Identifying encrypted malware traffic with contextual flow data

B Anderson, D McGrew - Proceedings of the 2016 ACM workshop on …, 2016 - dl.acm.org
Identifying threats contained within encrypted network traffic poses a unique set of
challenges. It is important to monitor this traffic for threats and malware, but do so in a way …

[PDF][PDF] Identifying Encrypted Malware Traffic with Contextual Flow Data

B Anderson, D McGrew - library.usc.edu.ph
Identifying threats contained within encrypted network traffic poses a unique set of
challenges. It is important to monitor this traffic for threats and malware, but do so in a way …