Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (4)
  • Open Access

    ARTICLE

    Suboptimal Feature Selection Techniques for Effective Malicious Traffic Detection on Lightweight Devices

    So-Eun Jeon1, Ye-Sol Oh1, Yeon-Ji Lee1, Il-Gu Lee1,2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.2, pp. 1669-1687, 2024, DOI:10.32604/cmes.2024.047239 - 20 May 2024

    Abstract With the advancement of wireless network technology, vast amounts of traffic have been generated, and malicious traffic attacks that threaten the network environment are becoming increasingly sophisticated. While signature-based detection methods, static analysis, and dynamic analysis techniques have been previously explored for malicious traffic detection, they have limitations in identifying diversified malware traffic patterns. Recent research has been focused on the application of machine learning to detect these patterns. However, applying machine learning to lightweight devices like IoT devices is challenging because of the high computational demands and complexity involved in the learning process. In… More >

  • Open Access

    ARTICLE

    BSTFNet: An Encrypted Malicious Traffic Classification Method Integrating Global Semantic and Spatiotemporal Features

    Hong Huang1, Xingxing Zhang1,*, Ye Lu1, Ze Li1, Shaohua Zhou2

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3929-3951, 2024, DOI:10.32604/cmc.2024.047918 - 26 March 2024

    Abstract While encryption technology safeguards the security of network communications, malicious traffic also uses encryption protocols to obscure its malicious behavior. To address the issues of traditional machine learning methods relying on expert experience and the insufficient representation capabilities of existing deep learning methods for encrypted malicious traffic, we propose an encrypted malicious traffic classification method that integrates global semantic features with local spatiotemporal features, called BERT-based Spatio-Temporal Features Network (BSTFNet). At the packet-level granularity, the model captures the global semantic features of packets through the attention mechanism of the Bidirectional Encoder Representations from Transformers (BERT)… More >

  • Open Access

    ARTICLE

    Malicious Traffic Compression and Classification Technique for Secure Internet of Things

    Yu-Rim Lee1, Na-Eun Park1, Seo-Yi Kim2, Il-Gu Lee1,2,*

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3465-3482, 2023, DOI:10.32604/cmc.2023.041196 - 08 October 2023

    Abstract With the introduction of 5G technology, the application of Internet of Things (IoT) devices is expanding to various industrial fields. However, introducing a robust, lightweight, low-cost, and low-power security solution to the IoT environment is challenging. Therefore, this study proposes two methods using a data compression technique to detect malicious traffic efficiently and accurately for a secure IoT environment. The first method, compressed sensing and learning (CSL), compresses an event log in a bitmap format to quickly detect attacks. Then, the attack log is detected using a machine-learning classification model. The second method, precise re-learning… More >

  • Open Access

    ARTICLE

    Malicious Traffic Detection in IoT and Local Networks Using Stacked Ensemble Classifier

    R. D. Pubudu L. Indrasiri1, Ernesto Lee2, Vaibhav Rupapara3, Furqan Rustam4, Imran Ashraf5,*

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 489-515, 2022, DOI:10.32604/cmc.2022.019636 - 03 November 2021

    Abstract Malicious traffic detection over the internet is one of the challenging areas for researchers to protect network infrastructures from any malicious activity. Several shortcomings of a network system can be leveraged by an attacker to get unauthorized access through malicious traffic. Safeguard from such attacks requires an efficient automatic system that can detect malicious traffic timely and avoid system damage. Currently, many automated systems can detect malicious activity, however, the efficacy and accuracy need further improvement to detect malicious traffic from multi-domain systems. The present study focuses on the detection of malicious traffic with high… More >

Displaying 1-10 on page 1 of 4. Per Page