Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Data exfiltration: A review of external attack vectors and countermeasures
Context One of the main targets of cyber-attacks is data exfiltration, which is the leakage of
sensitive or private data to an unauthorized entity. Data exfiltration can be perpetrated by an …
sensitive or private data to an unauthorized entity. Data exfiltration can be perpetrated by an …
ENDEMIC: End-to-End Network Disruptions-Examining Middleboxes, Issues, and Countermeasures-A Survey
I Benhabbour, M Dacier - ACM Computing Surveys, 2025 - dl.acm.org
Network middleboxes are important components in modern networking systems, impacting
approximately 40% of network paths according to recent studies [1]. This survey paper …
approximately 40% of network paths according to recent studies [1]. This survey paper …
Decanter: Detection of anomalous outbound http traffic by passive application fingerprinting
We present DECANTeR, a system to detect anomalous outbound HTTP communication,
which passively extracts fingerprints for each application running on a monitored host. The …
which passively extracts fingerprints for each application running on a monitored host. The …
ME-Box: A reliable method to detect malicious encrypted traffic
B Xu, G He, H Zhu - Journal of Information Security and Applications, 2021 - Elsevier
Currently, encryption (such as the Transport Layer Security protocol) is used by increasingly
more network applications to protect their security and privacy, while it also benefits network …
more network applications to protect their security and privacy, while it also benefits network …
[HTML][HTML] A novel privacy preserving user identification approach for network traffic
The prevalence of the Internet and cloud-based applications, alongside the technological
evolution of smartphones, tablets and smartwatches, has resulted in users relying upon …
evolution of smartphones, tablets and smartwatches, has resulted in users relying upon …
Data exfiltration detection on network metadata with autoencoders
We designed a Network Exfiltration Detection System (NEDS) to detect data exfiltration as
occurring in ransomware attacks. The NEDS operates on aggregated metadata, which is …
occurring in ransomware attacks. The NEDS operates on aggregated metadata, which is …
An approach for detecting encrypted insider attacks on OpenFlow SDN Networks
Data traffic on the Internet is growing continuously due to the high number of connected
devices and increased number of applications and transactions performed online. To ensure …
devices and increased number of applications and transactions performed online. To ensure …
Toward pinpointing data leakage from advanced persistent threats
J D'Agostino, G Kul - 2021 7th IEEE Intl Conference on Big …, 2021 - ieeexplore.ieee.org
Advanced Persistent Threats (APT) consist of most skillful hackers who employ sophisticated
techniques to stealthily gain unauthorized access to private networks and exfiltrate sensitive …
techniques to stealthily gain unauthorized access to private networks and exfiltrate sensitive …
支持数据隐私保护的恶意加密流量检测确认方法
何高峰, 魏千峰, 肖咸财, 朱海婷, 徐丙凤 - 通信学报, 2022 - infocomm-journal.com
为解决基于机器学**的恶意加密流量检测易产生大量误报的问题, 利用安全两方计算,
在不泄露具体数据内容的前提下实现网络流量内容和入侵检测特征间的字符段比对 …
在不泄露具体数据内容的前提下实现网络流量内容和入侵检测特征间的字符段比对 …
Detecting Insider Attacks with Video Websites using Distributed Image Steganalysis
CA Francis-Christie - Proceedings of the 47th ACM Technical …, 2016 - dl.acm.org
The safety of information inside of cloud networks is of interest to the network administrators.
In a new insider attack, inside attackers merge confidential information with videos using …
In a new insider attack, inside attackers merge confidential information with videos using …