Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








45 Hits in 7.4 sec

A Survey on Tor Encrypted Traffic Monitoring

Mohamad Amar Irsyad Mohd Aminuddin, Zarul Fitri, Manmeet Kaur, Darshan Singh
2018 International Journal of Advanced Computer Science and Applications  
Therefore, numerous of research has been performed on encrypted traffic analyzing and classification using machine learning techniques.  ...  Next, there are comparison of the surveyed traffic classification and discussion on their classification properties. 114 | P a g e www.ijacsa.thesai.org encryption to uncover the next destination of the  ...  This study also proposes modelling process using application attribute bigram that able to increase second-order Markov Chains state diversity.  ... 
doi:10.14569/ijacsa.2018.090815 fatcat:wmjcrz4jojhzxmjv3a52sf4toe

Classification of Markov Encrypted Traffic on Gaussian Mixture Model Constrained Clustering

Junkai Yi, Guanglin Gong, Zeyu Liu, Yacong Zhang, Chi-Hua Chen
2021 Wireless Communications and Mobile Computing  
In order to solve the problem that traditional analysis approaches of encrypted traffic in encryption transmission of network application only consider the traffic classification in the complete communication  ...  process with ignoring traffic classification in the simplified communication process, and there are a lot of duplication problems in application fingerprints during state transition, a new classification  ...  Acknowledgments This work was supported by the National Natural Science Foundation of China (U1636208).  ... 
doi:10.1155/2021/4935108 fatcat:6h4sbcdhgvdjrm4iprpul6msli

A Survey on TLS-Encrypted Malware Network Traffic Analysis Applicable to Security Operations Centers

Chaeyeon Oh, Joonseo Ha, Heejun Roh
2021 Applied Sciences  
To this end, in this survey article, we present existing research on NTA and related areas, primarily focusing on TLS-encrypted traffic to detect and classify malicious traffic with deployment scenarios  ...  Security experts in SOCs and researchers in academia can obtain useful information from our survey, as the main focus of our survey is NTA methods applicable to malware detection and family classification  ...  Classification of Encrypted Traffic with Second-Order Markov Chains and Application Attribute Bigrams. IEEE Trans. Inf. Forensics Secur. 2017, 12, 1830–1843. [CrossRef] 92.  ... 
doi:10.3390/app12010155 fatcat:kdkvmdkbareb7cxgy7er7ncday

Detecting machine-morphed malware variants via engine attribution

Radhouane Chouchane, Natalia Stakhanova, Andrew Walenstein, Arun Lakhotia
2013 Journal in Computer Virology and Hacking Techniques  
Our experiments confirm the applicability of the proposed approach in practice and indicate that engine attribution may offer a viable enhancement of current defenses against malware.  ...  of 96% and higher.  ...  Modeling morphing engine using Markov models To formalize the proposed approach we use Markov chain theory.  ... 
doi:10.1007/s11416-013-0183-6 fatcat:ghkq3t2e6bci7gmy5p3aluciiu

A Survey on Analyzing Encrypted Network Traffic of Mobile Devices [article]

Ashutosh Bhatiaa, Ankit AgrawalaAyush Bahugunaa, Kamlesh Tiwaria, K. Haribabua, Deepak Vishwakarmab
2020 arXiv   pre-print
Applications encrypt their communication to ensure the privacy and security of the user's data.  ...  To that end, researchers are trying to develop techniques to classify encrypted mobile traffic at different levels of granularity, with the objectives of performing mobile user profiling, network performance  ...  This research was supported by the Center for Artificial Intelligence and Robotics (CAIR) lab of Defence Research and Development Organisation (DRDO), India, Bangalore under the CARS scheme.  ... 
arXiv:2006.12352v1 fatcat:cysjaqpqdfbxjn7b2gsy6gyelu

Trends on Computer Security: Cryptography, User Authentication, Denial of Service and Intrusion Detection

Pablo Marcillo, Daniel Maldonado-Ruiz, Santiago Arrais, Lorena Isabel Barona López, Angel Leonardo Valdivieso Caraguay
2019 Zenodo  
of privacy and anonymity forall users and his portable devices.  ...  The new generation of security threats has beenpromoted by digital currencies and real-time applications, whereall users develop new ways to communicate on the Internet.Security has evolved in the need  ...  In this context, performance evaluation is done through probabilistic analysis with the Markov chains.  ... 
doi:10.5281/zenodo.5710834 fatcat:q3h3xdhc7rd55k4u4kbb6qzncu

ML-based tunnel detection and tunneled application classification [article]

Johan Mazel, Matthieu Saudrais, Antoine Hervieu
2022 arXiv   pre-print
Second, we propose a complete pipeline to detect and classify tunneling protocols and tunneled applications.  ...  Third, we present a thorough analysis of the performance of both network traffic metadata features and machine learning techniques.  ...  order.  ... 
arXiv:2201.10371v1 fatcat:7ndn4rhxhjetvmesqs7dvee3hi

Attacking HTTPS Secure Search Service through Correlation Analysis of HTTP Webpages Accessed

Qian Liping, Wang Lidong
2017 International Journal of Security and Its Applications  
The purpose of this paper is to demonstrate that HTTPS traffic can be correlated and de-anonymized through HTTP traffic.  ...  We propose a novel approach for attacking secure search through correlating analysis of encrypted search with unencrypted webpages the user visits subsequently.  ...  Acknowledgments This work was supported in part by the National Natural Science Foundation of China under Grant 61571144.  ... 
doi:10.14257/ijsia.2017.11.7.03 fatcat:wjhecu2w5vhizk4ez3ewcmul5u

