Detection of Anomalous Encrypted Traffic

AK Cherukuri, ST Ikram, G Li, X Liu - Encrypted Network Traffic Analysis, 2024 - Springer
… against attacks targeted at encrypted protocols because they … developed to defend attacks
against encrypted protocols. In … The various attack categories which DTRAB will address are …

Toward identifying malicious encrypted traffic with a causality detection system

ZR Zeng, P Xun, W Peng, BK Zhao - Journal of Information Security and …, 2024 - Elsevier
… and promotion of encryption protocols such as TLS1.3 [1,2]. … To address the insufficient
traffic feature limitations of … In summary, the attack detection process based on the causal …

AKER: An open-source security platform integrating IDS and SIEM functions with encrypted traffic analytic capability

A Esseghir, F Kamoun, O Hraiech - Journal of Cyber Security …, 2022 - Taylor & Francis
using the HTTPS protocol and this usage is expected to raise in future [Citation3]. Nonetheless,
nearly half of malware attacks in 2015 used encryption … Methods based on traffic feature

Cost-effective encryption-based autonomous routing protocol for efficient and secure wireless sensor networks

K Saleem, A Derhab, MA Orgun, J Al-Muhtadi… - Sensors, 2016 - mdpi.com
… Numerous security strategies are available, such as DTRAB [6… on secure authentication and
encryption [18] to thwart attacks… To simplify the analysis, we focus on the critical components …

Rule‐Based Approach for Botnet Behavior Analysis

S Raheja, G Munjal, J Jangra… - Intelligent Data Analytics …, 2021 - Wiley Online Library
… [1] have proposed a new detection method known as DTRAB to predict the DDOS attacks. …
N., DTRAB: Combating against attacks on encrypted protocols through traffic-feature analysis. …

[PDF][PDF] An approach of anomaly, Outlier Detection in Security Applications

N Verma, N Mishra - … Journal of Advanced Engineering Research and … - academia.edu
… , our architectures for FEM and outlier analysis achieve 21.25- and 23.… To fight in opposition
to assaults on encrypted protocols, we … We name our specific approach DTRAB because it …

Botnet detection using graph-based feature clustering

S Chowdhury, M Khanzadeh, R Akula, F Zhang… - Journal of Big Data, 2017 - Springer
… detection technique called DTRAB to infer DDoS attacks. The authors investigate the
detection of attacks against application-level protocols that are encapsulated via encryption. In …

LITNET-2020: An annotated real-world network flow dataset for network intrusion detection

R Damasevicius, A Venckauskas, S Grigaliunas… - Electronics, 2020 - mdpi.com
… 85 network flow features of the dataset and 12 attack types. … features for detecting attacks
against encrypted protocols and … items were removed, preventing the classifiers from achieving …

Security upgrade against RREQ flooding attack by using balance index on vehicular ad hoc network

MJ Faghihniya, SM Hosseini, M Tahmasebi - Wireless Networks, 2017 - Springer
… The flooding attack occur in all of the secure on demand … The models are capable of preventing
the attacks by detecting and … [13] proposed a new secure protocol called Trust Ad Hoc On-…

A modified algorithm to improve security and performance of AODV protocol against black hole attack

S Shahabi, M Ghazvini, M Bakhtiarian - Wireless Networks, 2016 - Springer
… the accuracy in preventing the black hole attacks. They … In summary, many different
detection techniques proposed … A secure model for prevention of black hole attack in wireless …