2022
DOI: 10.1016/j.cose.2021.102542
|View full text |Cite
|
Sign up to set email alerts
|

Machine learning for encrypted malicious traffic detection: Approaches, datasets and comparative study

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
24
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 75 publications
(24 citation statements)
references
References 54 publications
0
24
0
Order By: Relevance
“…Traditionally, there are two types of features, i.e., packetlevel features and flow level features [43]. The packet-level features (e.g., payload size, packet size, and payload ratio) are often used to find application anomalies, but they are not effective in providing a clear distinction in values between malicious and legitimate traffic flows, which might affect the detection accuracy.…”
Section: Mpls/ Internetmentioning
confidence: 99%
See 2 more Smart Citations
“…Traditionally, there are two types of features, i.e., packetlevel features and flow level features [43]. The packet-level features (e.g., payload size, packet size, and payload ratio) are often used to find application anomalies, but they are not effective in providing a clear distinction in values between malicious and legitimate traffic flows, which might affect the detection accuracy.…”
Section: Mpls/ Internetmentioning
confidence: 99%
“…As a promising security method, machine learning based malicious traffic detection algorithms have been proposed as complements of the traditional fixed rule based methods [43], [10]. Table I shows a the comparison between the machine learning based anomaly detection methods and the rule based anomaly detection methods.…”
Section: B Motivationmentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, most researchers use binary classification of encrypted traffic, that is, to identify malicious traffic among legitimate traffic. Currently, flow-based machine learning and deep learning methods are the mainstream methods for encrypted traffic classification [6]. Shekhawat et al [3] proposed three machine learning techniques, Random Forest (RF), Support Vector Machine (SVM) and XGBoost to distinguish malicious encrypted traffic from benign encrypted traffic.…”
Section: Related Workmentioning
confidence: 99%
“…The mapping relationship is approximated by a specific optimization algorithm to achieve the purpose of predicting the desired result. Compared with the rule-based malicious traffic detection method, machine learning method can better extract the encrypted information, timing relationship and other complex features in network traffic [2]. However, most research related to deep learning implicitly assumes that there is a large amount of data with accurate labels, it's not feasible to obtain such data in the practical production environment for many organizations.…”
Section: Introductionmentioning
confidence: 99%