Digital twin for credit card fraud detection: Opportunities, challenges, and fraud detection advancements

P Chatterjee, D Das, DB Rawat - Future Generation Computer Systems, 2024 - Elsevier
Credit cards are widely used for payments due to their convenience and broad acceptance.
Their popularity comes with the critical challenge of safeguarding personal and payment …

AAE-DSVDD: A one-class classification model for VPN traffic identification

S Lv, C Wang, Z Wang, S Wang, B Wang, Y Zhang - Computer Networks, 2023 - Elsevier
Abstract Virtual Private Network (VPN) can provide a concealed transmission channel for
communication and protect the privacy of users. However, it also brings hidden dangers to …

PROGESI: a PROxy Grammar to Enhance web application firewall for SQL Injection prevention

A Coscia, V Dentamaro, S Galantucci, A Maci… - IEEE …, 2024 - ieeexplore.ieee.org
A web application is prone to security threats due to its open nature. The security of these
platforms is imperative for organizations of all sizes because they store sensitive information …

RESIP host detection: identification of malicious residential IP proxy flows

A Tosun, M De Donno, N Dragoni… - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
The number of residential proxies as a service has grown as an emerging gray-area
business, in which a provider utilises (compromised) hosts inside residential networks in …

A machine learning approach to classify network traffic

N Jadav, N Dutta, HKD Sarma… - 2021 13th …, 2021 - ieeexplore.ieee.org
There is a significant increase of cloud and networking-enabled applications, leading to an
exponential growth of network traffic. Monitoring all these applications and their generated …

Enhanced detection of obfuscated HTTPS tunnel traffic using heterogeneous information network

M Liu, G Gou, G Xiong, J Shi, Z Guan, H Miao, Y Li - Computer Networks, 2024 - Elsevier
HTTPS tunnel-based VPN services are increasingly used for malicious activities, such as
remote control and data exfiltration. As detection mechanisms improve, some adversaries …

[引用][C] A review on security and privacy issues and challenges in internet of things

DK Alferidah, NZ Jhanjhi - International Journal of Computer Science and …, 2020

NinjaDoH: A Censorship-Resistant Moving Target DoH Server Using Hyperscalers and IPNS

S Seidenberger, M Beret, R Wijewickrama… - arXiv preprint arXiv …, 2024 - arxiv.org
We introduce NinjaDoH, a novel DNS over HTTPS (DoH) protocol that leverages the
InterPlanetary Name System (IPNS), along with public cloud infrastructure, to create a …

NSA-net: A NetFlow sequence attention network for virtual private network traffic detection

P Fu, C Liu, Q Yang, Z Li, G Gou, G Xiong… - Web Information Systems …, 2020 - Springer
With the increasing attention on communication security, Virtual private network (VPN)
technology is widely used to meet different security requirements. VPN traffic detection and …

An optimized recognition algorithm for SSL VPN protocol encrypted traffic

K Xian - Informatica, 2021 - informatica.si
With the widespread use of Virtual Private Networks (VPNs), the identification of Secure
Sockets Layer (SSL) VPN encrypted traffic has become an important issue. This paper first …