Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
A Survey on TLS-Encrypted Malware Network Traffic Analysis Applicable to Security Operations Centers
by
Heejun Roh
, Joonseo Ha
, Chaeyeon Oh
in
Biology (General)
/ Chemistry
/ Classification
/ Cybersecurity
/ Data encryption
/ Deep learning
/ Engineering (General). Civil engineering (General)
/ Internet
/ Machine learning
/ Malware
/ Network security
/ network traffic analysis
/ network traffic analysis; traffic classification; security operations center; transport layer security; malware
/ Physics
/ Polls & surveys
/ Privacy
/ QC1-999
/ QD1-999
/ QH301-705.5
/ security operations center
/ Servers
/ T
/ TA1-2040
/ Technology
/ traffic classification
/ Traffic control
/ transport layer security
/ Trends
/ Wireless networks
2022
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
A Survey on TLS-Encrypted Malware Network Traffic Analysis Applicable to Security Operations Centers
by
Heejun Roh
, Joonseo Ha
, Chaeyeon Oh
in
Biology (General)
/ Chemistry
/ Classification
/ Cybersecurity
/ Data encryption
/ Deep learning
/ Engineering (General). Civil engineering (General)
/ Internet
/ Machine learning
/ Malware
/ Network security
/ network traffic analysis
/ network traffic analysis; traffic classification; security operations center; transport layer security; malware
/ Physics
/ Polls & surveys
/ Privacy
/ QC1-999
/ QD1-999
/ QH301-705.5
/ security operations center
/ Servers
/ T
/ TA1-2040
/ Technology
/ traffic classification
/ Traffic control
/ transport layer security
/ Trends
/ Wireless networks
2022
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
A Survey on TLS-Encrypted Malware Network Traffic Analysis Applicable to Security Operations Centers
by
Heejun Roh
, Joonseo Ha
, Chaeyeon Oh
in
Biology (General)
/ Chemistry
/ Classification
/ Cybersecurity
/ Data encryption
/ Deep learning
/ Engineering (General). Civil engineering (General)
/ Internet
/ Machine learning
/ Malware
/ Network security
/ network traffic analysis
/ network traffic analysis; traffic classification; security operations center; transport layer security; malware
/ Physics
/ Polls & surveys
/ Privacy
/ QC1-999
/ QD1-999
/ QH301-705.5
/ security operations center
/ Servers
/ T
/ TA1-2040
/ Technology
/ traffic classification
/ Traffic control
/ transport layer security
/ Trends
/ Wireless networks
2022
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
A Survey on TLS-Encrypted Malware Network Traffic Analysis Applicable to Security Operations Centers
Journal Article
A Survey on TLS-Encrypted Malware Network Traffic Analysis Applicable to Security Operations Centers
2022
Request Book From Autostore
and Choose the Collection Method
Overview
Recently, a majority of security operations centers (SOCs) have been facing a critical issue of increased adoption of transport layer security (TLS) encryption on the Internet, in network traffic analysis (NTA). To this end, in this survey article, we present existing research on NTA and related areas, primarily focusing on TLS-encrypted traffic to detect and classify malicious traffic with deployment scenarios for SOCs. Security experts in SOCs and researchers in academia can obtain useful information from our survey, as the main focus of our survey is NTA methods applicable to malware detection and family classification. Especially, we have discussed pros and cons of three main deployment models for encrypted NTA: TLS interception, inspection using cryptographic functions, and passive inspection without decryption. In addition, we have discussed the state-of-the-art methods in TLS-encrypted NTA for each component of a machine learning pipeline, typically used in the state-of-the-art methods.
This website uses cookies to ensure you get the best experience on our website.