A comprehensive survey of recent internet measurement techniques for cyber security

MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …

Tight arms race: Overview of current malware threats and trends in their detection

L Caviglione, M Choraś, I Corona, A Janicki… - IEEE …, 2020 - ieeexplore.ieee.org
Cyber attacks are currently blooming, as the attackers reap significant profits from them and
face a limited risk when compared to committing the “classical” crimes. One of the major …

Fs-net: A flow sequence network for encrypted traffic classification

C Liu, L He, G Xiong, Z Cao, Z Li - IEEE INFOCOM 2019-IEEE …, 2019 - ieeexplore.ieee.org
With more attention paid to user privacy and communication security, the volume of
encrypted traffic rises sharply, which brings a huge challenge to traditional rule-based traffic …

Flowprint: Semi-supervised mobile-app fingerprinting on encrypted network traffic

T Van Ede, R Bortolameotti, A Continella… - Network and distributed …, 2020 - par.nsf.gov
Mobile-application fingerprinting of network traffic is valuable for many security solutions as
it provides insights into the apps active on a network. Unfortunately, existing techniques …

Machine learning for encrypted malware traffic classification: accounting for noisy labels and non-stationarity

B Anderson, D McGrew - Proceedings of the 23rd ACM SIGKDD …, 2017 - dl.acm.org
The application of machine learning for the detection of malicious network traffic has been
well researched over the past several decades; it is particularly appealing when the traffic is …

Machine learning for encrypted malicious traffic detection: Approaches, datasets and comparative study

Z Wang, KW Fok, VLL Thing - Computers & Security, 2022 - Elsevier
As people's demand for personal privacy and data security becomes a priority, encrypted
traffic has become mainstream in the cyber world. However, traffic encryption is also …

Identifying encrypted malware traffic with contextual flow data

B Anderson, D McGrew - Proceedings of the 2016 ACM workshop on …, 2016 - dl.acm.org
Identifying threats contained within encrypted network traffic poses a unique set of
challenges. It is important to monitor this traffic for threats and malware, but do so in a way …

TSCRNN: A novel classification scheme of encrypted traffic based on flow spatiotemporal features for efficient management of IIoT

K Lin, X Xu, H Gao - Computer Networks, 2021 - Elsevier
Abstract In the Industrial Internet of Things (IIoT) in the 5G era, the growth of smart devices
will generate a large amount of data traffic, bringing a huge challenge of network traffic …

[PDF][PDF] The Security Impact of HTTPS Interception.

Z Durumeric, Z Ma, D Springall, R Barnes, N Sullivan… - NDSS, 2017 - git.safemobile.org
As HTTPS deployment grows, middlebox and antivirus products are increasingly
intercepting TLS connections to retain visibility into network traffic. In this work, we present a …

A look behind the curtain: traffic classification in an increasingly encrypted web

I Akbari, MA Salahuddin, L Ven, N Limam… - Proceedings of the …, 2021 - dl.acm.org
Traffic classification is essential in network management for operations ranging from
capacity planning, performance monitoring, volumetry, and resource provisioning, to …