2020
DOI: 10.1007/s11227-020-03372-1
|View full text |Cite
|
Sign up to set email alerts
|

THS-IDPC: A three-stage hierarchical sampling method based on improved density peaks clustering algorithm for encrypted malicious traffic detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 26 publications
(15 citation statements)
references
References 21 publications
0
15
0
Order By: Relevance
“…Ma et al [32] proposed an enhanced KNN algorithm to train an encrypted traffic detection model, which enhances the KNN distance calculation. For unsupervised Learning, Chen et al [13] proposed an improved density peaks clustering algorithm to enhance the accuracy and efficiency of encrypted malicious traffic detection. Celik et al [17] compared the performance of K-means, one-class support vector machine (OCSVM), least squares anomaly detection (LSAD), and KNN algorithms by using tamper resistant features, such as Goodput and ratio between maximum packet over minimum packet.…”
Section: Preliminariesmentioning
confidence: 99%
See 3 more Smart Citations
“…Ma et al [32] proposed an enhanced KNN algorithm to train an encrypted traffic detection model, which enhances the KNN distance calculation. For unsupervised Learning, Chen et al [13] proposed an improved density peaks clustering algorithm to enhance the accuracy and efficiency of encrypted malicious traffic detection. Celik et al [17] compared the performance of K-means, one-class support vector machine (OCSVM), least squares anomaly detection (LSAD), and KNN algorithms by using tamper resistant features, such as Goodput and ratio between maximum packet over minimum packet.…”
Section: Preliminariesmentioning
confidence: 99%
“…Their experiments indicate that the small number of features can achieve similar accuracy as compared to other existing methods. Many research [13][20] [32] are designed to use machine selection on the optimal features chosen from a large set of extracted features without human intervention. On the other hand, [9][10] [37][44] [47] directly used raw data as the deep learning methods input.…”
Section: Feature Set Selectionmentioning
confidence: 99%
See 2 more Smart Citations
“…Traditionally, the ransomware can be detected to some extent with DPI (Deep Packet Inspection) [1], [2] and other methods. However, with the appearance of security protocol such as SSL or TLS, attacker begin to avoid detection with encryption technology [3]. Anomaly detection methods based on machine learning, such as KNN (K-nearest Neighbor), SVM (Support Vector Machine), Decision Trees, etc., can achieve encrypted traffic detection to a certain…”
Section: Introductionmentioning
confidence: 99%