Deep RNN-based Traffic Analysis Scheme for Detecting Target Applications

Author(s):  
Prajwal Kaushal
Author(s):  
D. Arivudainambi ◽  
K.A. Varun Kumar ◽  
Suresh Chandra Satapathy

Artificial intelligence methods have often been applied to carry out specific functions or errands in the cyber-defense realm. However, as adversary methods become more complex and difficult to divine, piecemeal efforts to understand cyber-attacks, and malware-based attacks in particular, are not providing sufficient means for malware analysts to understand the past, present and future distinctiveness of malware. Because, most of the malware communications take place-utilizing services. These services are completely anonymous and monitoring such services is a hard task. To address this issue, this paper proposes a novel traffic analysis scheme using correlation methods (non-parametric approach). Experiments are performed to validate the proposed approach on the real time traffic data collected over the period of 1 week. The experimental results confirm that the proposed method outperforms the existing state of the art traffic analysis schemes. The result also exhibits the traffic classification performance, which is analyzed by the decade old nearest neighbor method.


2020 ◽  
Author(s):  
Sumit Kumari ◽  
Neetu Sharma ◽  
Prashant Ahlawat

SAGE Open ◽  
2021 ◽  
Vol 11 (3) ◽  
pp. 215824402110321
Author(s):  
Hesham Suleiman Alyousef

This qualitative study examined multimodal cohesive devices in English oral biology texts by eight high-achieving Saudi English-as-a-foreign-language students enrolled in a Bachelor of Science Dentistry program. A Systemic Functional Multimodal Discourse Analysis (SF-MDA) of the textual and logical cohesive devices in oral biology texts was conducted, employing Halliday and Hasan’s cohesion analysis scheme. The findings showed that students used varied cohesive devices: lexical cohesion, followed by reference and conjunctions. Although ellipsis was minimally employed in the oral biology texts, its discipline-specific uses emerged: the use of bullet points and numbered lists that facilitate recall. The SF-MDA of cohesion in multimodal semiotic resources highlighted the processes underlying construction of conceptual and linguistic knowledge of cohesive devices in oral biology texts. The results indicate that oral biology discourse is interdisciplinary, including a number of subfields in biology. The SF-MDA of pictorial oral biology representations indicates that they include instances of cohesive devices that illustrate and complement verbal texts. The results indicate that undergraduate students need to be provided with a variety of multimodal high-cohesion texts so that they can successfully extend underlying conceptual and logical meaning-making relations.


Author(s):  
Haoyao Xie ◽  
Liangmin Wang ◽  
Shangnan Yin ◽  
Hui Zhao ◽  
Hao Shentu
Keyword(s):  

2021 ◽  
Vol 11 (5) ◽  
pp. 2164
Author(s):  
Jiaxin Li ◽  
Zhaoxin Zhang ◽  
Changyong Guo

X.509 certificates play an important role in encrypting the transmission of data on both sides under HTTPS. With the popularization of X.509 certificates, more and more criminals leverage certificates to prevent their communications from being exposed by malicious traffic analysis tools. Phishing sites and malware are good examples. Those X.509 certificates found in phishing sites or malware are called malicious X.509 certificates. This paper applies different machine learning models, including classical machine learning models, ensemble learning models, and deep learning models, to distinguish between malicious certificates and benign certificates with Verification for Extraction (VFE). The VFE is a system we design and implement for obtaining plentiful characteristics of certificates. The result shows that ensemble learning models are the most stable and efficient models with an average accuracy of 95.9%, which outperforms many previous works. In addition, we obtain an SVM-based detection model with an accuracy of 98.2%, which is the highest accuracy. The outcome indicates the VFE is capable of capturing essential and crucial characteristics of malicious X.509 certificates.


Sign in / Sign up

Export Citation Format

Share Document