2022
DOI: 10.21203/rs.3.rs-2213345/v1
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Encrypted Malware Detection Methodology without Decryption using Deep Learning based Approaches

Abstract: The proportion of encrypted web traffic is rapidly increasing. The widespread use of encrypted traffic on the Internet provides safe and secure communication between users and servers. However, cybercriminals are also employing encrypted traffic to conceal their malicious activities. Malware detection in encrypted traffic is an arduous task for security professionals due to the complex nature of encrypted traffic on the web. Traditional approaches need to decrypt the content of network traffic, check it for th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 30 publications
0
0
0
Order By: Relevance
“…The concept of network segmentation gained traction as a means to limit lateral movement within networks, a technique found particularly effective in large-scale enterprise environments, while encryption protocols, such as SSL/TLS, were widely adopted for securing data transmission, marking a shift towards data-centric security models [16,19,21]. With the advent of cloud computing, researchers explored security implications unique to cloud environments, leading to the development of specialized cloud security solutions [22,23]. The principle of least privilege was rigorously applied in access control models, significantly reducing the risk of unauthorized access to critical systems [2,21,24].…”
Section: Network Security Techniquesmentioning
confidence: 99%
“…The concept of network segmentation gained traction as a means to limit lateral movement within networks, a technique found particularly effective in large-scale enterprise environments, while encryption protocols, such as SSL/TLS, were widely adopted for securing data transmission, marking a shift towards data-centric security models [16,19,21]. With the advent of cloud computing, researchers explored security implications unique to cloud environments, leading to the development of specialized cloud security solutions [22,23]. The principle of least privilege was rigorously applied in access control models, significantly reducing the risk of unauthorized access to critical systems [2,21,24].…”
Section: Network Security Techniquesmentioning
confidence: 99%