Digital twin for credit card fraud detection: Opportunities, challenges, and fraud detection advancements
Credit cards are widely used for payments due to their convenience and broad acceptance.
Their popularity comes with the critical challenge of safeguarding personal and payment …
Their popularity comes with the critical challenge of safeguarding personal and payment …
AAE-DSVDD: A one-class classification model for VPN traffic identification
S Lv, C Wang, Z Wang, S Wang, B Wang, Y Zhang - Computer Networks, 2023 - Elsevier
Abstract Virtual Private Network (VPN) can provide a concealed transmission channel for
communication and protect the privacy of users. However, it also brings hidden dangers to …
communication and protect the privacy of users. However, it also brings hidden dangers to …
PROGESI: a PROxy Grammar to Enhance web application firewall for SQL Injection prevention
A web application is prone to security threats due to its open nature. The security of these
platforms is imperative for organizations of all sizes because they store sensitive information …
platforms is imperative for organizations of all sizes because they store sensitive information …
RESIP host detection: identification of malicious residential IP proxy flows
The number of residential proxies as a service has grown as an emerging gray-area
business, in which a provider utilises (compromised) hosts inside residential networks in …
business, in which a provider utilises (compromised) hosts inside residential networks in …
A machine learning approach to classify network traffic
N Jadav, N Dutta, HKD Sarma… - 2021 13th …, 2021 - ieeexplore.ieee.org
There is a significant increase of cloud and networking-enabled applications, leading to an
exponential growth of network traffic. Monitoring all these applications and their generated …
exponential growth of network traffic. Monitoring all these applications and their generated …
Enhanced detection of obfuscated HTTPS tunnel traffic using heterogeneous information network
M Liu, G Gou, G Xiong, J Shi, Z Guan, H Miao, Y Li - Computer Networks, 2024 - Elsevier
HTTPS tunnel-based VPN services are increasingly used for malicious activities, such as
remote control and data exfiltration. As detection mechanisms improve, some adversaries …
remote control and data exfiltration. As detection mechanisms improve, some adversaries …
[引用][C] A review on security and privacy issues and challenges in internet of things
DK Alferidah, NZ Jhanjhi - International Journal of Computer Science and …, 2020
NinjaDoH: A Censorship-Resistant Moving Target DoH Server Using Hyperscalers and IPNS
S Seidenberger, M Beret, R Wijewickrama… - arXiv preprint arXiv …, 2024 - arxiv.org
We introduce NinjaDoH, a novel DNS over HTTPS (DoH) protocol that leverages the
InterPlanetary Name System (IPNS), along with public cloud infrastructure, to create a …
InterPlanetary Name System (IPNS), along with public cloud infrastructure, to create a …
NSA-net: A NetFlow sequence attention network for virtual private network traffic detection
P Fu, C Liu, Q Yang, Z Li, G Gou, G Xiong… - Web Information Systems …, 2020 - Springer
With the increasing attention on communication security, Virtual private network (VPN)
technology is widely used to meet different security requirements. VPN traffic detection and …
technology is widely used to meet different security requirements. VPN traffic detection and …
An optimized recognition algorithm for SSL VPN protocol encrypted traffic
K Xian - Informatica, 2021 - informatica.si
With the widespread use of Virtual Private Networks (VPNs), the identification of Secure
Sockets Layer (SSL) VPN encrypted traffic has become an important issue. This paper first …
Sockets Layer (SSL) VPN encrypted traffic has become an important issue. This paper first …