Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2015
DOI: 10.1007/978-3-319-25645-0_11
|View full text |Cite
|
Sign up to set email alerts
|

Indicators of Malicious SSL Connections

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 11 publications
0
6
0
Order By: Relevance
“…Many approaches were proposed to overcome the usage of non-standard port with HTTPS, ranging from behaviour based method to machine learning ones as described below. In spite of that, port 443 is widely used in the large body of literature [5], [10], [16], [29]- [33] to collect and build HTTPS dataset for further experiments.…”
Section: A Port-based Methodsmentioning
confidence: 99%
See 3 more Smart Citations
“…Many approaches were proposed to overcome the usage of non-standard port with HTTPS, ranging from behaviour based method to machine learning ones as described below. In spite of that, port 443 is widely used in the large body of literature [5], [10], [16], [29]- [33] to collect and build HTTPS dataset for further experiments.…”
Section: A Port-based Methodsmentioning
confidence: 99%
“…Based on their experiments, they can classify 95% of TLS traffic belonging to Google, Facebook and Kakaotalk with about 90% accuracy for the corresponding services. Authors in [10] use the information in SSL certificate like certificate validity, release dates and the content of subject alternative name as features to detect suspicious TLS traffic.…”
Section: Ssl Certificate Based Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…A group of indicators of malicious connections for SSL was proposed by Riccardo Bortolameotti et al [45], which utilized unencrypted part of SSL. With the help of these indicators, authors found various malicious connections and vulnerable SSL connections to Man-inthe-Middle attacks (MITM).…”
Section: Botnetmentioning
confidence: 99%