期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Classified VPN Network Traffic Flow Using Time Related to Artificial Neural Network
1
作者 Saad Abdalla Agaili Mohamed Sefer Kurnaz 《Computers, Materials & Continua》 SCIE EI 2024年第7期819-841,共23页
VPNs are vital for safeguarding communication routes in the continually changing cybersecurity world.However,increasing network attack complexity and variety require increasingly advanced algorithms to recognize and c... VPNs are vital for safeguarding communication routes in the continually changing cybersecurity world.However,increasing network attack complexity and variety require increasingly advanced algorithms to recognize and categorizeVPNnetwork data.We present a novelVPNnetwork traffic flowclassificationmethod utilizing Artificial Neural Networks(ANN).This paper aims to provide a reliable system that can identify a virtual private network(VPN)traffic fromintrusion attempts,data exfiltration,and denial-of-service assaults.We compile a broad dataset of labeled VPN traffic flows from various apps and usage patterns.Next,we create an ANN architecture that can handle encrypted communication and distinguish benign from dangerous actions.To effectively process and categorize encrypted packets,the neural network model has input,hidden,and output layers.We use advanced feature extraction approaches to improve the ANN’s classification accuracy by leveraging network traffic’s statistical and behavioral properties.We also use cutting-edge optimizationmethods to optimize network characteristics and performance.The suggested ANN-based categorization method is extensively tested and analyzed.Results show the model effectively classifies VPN traffic types.We also show that our ANN-based technique outperforms other approaches in precision,recall,and F1-score with 98.79%accuracy.This study improves VPN security and protects against new cyberthreats.Classifying VPNtraffic flows effectively helps enterprises protect sensitive data,maintain network integrity,and respond quickly to security problems.This study advances network security and lays the groundwork for ANN-based cybersecurity solutions. 展开更多
关键词 VPN network traffic flow ANN classification intrusion detection data exfiltration encrypted traffic feature extraction network security
下载PDF
Data Transmission Using HDD as Microphone
2
作者 Yongyu Liang Jinghua Zheng Guozheng Yang 《国际计算机前沿大会会议论文集》 2020年第1期416-427,共12页
The technology of Covert Channel is often used for communications between computers and the Internet with high sensitivity or security levels.Presently,some research were carried out on covert channel using computer s... The technology of Covert Channel is often used for communications between computers and the Internet with high sensitivity or security levels.Presently,some research were carried out on covert channel using computer screen light radiation,speakers,electromagnetic leakage,etc.In this paper,the technology of SoundHammer is studied.It is a technical bridgeware that use acoustic waves to transmit data from sound device into an air-gapped network.Firstly,an idea was proposed for data transmission by covert channel through acoustic waves.Then,this method was validated by experiment and the risks of the air-gapped network were confirmed.Finally,some countermeasures for detecting and eliminating such covert channels were listed. 展开更多
关键词 Covert channel Air-gapped network data exfiltration Acoustic waves
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部