A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features
As internet encryption has grown to safeguard users’ privacy, malware has evolved to leverage encryption protocols such as Transport Layer Security (TLS) to conceal its hazardous connections. The difficulty and impracticality of decrypting TLS network traffic before it reaches the Intrusion Detectio...
| Main Author: | Keshkeh, Kinan |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2022
|
| Subjects: | |
| Online Access: | http://eprints.usm.my/60044/ http://eprints.usm.my/60044/1/24%20Pages%20from%20KINAN%20KESHKEH.pdf |
Similar Items
A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features
by: Keshkeh, Kinan, et al.
Published: (2022)
by: Keshkeh, Kinan, et al.
Published: (2022)
A hybrid entropy decomposition and support vector machine method for agricultural crop type classification
by: Tan, Chue Poh, et al.
Published: (2007)
by: Tan, Chue Poh, et al.
Published: (2007)
Approximate Entropy-Based Epileptic EEG Detection Using Artificial Neural Networks
by: Srinivasan, Vairavan, et al.
Published: (2007)
by: Srinivasan, Vairavan, et al.
Published: (2007)
Dawn Of The Mobile Malware: Reviewing Mobile Worms .
by: Sarwar, Usman, et al.
Published: (2007)
by: Sarwar, Usman, et al.
Published: (2007)
Textured Renyl Entropy for Image Thresholding
by: Abu Shareha, Ahmad Adel, et al.
Published: (2008)
by: Abu Shareha, Ahmad Adel, et al.
Published: (2008)
IPv6 packet classification based on flow label, source and destination addresses
by: Poh, Eric C. K., et al.
Published: (2005)
by: Poh, Eric C. K., et al.
Published: (2005)
Neural network classification of late gamma band electroencephalogram features
by: Ravi, K. V. R., et al.
Published: (2006)
by: Ravi, K. V. R., et al.
Published: (2006)
Medical Image Modality Classification using Feature Weighted Clustering Approach.
by: Chandra, Bhavik Anil
Published: (2010)
by: Chandra, Bhavik Anil
Published: (2010)
Metaheuristic-Based Neural Network
Training And Feature Selector For
Intrusion Detection
by: Ghanem, Waheed Ali Hussein Mohammed
Published: (2019)
by: Ghanem, Waheed Ali Hussein Mohammed
Published: (2019)
Improving visual evoked potential feature classification for person recognition using PCA and normalization
by: Palaniappan, Ramaswamy, et al.
Published: (2006)
by: Palaniappan, Ramaswamy, et al.
Published: (2006)
Division-Based Methods For Large Point Sets Registration
by: Chen , Junfen
Published: (2016)
by: Chen , Junfen
Published: (2016)
Color Feature Embedded for Content-based Image Retrieval System.
by: Sumari, Putra, et al.
by: Sumari, Putra, et al.
Short Text Classification Using An Enhanced Term Weighting Scheme And Filter-Wrapper Feature Selection
by: Alsmadi, Issa Mohammad Ibrahim
Published: (2018)
by: Alsmadi, Issa Mohammad Ibrahim
Published: (2018)
Stego Keys Performance on Feature Based Coding Method in Text Domain
by: Din, Roshidi, et al.
Published: (2017)
by: Din, Roshidi, et al.
Published: (2017)
Feature Selection Method Based On Hybrid Filter-Metaheuristic Wrapper Approach
by: Jothi, Neesha
Published: (2020)
by: Jothi, Neesha
Published: (2020)
Flow-Representation Approach For ICMPV6-Based Ddos Attacks Detection
by: Elejla, Omar E. O.
Published: (2018)
by: Elejla, Omar E. O.
Published: (2018)
Rule-Based Approach For Detecting Advanced Persistent Threat Using Behavioral Features Of Credential Dumping Technique
by: Ali Mohamed, Nachaat Abdelatif
Published: (2022)
by: Ali Mohamed, Nachaat Abdelatif
Published: (2022)
New Key Exchange Protocol Based on Mandelbrot and Julia Fractal Sets.
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
Similarity-Based Weights For
Cross-Domain Sentiment Classification Of Product Reviews
by: Gupta, Aditi
Published: (2023)
by: Gupta, Aditi
Published: (2023)
Hybridization Of Optimized Support
Vector Machine And Artificial Neural
Network For The Diabetic Retinopathy
Classification Problem
by: Kader, Nur Izzati Ab
Published: (2019)
by: Kader, Nur Izzati Ab
Published: (2019)
A New Digital Signature Scheme Based on Mandelbrot and Julia Fractal Sets.
