通信解析

AI/ML Based Detection and Categorization of Covert Communication in IPv6 Network

Authors: Mohammad Wali Ur Rahman, Yu-Zheng Lin, Carter Weeks, David Ruddell, Jeff Gabriellini, Bill Hayes, Salim Hariri, Edward V. Ziegler Jr | Published: 2025-01-18
IPv6セキュリティ
ネットワーク脅威検出
通信解析

Darknet Traffic Analysis A Systematic Literature Review

Authors: Javeriah Saleem, Rafiqul Islam, Zahidul Islam | Published: 2023-11-27
ダークネットトラフィック分析
機械学習手法
通信解析

Stepping out of Flatland: Discovering Behavior Patterns as Topological Structures in Cyber Hypergraphs

Authors: Helen Jenne, Sinan G. Aksoy, Daniel Best, Alyson Bittner, Gregory Henselman-Petrusek, Cliff Joslyn, Bill Kay, Audun Myers, Garret Seppala, Jackson Warley, Stephen J. Young, Emilie Purvine | Published: 2023-11-08
トポロジー解析
ハイパーグラフの特性
通信解析

Tweaking Metasploit to Evade Encrypted C2 Traffic Detection

Authors: Gonçalo Xavier, Carlos Novo, Ricardo Morla | Published: 2022-09-02
モデル性能評価
敵対的攻撃手法
通信解析

DeepTLS: comprehensive and high-performance feature extraction for encrypted traffic

Authors: Zhi Liu | Published: 2022-08-08
マルウェア検出手法
性能評価
通信解析

Applying Machine Learning on RSRP-based Features for False Base Station Detection

Authors: Prajwol Kumar Nakarmi, Jakob Sternby, Ikram Ullah | Published: 2022-07-22
モデル性能評価
検出手法の分析
通信解析

PORTFILER: Port-Level Network Profiling for Self-Propagating Malware Detection

Authors: Talha Ongun, Oliver Spohngellert, Benjamin Miller, Simona Boboila, Alina Oprea, Tina Eliassi-Rad, Jason Hiser, Alastair Nottingham, Jack Davidson, Malathi Veeraraghavan | Published: 2021-12-27 | Updated: 2022-05-24
特徴エンジニアリング
脆弱性分析
通信解析

Detecting Attacks on IoT Devices using Featureless 1D-CNN

Authors: Arshiya Khan, Chase Cotton | Published: 2021-09-09
マルウェア検出手法
機械学習
通信解析

Realtime Robust Malicious Traffic Detection via Frequency Domain Analysis

Authors: Chuanpu Fu, Qi Li, Meng Shen, Ke Xu | Published: 2021-06-28 | Updated: 2021-09-16
特徴抽出手法
異常検出手法
通信解析

AirMixML: Over-the-Air Data Mixup for Inherently Privacy-Preserving Edge Machine Learning

Authors: Yusuke Koda, Jihong Park, Mehdi Bennis, Praneeth Vepakomma, Ramesh Raskar | Published: 2021-05-02
データプライバシー評価
プライバシー保護
通信解析