Abstract Traditional network intrusion detection methods lack the ability of automatic feature extraction for encrypted network malicious traffic, and thus, the detection rates are low. Moreover, the means of this malicious traffic are concealed, and the key malicious features are usually hidden in many normal data packets, so fewer encrypted malicious traffic samples can be captured. This easily leads to insufficient system training, low detection rate, and high false alarm rate. This letter proposes an encrypted network malicious traffic detection model based on deep learning, in which automatic feature extraction is performed against encrypted network malicious traffic. The proposed model has self‐learning and self‐adaption abilities. Fu...
The ever-evolving cybersecurity environment has given rise to sophisticated adversaries who constant...
The growing trend of encrypted network traffic is changing the cybersecurity threat scene. Most cri...
Intrusion detection and prevention are two of the most important issues to solve in network security...
Recently, the amount of encrypted malicious network traffic masquerading as normal traffic of data h...
The detection of malicious encrypted traffic is an important part of modern network security researc...
At present situation network communication is at high risk for external and internal attacks due to ...
Nowadays, the small-medium enterprises security against cyber-attacks is a matter of great importanc...
As people's demand for personal privacy and data security becomes a priority, encrypted traffic has ...
As the sophistication of cyber malicious attacks increase, so too must the techniques used to detect...
Since the last decade of the 20th century, the Internet had become flourishing, which drew great int...
Anomaly-based Intrusion Detection is a key research topic in network security due to its ability to ...
Tor, originally known as The Onion Router, is a free software that allows users to communicate anony...
Application of deep learning to enhance the accuracy of intrusion detection in modern computer netwo...
Nowadays attacks on computer networks continue to advance at a rate outpacing cyber defenders’ abili...
With the increase of Internet visits and connections, it is becoming essential and arduous to protec...
The ever-evolving cybersecurity environment has given rise to sophisticated adversaries who constant...
The growing trend of encrypted network traffic is changing the cybersecurity threat scene. Most cri...
Intrusion detection and prevention are two of the most important issues to solve in network security...
Recently, the amount of encrypted malicious network traffic masquerading as normal traffic of data h...
The detection of malicious encrypted traffic is an important part of modern network security researc...
At present situation network communication is at high risk for external and internal attacks due to ...
Nowadays, the small-medium enterprises security against cyber-attacks is a matter of great importanc...
As people's demand for personal privacy and data security becomes a priority, encrypted traffic has ...
As the sophistication of cyber malicious attacks increase, so too must the techniques used to detect...
Since the last decade of the 20th century, the Internet had become flourishing, which drew great int...
Anomaly-based Intrusion Detection is a key research topic in network security due to its ability to ...
Tor, originally known as The Onion Router, is a free software that allows users to communicate anony...
Application of deep learning to enhance the accuracy of intrusion detection in modern computer netwo...
Nowadays attacks on computer networks continue to advance at a rate outpacing cyber defenders’ abili...
With the increase of Internet visits and connections, it is becoming essential and arduous to protec...
The ever-evolving cybersecurity environment has given rise to sophisticated adversaries who constant...
The growing trend of encrypted network traffic is changing the cybersecurity threat scene. Most cri...
Intrusion detection and prevention are two of the most important issues to solve in network security...