Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Advanced Feature Selection Techniques for Machine Learning-Based Detection of Encrypted Malicious Traffic

View through CrossRef
The increasing prevalence of encrypted traffic in modern networks presents significant challenges in detecting malicious activities, necessitating advanced techniques for effective security monitoring. This book chapter explores the integration of machine learning (ML) for encrypted malicious traffic detection, focusing on innovative feature selection methods. It delves into various techniques, including filter, wrapper, and embedded methods, evaluating their strengths, limitations, and application in network security. The chapter emphasizes the importance of feature extraction, representation, and selection in improving the accuracy of machine learning models while handling encrypted data. It discusses the unique challenges posed by encrypted traffic and how ML models, particularly supervised and unsupervised learning approaches, can address these issues. By comparing traditional detection methods with machine learning-driven solutions, this work highlights the potential of ML to enhance security measures in encrypted environments. The findings provide a roadmap for future research in the field of network traffic analysis and cybersecurity.
Title: Advanced Feature Selection Techniques for Machine Learning-Based Detection of Encrypted Malicious Traffic
Description:
The increasing prevalence of encrypted traffic in modern networks presents significant challenges in detecting malicious activities, necessitating advanced techniques for effective security monitoring.
This book chapter explores the integration of machine learning (ML) for encrypted malicious traffic detection, focusing on innovative feature selection methods.
It delves into various techniques, including filter, wrapper, and embedded methods, evaluating their strengths, limitations, and application in network security.
The chapter emphasizes the importance of feature extraction, representation, and selection in improving the accuracy of machine learning models while handling encrypted data.
It discusses the unique challenges posed by encrypted traffic and how ML models, particularly supervised and unsupervised learning approaches, can address these issues.
By comparing traditional detection methods with machine learning-driven solutions, this work highlights the potential of ML to enhance security measures in encrypted environments.
The findings provide a roadmap for future research in the field of network traffic analysis and cybersecurity.

Related Results

Design of Malicious Code Detection System Based on Binary Code Slicing
Design of Malicious Code Detection System Based on Binary Code Slicing
<p>Malicious code threatens the safety of computer systems. Researching malicious code design techniques and mastering code behavior patterns are the basic work of network se...
TYPES OF AI ALGORİTHMS USED İN TRAFFİC FLOW PREDİCTİON
TYPES OF AI ALGORİTHMS USED İN TRAFFİC FLOW PREDİCTİON
The increasing complexity of urban transportation systems and the growing volume of vehicles have made traffic congestion a persistent challenge in modern cities. Efficient traffic...
Construction of a Cybersecurity Behavior Knowledge Base for Malicious Behavior Analysis
Construction of a Cybersecurity Behavior Knowledge Base for Malicious Behavior Analysis
Facing the surge in malicious behaviors in the network environment, the existing cybersecurity knowledge graph suffers from fragmented security knowledge and limited application sc...
Optimising tool wear and workpiece condition monitoring via cyber-physical systems for smart manufacturing
Optimising tool wear and workpiece condition monitoring via cyber-physical systems for smart manufacturing
Smart manufacturing has been developed since the introduction of Industry 4.0. It consists of resource sharing and networking, predictive engineering, and material and data analyti...
Localisation of Attacks, Combating Browser-Based Geo-Information and IP Tracking Attacks
Localisation of Attacks, Combating Browser-Based Geo-Information and IP Tracking Attacks
<p>Accessing and retrieving users’ browser and network information is a common practice used by advertisers and many online services to deliver targeted ads and explicit impr...
Traffic Prediction in 5G Networks Using Machine Learning
Traffic Prediction in 5G Networks Using Machine Learning
The advent of 5G technology promises a paradigm shift in the realm of telecommunications, offering unprecedented speeds and connectivity. However, the ...
Poems
Poems
poems selection poems selection poems selection poems selection poems selection poems selection poems selection poems selection poems selection poems selection poems selection poem...
Learning-Based Detection for Malicious Android Application Using Code Vectorization
Learning-Based Detection for Malicious Android Application Using Code Vectorization
The malicious APK (Android Application Package) makers use some techniques such as code obfuscation and code encryption to avoid existing detection methods, which poses new challen...

Back to Top