2022 IEEE Conference on Dependable and Secure Computing (DSC) 2022
DOI: 10.1109/dsc54232.2022.9888942
|View full text |Cite
|
Sign up to set email alerts
|

Network Intrusion Detection in Encrypted Traffic

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 31 publications
0
1
0
Order By: Relevance
“…Machine learning is widely used to test the feasibility of encrypted traffic analysis, using network packet metadata and not payload contents [14], [15], [31]- [36]. Other works focus on real-time traffic inspection based on network metadata patterns [17], [37]- [39]. Other works that are able to process encrypted traffic perform searchable encryption, enabling middleboxes to gain insight from the exchanged traffic nature [40]- [42].…”
Section: B Tls Server Configurationsmentioning
confidence: 99%
“…Machine learning is widely used to test the feasibility of encrypted traffic analysis, using network packet metadata and not payload contents [14], [15], [31]- [36]. Other works focus on real-time traffic inspection based on network metadata patterns [17], [37]- [39]. Other works that are able to process encrypted traffic perform searchable encryption, enabling middleboxes to gain insight from the exchanged traffic nature [40]- [42].…”
Section: B Tls Server Configurationsmentioning
confidence: 99%