BeCome: Blockchain-enabled computation offloading for IoT in mobile edge computing

X Xu, X Zhang, H Gao, Y Xue, L Qi… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Benefiting from the real-time processing ability of edge computing, computing tasks
requested by smart devices in the Internet of Things are offloaded to edge computing …

Detecting Internet of Things attacks using distributed deep learning

GDLT Parra, P Rad, KKR Choo, N Beebe - Journal of Network and …, 2020 - Elsevier
The reliability of Internet of Things (IoT) connected devices is heavily dependent on the
security model employed to protect user data and prevent devices from engaging in …

Cyber kill chain-based taxonomy of advanced persistent threat actors: Analogy of tactics, techniques, and procedures

PN Bahrami, A Dehghantanha, T Dargahi… - Journal of information …, 2019 - koreascience.kr
The need for cyber resilience is increasingly important in our technology-dependent society
where computing devices and data have been, and will continue to be, the target of cyber …

Privacy-preserving encrypted traffic inspection with symmetric cryptographic techniques in IoT

D Chen, H Wang, N Zhang, X Nie… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
To ensure the security of Internet of Things (IoT) communications, one can use deep packet
inspection (DPI) on network middleboxes to detect and mitigate anomalies and suspicious …

Learning to classify: A flow-based relation network for encrypted traffic classification

W Zheng, C Gou, L Yan, S Mo - Proceedings of The Web Conference …, 2020 - dl.acm.org
As the size and source of network traffic increase, so does the challenge of monitoring and
analyzing network traffic. The challenging problems of classifying encrypted traffic are the …

Seeing traffic paths: Encrypted traffic classification with path signature features

SJ Xu, GG Geng, XB Jin, DJ Liu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Although many network traffic protection methods have been developed to protect user
privacy, encrypted traffic can still reveal sensitive user information with sophisticated …

[Retracted] CLD‐Net: A Network Combining CNN and LSTM for Internet Encrypted Traffic Classification

X Hu, C Gu, F Wei - Security and Communication Networks, 2021 - Wiley Online Library
The development of the Internet has led to the complexity of network encrypted traffic.
Identifying the specific classes of network encryption traffic is an important part of …

Encrypted traffic classification based on Gaussian mixture models and Hidden Markov Models

Z Yao, J Ge, Y Wu, X Lin, R He, Y Ma - Journal of Network and Computer …, 2020 - Elsevier
To protect user privacy (eg, IP address and sensitive data in a packet), many traffic
protection methods, like traffic obfuscation and encryption technologies, are introduced …

DDoS defense for IoT: A Stackelberg game model-enabled collaborative framework

X Chen, L Xiao, W Feng, N Ge… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
The proliferation of Distributed Denial of Service (DDoS) attacks in Internet of Things (IoT)
not only threatens the security of digital devices and infrastructure but also severely …

Encrypted and covert DNS queries for botnets: Challenges and countermeasures

C Patsakis, F Casino, V Katos - Computers & Security, 2020 - Elsevier
There is a continuous increase in the sophistication that modern malware exercise in order
to bypass the deployed security mechanisms. A typical approach to evade the identification …