Detection of Anomalous Encrypted Traffic

AK Cherukuri, ST Ikram, G Li, X Liu - Encrypted Network Traffic Analysis, 2024 - Springer
… against attacks targeted at encrypted protocols because they … developed to defend attacks
against encrypted protocols. In … The various attack categories which DTRAB will address are …

Toward identifying malicious encrypted traffic with a causality detection system

ZR Zeng, P Xun, W Peng, BK Zhao - Journal of Information Security and …, 2024 - Elsevier
… and promotion of encryption protocols such as TLS1.3 [1,2]. … To address the insufficient
traffic feature limitations of … In summary, the attack detection process based on the causal …

AKER: An open-source security platform integrating IDS and SIEM functions with encrypted traffic analytic capability

A Esseghir, F Kamoun, O Hraiech - Journal of Cyber Security …, 2022 - Taylor & Francis
using the HTTPS protocol and this usage is expected to raise in future [Citation3]. Nonetheless,
nearly half of malware attacks in 2015 used encryption … Methods based on traffic feature

Rule‐Based Approach for Botnet Behavior Analysis

S Raheja, G Munjal, J Jangra… - Intelligent Data Analytics …, 2021 - Wiley Online Library
… [1] have proposed a new detection method known as DTRAB to predict the DDOS attacks. …
N., DTRAB: Combating against attacks on encrypted protocols through traffic-feature analysis. …

Using Machine Learning to Detect Botnets in Network Traffic Check for updates

S Rai, SA Sajidha, VM Nisha… - Machine Learning and …, 2023 - books.google.com
DTRAB [8] method, we can prevent DDoS attacks by detecting those attacks which are
encapsulated through encryption and are against the application-level protocol using a …

LITNET-2020: An annotated real-world network flow dataset for network intrusion detection

R Damasevicius, A Venckauskas, S Grigaliunas… - Electronics, 2020 - mdpi.com
… 85 network flow features of the dataset and 12 attack types. … features for detecting attacks
against encrypted protocols and … items were removed, preventing the classifiers from achieving …

Using Machine Learning to Detect Botnets in Network Traffic

S Rai, SA Sajidha, VM Nisha… - … Conference on Machine …, 2022 - Springer
DTRAB [8] method, we can prevent DDoS attacks by detecting those attacks which are
encapsulated through encryption and are against the application-level protocol using a …

Hybrid deep neural architecture for detection of ddos attacks in cloud computing

A Bhardwaj, V Mangat, R Vig - … : Proceedings of Sixth ISTA 2020, India, 2021 - Springer
… vectors, a competent technique is essential for combating these new attacks. In … encrypted
application level protocol attacks using monitoring stubs. Monitoring stubs analyze encrypted

Investigating the prospect of leveraging blockchain and machine learning to secure vehicular networks: A survey

M Dibaei, X Zheng, Y Xia, X Xu, A Jolfaei… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
… Considering cost analysis, FlexRay protocol implementation … and software attacks. One is
that the attacker can gain access … in selecting trustworthy nodes and preventing an attacker to …

Balancing QoS and security in the edge: Existing practices, challenges, and 6G opportunities with machine learning

ZM Fadlullah, B Mao, N Kato - IEEE Communications Surveys & …, 2022 - ieeexplore.ieee.org
analysis of various methods ranging from no encryption to … Using these various encryption
protocols with varying key … to combat these attacks is to use VPNs typically using layer-2 …