Confirmation method for the detection of malicious encrypted traffic with data privacy protection

In order to solve the problem that excessive false positives in the detection of encrypted malicious traffic based on machine learning, secure two-party computation was used to compare character segments between network traffic and intrusion detection rulers without revealing the data content.Based...

Full description

Saved in:
Bibliographic Details
Main Authors: Gaofeng HE, Qianfeng WEI, Xiancai XIAO, Haiting ZHU, Bingfeng XU
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2022-02-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2022034/
Tags: Add Tag
No Tags, Be the first to tag this record!