Feature Analysis of Encrypted Malicious Traffic.
Anish Singh ShekhawatFabio Di TroiaMark StampPublished in: CoRR (2023)
Keyphrases
- feature analysis
- malicious traffic
- network traffic
- detection mechanism
- traffic patterns
- traffic analysis
- feature extraction
- ip addresses
- normal traffic
- anomaly detection
- independent component analysis
- intrusion detection
- face recognition
- image processing
- traffic data
- linear discriminant analysis
- ad hoc networks
- dynamically changing
- discriminant analysis
- signal processing
- pattern recognition
- data structure