Man-in-the-Middle Attacks to Detect and Identify Services in Encrypted Network Flows using Machine Learning.
Abdulrahman Al-HababiSezer Can TokgozPublished in: CommNet (2020)
Keyphrases
- network flow
- machine learning
- minimum cost
- service providers
- web services
- service oriented
- linear programming
- integer programming
- active learning
- optimization model
- security risks
- min cost
- network attacks
- context aware
- machine learning methods
- social networks
- detecting malicious
- data mining
- normal traffic
- watermarking scheme
- bipartite graph