Machine learning (ML) is promising in accurately detecting malicious flows in encrypted network traffic; however, it is challenging to collect a training dataset that contains a sufficient amount of encrypted malicious data with correct labels. When ML models are trained with low-quality training data, they suffer degraded performance. In this paper, we aim at addressing a real-world low-quality training dataset problem, namely, detecting encrypted malicious traffic generated by continuously evolving malware. We develop RAPIER that fully utilizes different distributions of normal and malicious traffic data in the feature space, where normal data is tightly distributed in a certain area and the malicious data is scattered over the entire fea...
The number of malware attempts that try to bypass the existing Network Intrusion Detection System (N...
Abstract New and unseen polymorphic malware, zero-day attacks, or other types of advanced persistent...
In this paper, we introduce novel techniques that enhance the training phase of Anomaly Detection (A...
As people's demand for personal privacy and data security becomes a priority, encrypted traffic has ...
Recently, the amount of encrypted malicious network traffic masquerading as normal traffic of data h...
Abstract Traditional network intrusion detection methods lack the ability of automatic feature extra...
AbstractThe primary intent of this paper is detect malicious traffic at the network level. To this e...
With the increasing prevalence of encrypted network traffic, cyber security analysts have been turni...
Traffic classification plays the significant role in the network security and management. However, a...
The rapid network technology growth causing various network problems, attacks are becoming more soph...
Anomaly Detection (AD) sensors have become an invaluable tool for forensic analysis and intrusion de...
The rapid network technology growth causing various network problems, attacks are becoming more soph...
Many approaches have been proposed so far to tackle computer network security. Among them, several s...
The problem of detecting malicious behavior in network traffic has become an extremely difficult cha...
Statistics reveal a huge increase in cyberattacks making technology businesses more susceptible to d...
The number of malware attempts that try to bypass the existing Network Intrusion Detection System (N...
Abstract New and unseen polymorphic malware, zero-day attacks, or other types of advanced persistent...
In this paper, we introduce novel techniques that enhance the training phase of Anomaly Detection (A...
As people's demand for personal privacy and data security becomes a priority, encrypted traffic has ...
Recently, the amount of encrypted malicious network traffic masquerading as normal traffic of data h...
Abstract Traditional network intrusion detection methods lack the ability of automatic feature extra...
AbstractThe primary intent of this paper is detect malicious traffic at the network level. To this e...
With the increasing prevalence of encrypted network traffic, cyber security analysts have been turni...
Traffic classification plays the significant role in the network security and management. However, a...
The rapid network technology growth causing various network problems, attacks are becoming more soph...
Anomaly Detection (AD) sensors have become an invaluable tool for forensic analysis and intrusion de...
The rapid network technology growth causing various network problems, attacks are becoming more soph...
Many approaches have been proposed so far to tackle computer network security. Among them, several s...
The problem of detecting malicious behavior in network traffic has become an extremely difficult cha...
Statistics reveal a huge increase in cyberattacks making technology businesses more susceptible to d...
The number of malware attempts that try to bypass the existing Network Intrusion Detection System (N...
Abstract New and unseen polymorphic malware, zero-day attacks, or other types of advanced persistent...
In this paper, we introduce novel techniques that enhance the training phase of Anomaly Detection (A...