Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (4)
  • Open Access

    ARTICLE

    Classified VPN Network Traffic Flow Using Time Related to Artificial Neural Network

    Saad Abdalla Agaili Mohamed*, Sefer Kurnaz

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 819-841, 2024, DOI:10.32604/cmc.2024.050474 - 18 July 2024

    Abstract VPNs are vital for safeguarding communication routes in the continually changing cybersecurity world. However, increasing network attack complexity and variety require increasingly advanced algorithms to recognize and categorize VPN network data. We present a novel VPN network traffic flow classification method utilizing Artificial Neural Networks (ANN). This paper aims to provide a reliable system that can identify a virtual private network (VPN) traffic from intrusion attempts, data exfiltration, and denial-of-service assaults. We compile a broad dataset of labeled VPN traffic flows from various apps and usage patterns. Next, we create an ANN architecture that can… More >

  • Open Access

    ARTICLE

    Applications Classification of VPN Encryption Tunnel Based on SAE-2dCNN Model

    Jie Luo*, Qingbing Ji, Lvlin Ni

    Journal on Artificial Intelligence, Vol.4, No.3, pp. 133-142, 2022, DOI:10.32604/jai.2022.031800 - 01 December 2022

    Abstract How to quickly and accurately identify applications in VPN encrypted tunnels is a difficult technique. Traditional technologies such as DPI can no longer identify applications in VPN encrypted tunnel. Various VPN protocols make the feature engineering of machine learning extremely difficult. Deep learning has the advantages that feature extraction does not rely on manual labor and has a good early application in classification. This article uses deep learning technology to classify the applications of VPN encryption tunnel based on the SAE-2dCNN model. SAE can effectively reduce the dimensionality of the data, which not only improves More >

  • Open Access

    ARTICLE

    VPN and Non-VPN Network Traffic Classification Using Time-Related Features

    Mustafa Al-Fayoumi1, Mohammad Al-Fawa’reh2, Shadi Nashwan3,*

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3091-3111, 2022, DOI:10.32604/cmc.2022.025103 - 29 March 2022

    Abstract The continual growth of the use of technological appliances during the COVID-19 pandemic has resulted in a massive volume of data flow on the Internet, as many employees have transitioned to working from home. Furthermore, with the increase in the adoption of encrypted data transmission by many people who tend to use a Virtual Private Network (VPN) or Tor Browser (dark web) to keep their data privacy and hidden, network traffic encryption is rapidly becoming a universal approach. This affects and complicates the quality of service (QoS), traffic monitoring, and network security provided by Internet… More >

  • Open Access

    ARTICLE

    Design of ECC based Secured Cloud Storage Mechanism for Transaction Rich Applications

    V. Gopinath1, R. S. Bhuvaneswaran2

    CMC-Computers, Materials & Continua, Vol.57, No.2, pp. 341-352, 2018, DOI:10.32604/cmc.2018.04006

    Abstract Cloud computing is the highly demanded technology nowadays. Due to the service oriented architecture, seamless accessibility and other advantages of this advent technology, many transaction rich applications are making use of it. At the same time, it is vulnerable to hacks and threats. Hence securing this environment is of at most important and many research works are being reported focusing on it. This paper proposes a safe storage mechanism using Elliptic curve cryptography (ECC) for the Transaction Rich Applications (TRA). With ECC based security scheme, the security level of the protected system will be increased More >

Displaying 1-10 on page 1 of 4. Per Page