2020 IEEE 7th International Conference on Data Science and Advanced Analytics (DSAA) 2020
DOI: 10.1109/dsaa49011.2020.00061
|View full text |Cite
|
Sign up to set email alerts
|

Cross-Layer Profiling of Encrypted Network Data for Anomaly Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 32 publications
0
3
0
Order By: Relevance
“…Many authors have also proposed their novel feature creation approaches and grouping method to extract required features. Meghdouri et al [11] proposed a novel cross-layer feature representation of encrypted traffic under TLS and IPSec protocols. The authors defined three modes of extracting flows: Application flows, conversation flows, and End-point flows.…”
Section: Traffic Feature Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…Many authors have also proposed their novel feature creation approaches and grouping method to extract required features. Meghdouri et al [11] proposed a novel cross-layer feature representation of encrypted traffic under TLS and IPSec protocols. The authors defined three modes of extracting flows: Application flows, conversation flows, and End-point flows.…”
Section: Traffic Feature Analysismentioning
confidence: 99%
“…A novel cross-layer feature representation method under TLS and Internet Protocol Security (IPSec) protocols is proposed by Meghdouri et al [11] 7 different machine learning algorithms are selected from Stergiopoulos et al [12] to test the performance of their proposed Transmission Control Protocol (TCP) side channel features. 99.80% accuracy under the decision tree method is achieved under a composed dataset from CTU-13 [18], FIRST [20], and Milicenso [21].…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation