Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Advanced Feature Selection Techniques for Machine Learning-Based Detection of Encrypted Malicious Traffic

View through CrossRef
The increasing prevalence of encrypted traffic in modern networks presents significant challenges in detecting malicious activities, necessitating advanced techniques for effective security monitoring. This book chapter explores the integration of machine learning (ML) for encrypted malicious traffic detection, focusing on innovative feature selection methods. It delves into various techniques, including filter, wrapper, and embedded methods, evaluating their strengths, limitations, and application in network security. The chapter emphasizes the importance of feature extraction, representation, and selection in improving the accuracy of machine learning models while handling encrypted data. It discusses the unique challenges posed by encrypted traffic and how ML models, particularly supervised and unsupervised learning approaches, can address these issues. By comparing traditional detection methods with machine learning-driven solutions, this work highlights the potential of ML to enhance security measures in encrypted environments. The findings provide a roadmap for future research in the field of network traffic analysis and cybersecurity.
Title: Advanced Feature Selection Techniques for Machine Learning-Based Detection of Encrypted Malicious Traffic
Description:
The increasing prevalence of encrypted traffic in modern networks presents significant challenges in detecting malicious activities, necessitating advanced techniques for effective security monitoring.
This book chapter explores the integration of machine learning (ML) for encrypted malicious traffic detection, focusing on innovative feature selection methods.
It delves into various techniques, including filter, wrapper, and embedded methods, evaluating their strengths, limitations, and application in network security.
The chapter emphasizes the importance of feature extraction, representation, and selection in improving the accuracy of machine learning models while handling encrypted data.
It discusses the unique challenges posed by encrypted traffic and how ML models, particularly supervised and unsupervised learning approaches, can address these issues.
By comparing traditional detection methods with machine learning-driven solutions, this work highlights the potential of ML to enhance security measures in encrypted environments.
The findings provide a roadmap for future research in the field of network traffic analysis and cybersecurity.

Related Results

Design of Malicious Code Detection System Based on Binary Code Slicing
Design of Malicious Code Detection System Based on Binary Code Slicing
<p>Malicious code threatens the safety of computer systems. Researching malicious code design techniques and mastering code behavior patterns are the basic work of network se...
Selection of Injectable Drug Product Composition using Machine Learning Models (Preprint)
Selection of Injectable Drug Product Composition using Machine Learning Models (Preprint)
BACKGROUND As of July 2020, a Web of Science search of “machine learning (ML)” nested within the search of “pharmacokinetics or pharmacodynamics” yielded over 100...
Enhanced Encrypted Traffic Analysis Leveraging Graph Neural Networks and Optimized Feature Dimensionality Reduction
Enhanced Encrypted Traffic Analysis Leveraging Graph Neural Networks and Optimized Feature Dimensionality Reduction
With the continuously growing requirement for encryption in network environments, web browsers are increasingly employing hypertext transfer protocol security. Despite the increase...
TYPES OF AI ALGORİTHMS USED İN TRAFFİC FLOW PREDİCTİON
TYPES OF AI ALGORİTHMS USED İN TRAFFİC FLOW PREDİCTİON
The increasing complexity of urban transportation systems and the growing volume of vehicles have made traffic congestion a persistent challenge in modern cities. Efficient traffic...
Construction of a Cybersecurity Behavior Knowledge Base for Malicious Behavior Analysis
Construction of a Cybersecurity Behavior Knowledge Base for Malicious Behavior Analysis
Facing the surge in malicious behaviors in the network environment, the existing cybersecurity knowledge graph suffers from fragmented security knowledge and limited application sc...
Machine Learning-Based Model for Identification of Malicious Encrypted Files
Machine Learning-Based Model for Identification of Malicious Encrypted Files
The widespread use of encryption to protect digital data and communication has posed new challenges for cybersecurity, as attackers increasingly exploit encrypted files to hide mal...
Mates: Drift-Adaptive Cobalt Strike Encrypted Traffic Detection Based on Multi-Space Feature Modeling and Fusion
Mates: Drift-Adaptive Cobalt Strike Encrypted Traffic Detection Based on Multi-Space Feature Modeling and Fusion
Cobalt Strike (CS) attacks using encrypted HTTPS channels have become the primary type of ransomware and advanced persistent threat attacks. The detection of malicious CS traffic i...
Optimising tool wear and workpiece condition monitoring via cyber-physical systems for smart manufacturing
Optimising tool wear and workpiece condition monitoring via cyber-physical systems for smart manufacturing
Smart manufacturing has been developed since the introduction of Industry 4.0. It consists of resource sharing and networking, predictive engineering, and material and data analyti...

Back to Top