traffic analysis
Recently Published Documents


TOTAL DOCUMENTS

1335
(FIVE YEARS 300)

H-INDEX

45
(FIVE YEARS 5)

2022 ◽  
Vol 205 ◽  
pp. 107734
Author(s):  
Rodrigo T. Caropreso ◽  
Ricardo A.S. Fernandes ◽  
Ivan N. Silva

Author(s):  
Vanya Ivanova ◽  
Tasho Tashev ◽  
Ivo Draganov

In this paper an optimized feedforward neural network model is proposed for detection of IoT based DDoS attacks by network traffic analysis aimed towards a specific target which could be constantly monitored by a tap. The proposed model is applicable for DoS and DDoS attacks which consist of TCP, UDP and HTTP flood and also against keylogging, data exfiltration, OS fingerprint and service scan activities. It simply differentiates such kind of network traffic from normal network flows. The neural network uses Adam optimization as a solver and the hyperbolic tangent activation function in all neurons from a single hidden layer. The number of hidden neurons could be varied, depending on targeted accuracy and processing speed. Testing over the Bot IoT dataset reveals that developed models are applicable using 8 or 10 features and achieved discrimination error of 4.91.10-3%.


2022 ◽  
Vol 40 (3) ◽  
pp. 865-879
Author(s):  
Vasaki Ponnusamy ◽  
Aun Yichiet ◽  
NZ Jhanjhi ◽  
Mamoona humayun ◽  
Maram Fahhad Almufareh

2022 ◽  
Vol 70 (2) ◽  
pp. 2679-2698
Author(s):  
Rahmat Budiarto ◽  
Ahmad A. Alqarni ◽  
Mohammed Y. Alzahrani ◽  
Muhammad Fermi Pasha ◽  
Mohamed Fazil Mohamed Firdhous ◽  
...  

2022 ◽  
pp. 108760
Author(s):  
Chonghua Wang ◽  
Hao Zhou ◽  
Zhiqiang Hao ◽  
Shu Hu ◽  
Jun Li ◽  
...  

2021 ◽  
Vol 12 (1) ◽  
pp. 155
Author(s):  
Chaeyeon Oh ◽  
Joonseo Ha ◽  
Heejun Roh

Recently, a majority of security operations centers (SOCs) have been facing a critical issue of increased adoption of transport layer security (TLS) encryption on the Internet, in network traffic analysis (NTA). To this end, in this survey article, we present existing research on NTA and related areas, primarily focusing on TLS-encrypted traffic to detect and classify malicious traffic with deployment scenarios for SOCs. Security experts in SOCs and researchers in academia can obtain useful information from our survey, as the main focus of our survey is NTA methods applicable to malware detection and family classification. Especially, we have discussed pros and cons of three main deployment models for encrypted NTA: TLS interception, inspection using cryptographic functions, and passive inspection without decryption. In addition, we have discussed the state-of-the-art methods in TLS-encrypted NTA for each component of a machine learning pipeline, typically used in the state-of-the-art methods.


2021 ◽  
Vol 12 (1) ◽  
pp. 137
Author(s):  
Francesco Buccafurri ◽  
Vincenzo De Angelis ◽  
Maria Francesca Idone ◽  
Cecilia Labrini ◽  
Sara Lazzaro

Tor is the de facto standard used for anonymous communication over the Internet. Despite its wide usage, Tor does not guarantee sender anonymity, even in a threat model in which the attacker passively observes the traffic at the first Tor router. In a more severe threat model, in which the adversary can perform traffic analysis on the first and last Tor routers, relationship anonymity is also broken. In this paper, we propose a new protocol extending Tor to achieve sender anonymity (and then relationship anonymity) in the most severe threat model, allowing a global passive adversary to monitor all of the traffic in the network. We compare our proposal with Tor through the lens of security in an incremental threat model. The experimental validation shows that the price we have to pay in terms of network performance is tolerable.


Sign in / Sign up

Export Citation Format

Share Document