Proceedings of the 2nd International Conference on Information Systems Security and Privacy 2016
DOI: 10.5220/0005740704070414
|View full text |Cite
|
Sign up to set email alerts
|

Characterization of Encrypted and VPN Traffic using Time-related Features

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
327
2
5

Year Published

2017
2017
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 681 publications
(388 citation statements)
references
References 0 publications
0
327
2
5
Order By: Relevance
“…Scenario A: The dataset was created by A. Lashkari et al by merging Tor traffic dataset [7] and a public dataset of encrypted traffic generated by Draper-Gil et al [31] which included the same application on the same network. The Tor traffic dataset flows were labelled Tor and all flows from Draper et al [31] as nonTor.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Scenario A: The dataset was created by A. Lashkari et al by merging Tor traffic dataset [7] and a public dataset of encrypted traffic generated by Draper-Gil et al [31] which included the same application on the same network. The Tor traffic dataset flows were labelled Tor and all flows from Draper et al [31] as nonTor.…”
Section: Methodsmentioning
confidence: 99%
“…The Tor traffic dataset flows were labelled Tor and all flows from Draper et al [31] as nonTor. The experiment was performed by training ANN, ANN-CFS, SVM, SVM-CFS, NB and NB-CFS with UNB-CIC Tor and nonTor Network Traffic dataset to detect nonTor Traffic in a Tor network.…”
Section: Methodsmentioning
confidence: 99%
“…This system style has been created absolutely supported the construct of project, this framework will tell you overall work of the net website or project , it describes the full income and outcome of project and the whole methodology of the projects beside, buying product, adding products to cart, payments , delivery of products and put together the chat happen between the client and businessperson [1]. Register login, display roduct, uploading product, Payment gateway payment success error user vendor UN success add to cart amount owing to businessperson requesting for chat [2].…”
Section: System Architecturementioning
confidence: 99%
“…The time-related feature VPN/non-VPN data set used in this work is based on the data sets from the ISCX Research Center of University of New Brunswick, Canada [12]. In this paper, the multi-label classification models were trained to classify network traffic flows into seven application categories including browsing, chat, file transfer, email, peer-topeer, media streaming and voice over IP.…”
Section: Data Setsmentioning
confidence: 99%