2021
DOI: 10.3390/app12010155
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on TLS-Encrypted Malware Network Traffic Analysis Applicable to Security Operations Centers

Abstract: Recently, a majority of security operations centers (SOCs) have been facing a critical issue of increased adoption of transport layer security (TLS) encryption on the Internet, in network traffic analysis (NTA). To this end, in this survey article, we present existing research on NTA and related areas, primarily focusing on TLS-encrypted traffic to detect and classify malicious traffic with deployment scenarios for SOCs. Security experts in SOCs and researchers in academia can obtain useful information from ou… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 84 publications
0
2
0
Order By: Relevance
“…The results demonstrate that bagging got better scores when compared to other meta-learners in terms of accuracy and false positives, whereas other metalearners yielded scores equivalent to non-meta algorithms, with no discernible enhancements. Several surveys have been conducted to summarize ML and DL approaches for NTA [76,91,92,93].…”
Section: A Network Traffic Analysismentioning
confidence: 99%
“…The results demonstrate that bagging got better scores when compared to other meta-learners in terms of accuracy and false positives, whereas other metalearners yielded scores equivalent to non-meta algorithms, with no discernible enhancements. Several surveys have been conducted to summarize ML and DL approaches for NTA [76,91,92,93].…”
Section: A Network Traffic Analysismentioning
confidence: 99%
“…On the other hand, anomaly-based detection analyzes network traffic and identifies abnormal patterns or behavior that deviates from regular network activity [12], [15]. This approach is more effective in detecting unknown attacks, as it does not rely on specific attack www.ijacsa.thesai.org signatures but instead focuses on identifying anomalous behavior [16]. Intrusion detection and prevention system (IDPS) is vital to cybersecurity measures.…”
Section: Introductionmentioning
confidence: 99%
“…Many machine learning and deep learning models are implemented in this study. Such studies include traffic classification [34], encrypted traffic analysis [33], and malicious traffic detection [32].…”
Section: Introductionmentioning
confidence: 99%