Abstract: In this paper we examine and evaluate different ways of classifying encrypted network traffic using neural networks. For this purposes we create a dataset with a streaming/non-streaming focus. The dataset comprises seven different classes, five streaming and two non-streaming. The thesis serves as a preliminary proof-of-concept for Napatech A/S. The most desirable approach for Napatech is to classify individual packets upon arrival. Our experiments show that this approach is infeasible due to the content being encrypted and therefore without any distinguishable information. We therefore propose a novel approach where the unencrypted parts of network traffic, namely the headers are utilized. This is done by concatenating the initi...
The classification of malware traffic is a critical component of network intrusion detection systems...
With the increasing amount of computers in society, the need to test and evaluate security of these ...
With the increasing amount of computers in society, the need to test and evaluate security of these ...
With the rapid increase in encrypted traffic in the network environment and the increasing proportio...
The development of the Internet has led to the complexity of network encrypted traffic. Identifying ...
Network traffic classification has great significance for network security, network management and o...
The research project aims to find ways to detect malicious packets inside encrypted network traffic....
The research project aims to find ways to detect malicious packets inside encrypted network traffic....
Recent years have shown an unprecedented reliance on the internet to provide services essential for ...
International audienceInternet traffic recognition is an essential tool for access providers since r...
International audienceInternet traffic recognition is an essential tool for access providers since r...
The classification of malware traffic is a critical component of network intrusion detection systems...
© 2018 IEEE. We develop a novel time series feature extraction technique to address the encrypted tr...
Deep learning models have shown to achieve high performance in encrypted traffic classification. How...
As the sophistication of cyber malicious attacks increase, so too must the techniques used to detect...
The classification of malware traffic is a critical component of network intrusion detection systems...
With the increasing amount of computers in society, the need to test and evaluate security of these ...
With the increasing amount of computers in society, the need to test and evaluate security of these ...
With the rapid increase in encrypted traffic in the network environment and the increasing proportio...
The development of the Internet has led to the complexity of network encrypted traffic. Identifying ...
Network traffic classification has great significance for network security, network management and o...
The research project aims to find ways to detect malicious packets inside encrypted network traffic....
The research project aims to find ways to detect malicious packets inside encrypted network traffic....
Recent years have shown an unprecedented reliance on the internet to provide services essential for ...
International audienceInternet traffic recognition is an essential tool for access providers since r...
International audienceInternet traffic recognition is an essential tool for access providers since r...
The classification of malware traffic is a critical component of network intrusion detection systems...
© 2018 IEEE. We develop a novel time series feature extraction technique to address the encrypted tr...
Deep learning models have shown to achieve high performance in encrypted traffic classification. How...
As the sophistication of cyber malicious attacks increase, so too must the techniques used to detect...
The classification of malware traffic is a critical component of network intrusion detection systems...
With the increasing amount of computers in society, the need to test and evaluate security of these ...
With the increasing amount of computers in society, the need to test and evaluate security of these ...