Machine learning based malware detection on encrypted traffic: A comprehensive performance study
The increasing volume of encrypted network traffic yields a clutter for hackers to use encryption
to spread their malicious software on the network. We study the problem of detecting TLS-…
to spread their malicious software on the network. We study the problem of detecting TLS-…
ANTA: Accelerated Network Traffic Analytics.
M Grohotolski, C DiLeo - 2020 - jayscholar.etown.edu
Implementing traditional machine learning models and neural networks has become trivial
in detecting malicious network traffic and has sparked interest in many researchers …
in detecting malicious network traffic and has sparked interest in many researchers …
SECTOR: A Web-based Data Management and Sharing System Secured by Blockchain
M Grohotolski - 2021 - jayscholar.etown.edu
Since the advent of technology, securely transferring data between two computers over the
internet has been a difficult task. This is especially true for organizations and universities who …
internet has been a difficult task. This is especially true for organizations and universities who …
Native Network Intelligence
ACM SIGCOMM - dl.acm.org
The recent proliferation of programmable network equipment has opened up new possibilities
for embedding intelligence into the data plane. Deploying models directly in the data …
for embedding intelligence into the data plane. Deploying models directly in the data …
The case for native multi-node in-network machine learning
It is now possible to run per-packet Machine Learning (ML) inference tasks in the data plane
at line-rate with dedicated hardware in programmable network switches. We refer to this …
at line-rate with dedicated hardware in programmable network switches. We refer to this …
DeepTLS: comprehensive and high-performance feature extraction for encrypted traffic
Z Liu - arXiv preprint arXiv:2208.03862, 2022 - arxiv.org
Feature extraction is critical for TLS traffic analysis using machine learning techniques, which
it is also very difficult and time-consuming requiring huge engineering efforts. We designed …
it is also very difficult and time-consuming requiring huge engineering efforts. We designed …
The Next" Big Short": COVID-19, Student Loan Discharge in Bankruptcy, and the SLABS Market
SL Bailey, CJ Ryan Jr - SMU L. Rev., 2020 - HeinOnline
Even before the spread of the COVID-19 pandemic, student loan debttotaling over $1.64
trillion-was a cause for concern, as it is the second largest source of consumer debt in the …
trillion-was a cause for concern, as it is the second largest source of consumer debt in the …
[PDF][PDF] Koneoppimisen käyttö haittaohjelmahyökkäysten ehkäisyssä
E Oljakka - 2021 - trepo.tuni.fi
Tutkimuksessa tiivistyy eri menetelmiä haittaohjelmien havaitsemiseen ja analysointiin
käyttäen koneoppimismenetelmiä. Tutkimus toteutettiin, sillä haittaohjelman uhriksi voi nykyään …
käyttäen koneoppimismenetelmiä. Tutkimus toteutettiin, sillä haittaohjelman uhriksi voi nykyään …