[HTML][HTML] Encrypted Web traffic dataset: Event logs and packet traces
We present a dataset that captures seven days of monitoring data from eight servers hosting
more than 800 sites across a large campus network. The dataset contains data from network …
more than 800 sites across a large campus network. The dataset contains data from network …
Event-Flow Correlation for Anomaly Detection in HTTP/3 Web Traffic
The new HTTP/3 protocol for web traffic was recently released, superseding the widely used
HTTP/2. It now supports exclusively encrypted transmissions and brings a lot of other …
HTTP/2. It now supports exclusively encrypted transmissions and brings a lot of other …
[PDF][PDF] Secure Encrypted Connection on Georgian Website
We make an effort and spend loads of time trying to secure IT infrastructure and services. We
hide the entire network segment behind firewalls, DMZs, and other security mechanisms to …
hide the entire network segment behind firewalls, DMZs, and other security mechanisms to …
[PDF][PDF] Improving Cyber Situational Awareness through Event-Flow Correlation
S Špaček - is.muni.cz
Cyber situational awareness is an indispensable part of ensuring security in the
environment of computer networks. It expresses the ability to perceive what events occur in …
environment of computer networks. It expresses the ability to perceive what events occur in …
[PDF][PDF] Adaptive complementing of HTTPS flow volume for web traffic
M MACÁK - is.muni.cz
This thesis aims to design the complementing algorithm for one or more missing parameters
in the flows and provide their evaluation. The dataset used for this thesis comes from the …
in the flows and provide their evaluation. The dataset used for this thesis comes from the …