IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) 2020
DOI: 10.1109/infocomwkshps50562.2020.9162940
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Anomalies in Encrypted Traffic via Deep Dictionary Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(8 citation statements)
references
References 18 publications
0
8
0
Order By: Relevance
“…Packet statistics [28] Payload statistics [6] Flow level statistics [36] Automatic Feature Extraction Packet header [25], [34] ✓ Packet interval [44], [32] OADSD feature extraction adaptable to the environment.…”
Section: Domain Expert Featuresmentioning
confidence: 99%
See 2 more Smart Citations
“…Packet statistics [28] Payload statistics [6] Flow level statistics [36] Automatic Feature Extraction Packet header [25], [34] ✓ Packet interval [44], [32] OADSD feature extraction adaptable to the environment.…”
Section: Domain Expert Featuresmentioning
confidence: 99%
“…Malicious traffic detection. Online Traffic Anomaly Detection methods have been widely investigated [28], [30], [31], [2], [44]. Online Traffic Anomaly Detection methods are widely investigated [28], [30], [31], [2], [44].…”
Section: Testbed Evaluationmentioning
confidence: 99%
See 1 more Smart Citation
“…The authors conducted comparative experiments with KNN and other existing works which used the VPN non-VPN [55] and CICIDS 2012 [54] datasets to demonstrate that the proposed DFR is more accurate and robust. Xing et al [10] proposed an online detection model based on deep dictionary learning, D2LAD, to address the noisy data label, long training time and high traffic data distribution variance. The model can learn and extract sequential features from raw traffic data input based on a pre-trained LSTM auto-encoder.…”
Section: E Algorithms Selectionmentioning
confidence: 99%
“…For example, crypto-mining attacks can be traced by monitoring the abnormal CPU usage (in normal PC) in the resource usage logs or a massive number of communications with other peer networks. Moreover, given the popularity of secure networks and webs (e.g., using HTTPS), it is a challenge to analyze the encrypted traffic payloads [17].…”
mentioning
confidence: 99%