Machine learning for encrypted malicious traffic detection: Approaches, datasets and comparative study
As people's demand for personal privacy and data security becomes a priority, encrypted
traffic has become mainstream in the cyber world. However, traffic encryption is also …
traffic has become mainstream in the cyber world. However, traffic encryption is also …
A distance-based method for building an encrypted malware traffic identification framework
J Liu, Z Tian, R Zheng, L Liu - IEEE Access, 2019 - ieeexplore.ieee.org
The popularity of encryption method brings a great challenge to malware traffic identification.
Traditional classes defined by expert experience are usually classified based on the host …
Traditional classes defined by expert experience are usually classified based on the host …
An ensemble clustering method for intrusion detection
The amount of data in the field of computer networking is growing rapidly and this urges new
challenges in the field of an intrusion detection system (IDS). To handle such increasing …
challenges in the field of an intrusion detection system (IDS). To handle such increasing …
P2P traffic classification using clustering technology
CM Tseng, GT Huang, TJ Liu - 2016 IEEE/SICE International …, 2016 - ieeexplore.ieee.org
Network traffic classification has been always an important technology of network
management for a long time. In recent years, the more unknown P2P traffic flows on the …
management for a long time. In recent years, the more unknown P2P traffic flows on the …
An Efficient Network Classification Based on Various-Widths Clustering and Semi-Supervised Stacking
Network traffic classification is basic tool for internet service providers, various government
and private organisations to carry out investigation on network activities such as Intrusion …
and private organisations to carry out investigation on network activities such as Intrusion …
Integrated QoS management technique for internet protocol storage area networks
J Kithinji - 2023 - 41.89.229.23
The increasing number of Information technology Users around the world has led to a
tremendous increase in the amount of data that requires storage. In response to this …
tremendous increase in the amount of data that requires storage. In response to this …