2022
DOI: 10.1016/j.compeleceng.2021.107621
|View full text |Cite
|
Sign up to set email alerts
|

Encryption-agnostic classifiers of traffic originators and their application to anomaly detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 12 publications
0
6
0
Order By: Relevance
“…The traffic used to generate the dataset has been captured using WireShark 2.6.4 with the tshark command-line interface. The web browsing part of the traffic dataset has been generated by manually browsing the Internet, as reported in Section 4.1 of the main paper [1] .…”
Section: Experimental Design Materials and Methodsmentioning
confidence: 99%
See 4 more Smart Citations
“…The traffic used to generate the dataset has been captured using WireShark 2.6.4 with the tshark command-line interface. The web browsing part of the traffic dataset has been generated by manually browsing the Internet, as reported in Section 4.1 of the main paper [1] .…”
Section: Experimental Design Materials and Methodsmentioning
confidence: 99%
“…Multiple truncated versions of the filtered captures have been generated. As explained in Section 4.1 of the main paper [1] , by truncating the captures, it has been possible to benchmark our models on incomplete connections, to test their suitability for a live analysis scenario. For instance, Fig.…”
Section: Experimental Design Materials and Methodsmentioning
confidence: 99%
See 3 more Smart Citations