• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
搜索

Author:

Chao, Daichong (Chao, Daichong.)

Indexed by:

EI Scopus

Abstract:

Malicious encrypted traffic poses great threat to cyber security owing to encryption and the ability to bypass traditional traffic detection schemes. Malicious encrypted traffic identification is a challenging task and has attracted researchers' attention nowadays. Existing research way mainly extracts various statistical features of data-flow, which relies artificial experience heavily. To round the above problem. a fingerprint enhancement and second-order Markov chain based scheme is proposed in this paper, obtaining features more easily. Fingerprint enhancement is done to replace SSL fingerprint by refining data-flow's behavior. Then enhanced fingerprint is fed to second-order Markov chain to obtain dominating feature for identification model. To our best knowledge, this paper is the first one focusing on using fingerprint and second order Markov chain to simplify feature extraction. Finally, the proposed scheme is verified based on public dataset Stratosphere IPS. © 2020 ACM.

Keyword:

Data mining Security of data Data transfer Artificial intelligence Cryptography Palmprint recognition Markov chains

Author Community:

  • [ 1 ] [Chao, Daichong]Beijing University of Technology, Beijing, China

Reprint Author's Address:

  • [chao, daichong]beijing university of technology, beijing, china

Show more details

Related Keywords:

Related Article:

Source :

Year: 2020

Page: 328-333

Language: English

Cited Count:

WoS CC Cited Count: 1

SCOPUS Cited Count: 6

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 9

Affiliated Colleges:

Online/Total:352/10642710
Address:BJUT Library(100 Pingleyuan,Chaoyang District,Beijing 100124, China Post Code:100124) Contact Us:010-67392185
Copyright:BJUT Library Technical Support:Beijing Aegean Software Co., Ltd.