Login / Signup
Flow-based Detection and Proxy-based Evasion of Encrypted Malware C2 Traffic.
Carlos Novo
Ricardo Morla
Published in:
AISec@CCS (2020)
Keyphrases
</>
malware detection
real time
detection rate
detection method
false alarms
object detection
anomaly detection
origin destination
false positives
automatic detection
detection accuracy
image sequences
road network
countermeasures
flow patterns