An adaptive system for troubleshooting network issues in the context of encrypted data traffic

VV Tong - 2021 - theses.hal.science
Nowadays, the Internet network is becoming more and more complex due to an ever-
increasing number of network devices, various multimedia services and the prevalence of …

[图书][B] Troubleshooting for Network Operators: The Road to a New Paradigm with Encrypted Traffic

S Souihi, HA Tran, A Mellouk - 2023 - books.google.com
Nowadays, the Internet is becoming more and more complex due to an everincreasing
number of network devices, various multimedia services and a prevalence of encrypted …

Novel Global Troubleshooting Framework fo Encrypted Traffic

S Souihi, HA Tran, A Mellouk - 2023 - ieeexplore.ieee.org
In this chapter, the authors present a novel troubleshooting architecture in the context of
encrypted traffic and then present a proof of concept of this architecture in a software …

Temporary Remediation

S Souihi, HA Tran, A Mellouk - 2023 - ieeexplore.ieee.org
This chapter presents a quality of experience‐based application‐aware segment routing in
the software‐defined networking environment for encrypted traffic. This approach is …

Anomaly root cause diagnosis from active and passive measurement analysis

Z Tlaiss - 2021 33th International Teletraffic Congress (ITC-33), 2021 - ieeexplore.ieee.org
Diagnosis demands a deep analysis of data to identify the root cause of an anomaly and still
mostly relies on human experts. The increase of Internet traffic combined with the arrival of …

Trends of Encrypted Network Traffic Analysis Technologies for Network Anomaly Detection

YS Choi, JH Yoo, KJ Koo, DS Moon - Electronics and …, 2023 - koreascience.kr
With the rapid advancement of the Internet, the use of encrypted traffic has surged in order to
protect data during transmission. Simultaneously, network attacks have also begun to …

[PDF][PDF] Network Traffic Anomaly Detection and Analysis–from Research to the Implementation

S Gajin - 2023 - ceur-ws.org
With a constantly increasing amount of encrypted network traffic and a new type of attack
(“zero-day”), network traffic anomaly detection shows significant benefits over traditionally …

Hybrid Machine Learning Traffic Flows Analysis for Network Attacks Detection

V Timcenko, S Gajin - 2022 30th Telecommunications Forum …, 2022 - ieeexplore.ieee.org
This research focuses on network behavior analysis and provides a comprehensive flow-
based anomaly detection proposal, which is based on combined machine learning and …

[HTML][HTML] Encryption-agnostic classifiers of traffic originators and their application to anomaly detection

D Canavese, L Regano, C Basile, G Ciravegna… - Computers & Electrical …, 2022 - Elsevier
This paper presents an approach that leverages classical machine learning techniques to
identify the tools from the packets sniffed, both for clear-text and encrypted traffic. This …

[PDF][PDF] A Privacy-Preserving Approach for Vulnerability Scanning Detection

L Regano, D Canavese, L Mannella - Proceedings of the Italian …, 2024 - researchgate.net
This paper presents an approach leveraging machine learning techniques to monitor
network traffic in search of vulnerability scanning activities. Indeed, attackers typically …