A Esseghir, F Kamoun, O Hraiech - Journal of Cyber Security …, 2022 - Taylor & Francis
… using the HTTPS protocol and this usage is expected to raise in future [Citation3]. Nonetheless, nearly half of malware attacks in 2015 used encryption … Methods based on trafficfeature …
… 85 network flow features of the dataset and 12 attack types. … features for detecting attacks against encryptedprotocols and … items were removed, preventing the classifiers from achieving …
S Raheja, G Munjal, J Jangra… - Intelligent Data Analytics …, 2021 - Wiley Online Library
… [1] have proposed a new detection method known as DTRAB to predict the DDOS attacks. … N., DTRAB: Combating against attacks on encryptedprotocolsthroughtraffic-featureanalysis. …
S Rai, SA Sajidha, VM Nisha… - Machine Learning and …, 2023 - books.google.com
… DTRAB [8] method, we can prevent DDoS attacks by detecting those attacks which are encapsulated throughencryption and are against the application-level protocolusing a …
S Rai, SA Sajidha, VM Nisha… - … Conference on Machine …, 2022 - Springer
… DTRAB [8] method, we can prevent DDoS attacks by detecting those attacks which are encapsulated throughencryption and are against the application-level protocolusing a …
S Behzad, R Fotohi, JH Balov, MJ Rabipour - arXiv preprint arXiv …, 2020 - arxiv.org
… the security of DSR routing protocol to encounter the black hole attacks. This schema tries to … DTRAB: Combating against attacks on encryptedprotocolsthroughtraffic-featureanalysis. …
A Bhardwaj, V Mangat, R Vig - … : Proceedings of Sixth ISTA 2020, India, 2021 - Springer
… vectors, a competent technique is essential for combating these new attacks. In … encrypted application level protocolattacksusing monitoring stubs. Monitoring stubs analyzeencrypted …
W Li, S Tug, W Meng, Y Wang - Future Generation Computer Systems, 2019 - Elsevier
… to the blockchain using a consensus protocol, which … several common attacks like flooding attack and worm attack. The … Future work includes building a secure IDS framework via …
… Considering cost analysis, FlexRay protocol implementation … and software attacks. One is that the attacker can gain access … in selecting trustworthy nodes and preventing an attacker to …