Trends on Computer Security: Cryptography, User Authentication, Denial of Service and Intrusion Detection [article]

Pablo Daniel Marcillo Lara, Daniel Alejandro Maldonado-Ruiz, Santiago Daniel Arrais Díaz, Lorena Isabel Barona López, Ángel Leonardo Valdivieso Caraguay
2019 arXiv   pre-print
The new generation of security threats has been promoted by digital currencies and real-time applications, where all users develop new ways to communicate on the Internet.  ...  Security has evolved in the need of privacy and anonymity for all users and his portable devices.  ...  context, performance evaluation is done through probabilistic analysis with the Markov chains.  ... 
arXiv:1903.08052v1 fatcat:dri2rwc2frcdhk7ryjt343dbui

Survey of Network Intrusion Detection Methods from the Perspective of the Knowledge Discovery in Databases Process [article]

Borja Molina-Coronado and Usue Mori and Alexander Mendiburu and José Miguel-Alonso
2020 arXiv   pre-print
In addition, we also present the characteristics and motivations behind the use of each of these techniques and propose more adequate and up-to-date taxonomies and definitions for intrusion detectors based  ...  In this survey, we review the methods that have been applied to network data with the purpose of developing an intrusion detector, but contrary to previous reviews in the area, we analyze them from the  ...  In [17] , only records with low classification confidence are incorporated to the model in order to capture new classes of traffic.  ... 
arXiv:2001.09697v1 fatcat:uyaqwh2ncngorgta5vzyraqfr4

File Packing from the Malware Perspective: Techniques, Analysis Approaches, and Directions for Enhancements

Trivikram Muralidharan, Aviad Cohen, Noa Gerson, Nir Nissim
2022 ACM Computing Surveys  
This paper then surveys 23 methods proposed in academic research for the detection and classification of packed portable executable (PE) files and highlights various trends in malware packing.  ...  With the growing sophistication of malware, the need to devise improved malware detection schemes is crucial.  ...  We would also like to thank Eitam Sheetrit for his inputs on how to improve our proposed packing classification solution using the TPF classification algorithm, Lastly, we would like to thanks Tomer Panker  ... 
doi:10.1145/3530810 fatcat:c6horhx3i5bevk5ibtu5y42rim

D2.4 Profiling Analytics and Privacy Methodological Foundations Release I

Suite5, Frankfurt University, UBITECH, NTUA
2018 Zenodo  
The results reported in the previous three deliverables of WP2 (D2.1, D2.2 and D2.3) will be aggregated in one deliverable, which will be independently assessed by the Ethics Advisory Board of ChildRescue  ...  This encryption will take place on top of the usual traffic encryption and will ensure that no information regarding user password credentials is stored unencrypted.  ...  User GPS logs or social media posts are examples of the first category, whilst mobile network traffic and anonymous smart-card transactions fall under the second.  ... 
doi:10.5281/zenodo.2542731 fatcat:ecplhyb5hrapffb4amahnfr6ry

Deep Learning Approach for Intelligent Intrusion Detection System

Vinayakumar R, Mamoun Alazab, Soman KP, Prabaharan Poornachandran, Ameer Al-Nemrat, Sitalakshmi Venkatraman
2019 IEEE Access  
Due to the dynamic nature of malware with continuously changing attacking methods, the malware datasets available publicly are to be updated systematically and benchmarked.  ...  All the experiments of DNNs are run till 1,000 epochs with the learning rate varying in the range [0.01-0.5].  ...  They would also like to thank Computational Engineering and Networking (CEN) department for encouraging the research.  ... 
doi:10.1109/access.2019.2895334 fatcat:lownnwdnovfndhruhpdt2up5ia

Computer and Information Science, Vol. 3, No. 1, February, 2010

Editor CIS
2010 Computer and Information Science  
Section III focuses on the proposed system model for the call admission control based on higher order Markov chains.  ...  The applications considered for the study involves conversation traffic, interactive traffic and background traffic.  ...  For instance, table 1 denotes a Knowledge base space of weather classification (Shi, 1998; Miao et al., 2002) , in which weather is sorted N or P according to condition attribute set { a 1 (Outlook),a  ... 
doi:10.5539/cis.v3n1p0 fatcat:lest4lycincrhb3aojneniqgci

Data Leakage Prevention for Secure Cross-Domain Information Exchange

Kyrre Wahl Kongsgard, Nils Agne Nordbotten, Federico Mancini, Raymond Haakseth, Paal E. Engelstad
2017 IEEE Communications Magazine  
If we represent the language model of document d as a timehomogeneous Markov chain of order n, it follows that the probability of observing the particular sequence S is mathematically expressed by P (S  ...  Examples of abnormal traffic here include encrypted data, image files, executable files and non-chat like textual data.  ...  In order to provide a better context for performing classification, we monitor the incoming information flow and use the audit trail to construct controlled environments.  ... 
doi:10.1109/mcom.2017.1700235 fatcat:zwcixu2adrgnpgtkaxg4p5kxh4
« Previous Showing results 1 — 15 out of 45 results