sequence S is mathematically expressed by P (S ...
Examples of abnormal traffic here include encrypted data, image files, executable files and non-chat like textual data. ...
In order to provide a better context for performing classification, we monitor the incoming information flow and use the audit trail to construct controlled environments. ...
doi:10.1109/mcom.2017.1700235
fatcat:zwcixu2adrgnpgtkaxg4p5kxh4
« Previous
Showing results 1 — 15 out of 45 results