Articles with "encrypted traffic" as a keyword



Photo from wikipedia

Privacy-Preserving Encrypted Traffic Inspection With Symmetric Cryptographic Techniques in IoT

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2022.3155355

Abstract: To ensure the security of Internet of Things (IoT) communications, one can use deep packet inspection (DPI) on network middleboxes to detect and mitigate anomalies and suspicious activities in network traffic of IoT, although doing… read more here.

Keywords: encrypted traffic; preserving encrypted; privacy preserving; traffic ... See more keywords
Photo by dnevozhai from unsplash

A Novel Deep-Learning-Enabled QoS Management Scheme for Encrypted Traffic in Software-Defined Cellular Networks

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Systems Journal"

DOI: 10.1109/jsyst.2021.3089175

Abstract: Mobile users are served with over-the-top (OTT) services through their cellular networks. To ensure the privacy of users and confidentiality of content, most OTT service providers encrypt their traffic. When a cellular network has no… read more here.

Keywords: encrypted traffic; qos management; service; traffic ... See more keywords
Photo by dnevozhai from unsplash

Optimizing Feature Selection for Efficient Encrypted Traffic Classification: A Systematic Approach

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Network"

DOI: 10.1109/mnet.011.1900366

Abstract: Traffic classification is a technology for classifying and identifying sensitive information from cluttered traffic. With the increasing use of encryption and other evasion technologies, traditional content- based network traffic classification becomes impossible, and traffic classification… read more here.

Keywords: traffic classification; feature selection; encrypted traffic; traffic ... See more keywords
Photo by cokdewisnu from unsplash

Machine Learning-Based Delay-Aware UAV Detection and Operation Mode Identification Over Encrypted Wi-Fi Traffic

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2019.2959899

Abstract: The consumer unmanned aerial vehicle (UAV) market has grown significantly over the past few years. Despite its huge potential in spurring economic growth by supporting various applications, the increase of consumer UAVs poses potential risks… read more here.

Keywords: machine learning; identification; encrypted traffic; traffic ... See more keywords
Photo by dnevozhai from unsplash

Mobile Encrypted Traffic Classification Using Deep Learning: Experimental Evaluation, Lessons Learned, and Challenges

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Transactions on Network and Service Management"

DOI: 10.1109/tnsm.2019.2899085

Abstract: The massive adoption of hand-held devices has led to the explosion of mobile traffic volumes traversing home and enterprise networks, as well as the Internet. Traffic classification (TC), i.e., the set of procedures for inferring… read more here.

Keywords: traffic classification; traffic; encrypted traffic; design ... See more keywords
Photo by dnevozhai from unsplash

Attribute-Based Zero-Shot Learning for Encrypted Traffic Classification

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Network and Service Management"

DOI: 10.1109/tnsm.2022.3183247

Abstract: As more and more network applications have adopted encryption for user privacy, it poses a great challenge to identify increasing types of encrypted traffic. Recent methods mainly focus on leveraging machine learning or deep learning… read more here.

Keywords: encrypted traffic; classification; traffic; attribute based ... See more keywords
Photo from wikipedia

Deep Encrypted Traffic Detection: An Anomaly Detection Framework for Encryption Traffic Based on Parallel Automatic Feature Extraction

Sign Up to like & get
recommendations!
Published in 2023 at "Computational Intelligence and Neuroscience"

DOI: 10.1155/2023/3316642

Abstract: With an increasing number of network attacks using encrypted communication, the anomaly detection of encryption traffic is of great importance to ensure reliable network operation. However, the existing feature extraction methods for encrypted traffic anomaly… read more here.

Keywords: encrypted traffic; feature extraction; traffic; detection ... See more keywords
Photo from wikipedia

CNN for User Activity Detection Using Encrypted In-App Mobile Data

Sign Up to like & get
recommendations!
Published in 2022 at "Future Internet"

DOI: 10.3390/fi14020067

Abstract: In this study, a simple yet effective framework is proposed to characterize fine-grained in-app user activities performed on mobile applications using a convolutional neural network (CNN). The proposed framework uses a time window-based approach to… read more here.

Keywords: activity detection; cnn user; encrypted traffic; traffic ... See more keywords
Photo by moritz_photography from unsplash

ICLSTM: Encrypted Traffic Service Identification Based on Inception-LSTM Neural Network

Sign Up to like & get
recommendations!
Published in 2021 at "Symmetry"

DOI: 10.3390/sym13061080

Abstract: The wide application of encryption technology has made traffic classification gradually become a major challenge in the field of network security. Traditional methods such as machine learning, which rely heavily on feature engineering and others,… read more here.

Keywords: traffic; classification; service identification; encrypted traffic ... See more keywords