Proceedings of the 2020 9th International Conference on Computing and Pattern Recognition 2020
DOI: 10.1145/3436369.3436479
|View full text |Cite
|
Sign up to set email alerts
|

A Mining Policy based Malicious Encrypted Traffic Detection Scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 7 publications
0
1
0
Order By: Relevance
“…Finally, packet-level features such as packet size distribution and details about the SSL handshake can be obtained from ssl.log. Features collected or extracted from traffic encrypted by Zeek IDS are used in various anomaly detection research [5,11,19,22,32,43,54].…”
Section: • Log Information-based Feature Extractionmentioning
confidence: 99%
“…Finally, packet-level features such as packet size distribution and details about the SSL handshake can be obtained from ssl.log. Features collected or extracted from traffic encrypted by Zeek IDS are used in various anomaly detection research [5,11,19,22,32,43,54].…”
Section: • Log Information-based Feature Extractionmentioning
confidence: 99%