Using Features of Encrypted Network Traffic to Detect Malware.
Zeeshan AfzalAnna BrunströmStefan LindskogPublished in: NordSec (2020)
Keyphrases
- network traffic
- detecting anomalous
- anomaly detection
- malicious code
- intrusion detection
- normal traffic
- network security
- network management
- malware detection
- traffic analysis
- computer networks
- traffic data
- feature extraction
- traffic volume
- detect anomalies
- network monitoring
- network bandwidth
- probabilistic model
- network intrusion detection
- network resources
- intrusion detection system
- network traffic data
- feature space
- real world