With the increasing prevalence of encrypted network traffic, cyber security analysts have been turning to machine learning (ML) techniques to elucidate the traffic on their networks. However, ML models can become stale as known traffic features can shift between networks and as new traffic emerges that is outside of the distribution of the training set. In order to reliably adapt in this dynamic environment, ML models must additionally provide contextualized uncertainty quantification to their predictions, which has received little attention in the cyber security domain. Uncertainty quantification is necessary both to signal when the model is uncertain about which class to choose in its label assignment and when the traffic is not likely to...
Ahstract-This work evaluates three methods for encrypted traffic analysis without using the IP addre...
The landscape of network analysis is ever-evolving as the fields of technology and business progress...
Deep learning models have shown to achieve high performance in encrypted traffic classification. How...
The research project aims to find ways to detect malicious packets inside encrypted network traffic....
This research examines the use of machine-learning techniques to identify malicious traffic in an em...
honors thesisCollege of EngineeringComputingJeff M. PhillipsNetwork traffic classification that is g...
Machine learning (ML) has demonstrated great potential to revolutionize the networking field. In thi...
The problem of detecting malicious behavior in network traffic has become an extremely difficult cha...
As people's demand for personal privacy and data security becomes a priority, encrypted traffic has ...
International audienceTraffic analysis is a compound of strategies intended to find relationships, p...
Abstract Computer networks target several kinds of attacks every hour and day; they evolved to make ...
Abstract: In this paper we examine and evaluate different ways of classifying encrypted network tra...
In this research we compare different methods to examine network packets using supervised learning t...
International audienceNetwork management often relies on machine learning to make predictions about ...
The number of alleged crimes in computer networks had not increased until a few years ago. Real-time...
Ahstract-This work evaluates three methods for encrypted traffic analysis without using the IP addre...
The landscape of network analysis is ever-evolving as the fields of technology and business progress...
Deep learning models have shown to achieve high performance in encrypted traffic classification. How...
The research project aims to find ways to detect malicious packets inside encrypted network traffic....
This research examines the use of machine-learning techniques to identify malicious traffic in an em...
honors thesisCollege of EngineeringComputingJeff M. PhillipsNetwork traffic classification that is g...
Machine learning (ML) has demonstrated great potential to revolutionize the networking field. In thi...
The problem of detecting malicious behavior in network traffic has become an extremely difficult cha...
As people's demand for personal privacy and data security becomes a priority, encrypted traffic has ...
International audienceTraffic analysis is a compound of strategies intended to find relationships, p...
Abstract Computer networks target several kinds of attacks every hour and day; they evolved to make ...
Abstract: In this paper we examine and evaluate different ways of classifying encrypted network tra...
In this research we compare different methods to examine network packets using supervised learning t...
International audienceNetwork management often relies on machine learning to make predictions about ...
The number of alleged crimes in computer networks had not increased until a few years ago. Real-time...
Ahstract-This work evaluates three methods for encrypted traffic analysis without using the IP addre...
The landscape of network analysis is ever-evolving as the fields of technology and business progress...
Deep learning models have shown to achieve high performance in encrypted traffic classification. How...