Network traffic identification of several open source secure proxy protocols.
Yidan ZhangJiageng ChenKaiming ChenRuoyan XuJesen TehShuai ZhangPublished in: Int. J. Netw. Manag. (2021)
Keyphrases
- network traffic
- open source
- covert channel
- intrusion detection
- trusted third party
- anomaly detection
- cryptographic protocols
- network monitoring
- intrusion detection system
- network security
- security protocols
- network management
- computer networks
- key distribution
- authentication protocol
- network bandwidth
- network intrusion detection
- traffic data
- security properties
- internet traffic
- key management
- source code
- security analysis
- network traffic data
- network resources
- long range dependence
- machine learning
- traffic patterns
- proxy servers
- normal traffic