Confirmation method for the detection of malicious encrypted traffic with data privacy protection
In order to solve the problem that excessive false positives in the detection of encrypted malicious traffic based on machine learning, secure two-party computation was used to compare character segments between network traffic and intrusion detection rulers without revealing the data content.Based...
Saved in:
Main Authors: | Gaofeng HE, Qianfeng WEI, Xiancai XIAO, Haiting ZHU, Bingfeng XU |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2022-02-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2022034/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Survey of encrypted malicious traffic detection based on deep learning
by: Mingfang ZHAI, et al.
Published: (2020-06-01) -
Escape method of malicious traffic based on backdoor attack
by: MA Bowen, et al.
Published: (2024-04-01) -
Model of the malicious traffic classification based on hypergraph neural network
by: Wenbo ZHAO, et al.
Published: (2023-10-01) -
Study on privacy preserving encrypted traffic detection
by: Xinyu ZHANG, et al.
Published: (2021-08-01) -
Multitier ensemble classifiers for malicious network traffic detection
by: Jie WANG, et al.
Published: (2018-10-01)