Detecting malicious encrypted traffic with privacy set intersection in cloud-assisted industrial internet.
JingYu FengJing ZhangWenbo ZhangGang HanPublished in: J. Inf. Secur. Appl. (2024)
Keyphrases
- set intersection
- end hosts
- detecting malicious
- internet traffic
- network security
- cloud computing
- privacy preserving
- network traffic
- detect malicious
- ip address
- global consistency
- constraint networks
- security mechanisms
- security issues
- information systems
- traffic analysis
- ip addresses
- traffic flow
- constraint satisfaction
- distributed systems
- web pages