Toward identifying malicious encrypted traffic with a causality detection system

ZR Zeng, P Xun, W Peng, BK Zhao - Journal of Information Security and …, 2024 - Elsevier
… and promotion of encryption protocols such as TLS1.3 [1,2]. … To address the insufficient
traffic feature limitations of … In summary, the attack detection process based on the causal …

AKER: An open-source security platform integrating IDS and SIEM functions with encrypted traffic analytic capability

A Esseghir, F Kamoun, O Hraiech - Journal of Cyber Security …, 2022 - Taylor & Francis
using the HTTPS protocol and this usage is expected to raise in future [Citation3]. Nonetheless,
nearly half of malware attacks in 2015 used encryption … Methods based on traffic feature

[HTML][HTML] LITNET-2020: An annotated real-world network flow dataset for network intrusion detection

R Damasevicius, A Venckauskas, S Grigaliunas… - Electronics, 2020 - mdpi.com
… 85 network flow features of the dataset and 12 attack types. … features for detecting attacks
against encrypted protocols and … items were removed, preventing the classifiers from achieving …

Rule‐Based Approach for Botnet Behavior Analysis

S Raheja, G Munjal, J Jangra… - Intelligent Data Analytics …, 2021 - Wiley Online Library
… [1] have proposed a new detection method known as DTRAB to predict the DDOS attacks. …
N., DTRAB: Combating against attacks on encrypted protocols through traffic-feature analysis. …

Using Machine Learning to Detect Botnets in Network Traffic Check for updates

S Rai, SA Sajidha, VM Nisha… - Machine Learning and …, 2023 - books.google.com
DTRAB [8] method, we can prevent DDoS attacks by detecting those attacks which are
encapsulated through encryption and are against the application-level protocol using a …

Using Machine Learning to Detect Botnets in Network Traffic

S Rai, SA Sajidha, VM Nisha… - … Conference on Machine …, 2022 - Springer
DTRAB [8] method, we can prevent DDoS attacks by detecting those attacks which are
encapsulated through encryption and are against the application-level protocol using a …

An artificial immune based approach for detection and isolation misbehavior attacks in wireless networks

S Behzad, R Fotohi, JH Balov, MJ Rabipour - arXiv preprint arXiv …, 2020 - arxiv.org
… the security of DSR routing protocol to encounter the black hole attacks. This schema tries to
DTRAB: Combating against attacks on encrypted protocols through traffic-feature analysis. …

Hybrid deep neural architecture for detection of ddos attacks in cloud computing

A Bhardwaj, V Mangat, R Vig - … : Proceedings of Sixth ISTA 2020, India, 2021 - Springer
… vectors, a competent technique is essential for combating these new attacks. In … encrypted
application level protocol attacks using monitoring stubs. Monitoring stubs analyze encrypted

Designing collaborative blockchained signature-based intrusion detection in IoT environments

W Li, S Tug, W Meng, Y Wang - Future Generation Computer Systems, 2019 - Elsevier
… to the blockchain using a consensus protocol, which … several common attacks like flooding
attack and worm attack. The … Future work includes building a secure IDS framework via …

Investigating the prospect of leveraging blockchain and machine learning to secure vehicular networks: A survey

M Dibaei, X Zheng, Y Xia, X Xu, A Jolfaei… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
… Considering cost analysis, FlexRay protocol implementation … and software attacks. One is
that the attacker can gain access … in selecting trustworthy nodes and preventing an attacker to …