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
A New Public-Key Cryptosystem Based On Mandelbrot And Julia Fractal Sets.
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
A Genetic Algorithm Based Approach for Solving
the Minimum Dominating Set of Queens Problem
by: Alharbi, Saad, et al.
Published: (2017)
by: Alharbi, Saad, et al.
Published: (2017)
A Genetic Algorithm Based Approach for Solving the Minimum Dominating Set of Queens Problem
by: Alharbi, Saad, et al.
Published: (2017)
by: Alharbi, Saad, et al.
Published: (2017)
A New Approach To Public-Key Cryptosystem Based On Mandelbrot And Julia Fractal Sets.
by: A. Alia, Mohammad Ahmad
Published: (2008)
by: A. Alia, Mohammad Ahmad
Published: (2008)
Taylor-Bird Swarm Optimization-Based Deep Belief Network For Medical Data Classification
by: Mohammed, Alhassan Afnan
Published: (2022)
by: Mohammed, Alhassan Afnan
Published: (2022)
A Denoising Generative Adversarial Network Based On Enhanced Feature Mapping Of Data Augmentation For Image Synthesis
by: Chen, Li
Published: (2024)
by: Chen, Li
Published: (2024)
A Feature Selection Approach Based On Hybridizing Flower Pollination Algorithm With Particle Swarm Optimization For Enhancing The Performance Of Ipv6 Intrusion Detection System
by: Al Ghuraibawi, Adnan Hasan Bdair
Published: (2023)
by: Al Ghuraibawi, Adnan Hasan Bdair
Published: (2023)
Adapting An Existing Example-Based Machine Translation (EBMT)
System For New Language Pairs Based On An Optimized Bilingual
Knowledge Bank (BKB).
by: Lim, Huan Ngee, et al.
Published: (2007)
by: Lim, Huan Ngee, et al.
Published: (2007)
Malware visualizer: A web apps malware family classification with machine learning
by: Mohd Zamri, Osman, et al.
Published: (2021)
by: Mohd Zamri, Osman, et al.
Published: (2021)
Efficient feature selection analysis for accuracy malware classification
by: Rahiwan Nazar, Romli, et al.
Published: (2021)
by: Rahiwan Nazar, Romli, et al.
Published: (2021)
Android mobile malware detection model based on permission features using machine learning approach
by: Sharfah Ratibah, Tuan Mat
Published: (2022)
by: Sharfah Ratibah, Tuan Mat
Published: (2022)
Enhanced Techniques For Detection And Classification Of Neighbor Discovery Protocol Anomalies
by: Firas (M.H.) S., Najjar
Published: (2016)
by: Firas (M.H.) S., Najjar
Published: (2016)
Hippocampus Segmentation Using Locally Integrated Prior-Based Level Set Guided By Assembled And Weighted
Coherent Point Drift Registration
by: Achuthan, Anusha
Published: (2016)
by: Achuthan, Anusha
Published: (2016)
Malware classification based on target location
by: Nasuha, Noor Baha
Published: (2014)
by: Nasuha, Noor Baha
Published: (2014)
Rule-Based Approach For Detecting Botnet Based On Domain Name System
by: Alieyan, Kamal Ibrahim Ahmed
Published: (2018)
by: Alieyan, Kamal Ibrahim Ahmed
Published: (2018)
A Study on Optimal Face Ratio for Recognition Using Part-based Feature Extractor
by: Neo, Han Foon, et al.
Published: (2007)
by: Neo, Han Foon, et al.
Published: (2007)
Analysis on spatial and temporal features of gait kinematics
by: Wan Noorshahida Mohd Isa,
Published: (2005)
by: Wan Noorshahida Mohd Isa,
Published: (2005)
Cancellable biometerics featuring with tokenised random number
by: TEOH, A, et al.
Published: (2005)
by: TEOH, A, et al.
Published: (2005)
Feature Estraction In Automatic Shape Recognition System.
by: Salam, Rosalina Abdul, et al.
Published: (2004)
by: Salam, Rosalina Abdul, et al.
Published: (2004)
Similar Items
-
A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features
by: Keshkeh, Kinan, et al.
Published: (2022) -
A hybrid entropy decomposition and support vector machine method for agricultural crop type classification
by: Tan, Chue Poh, et al.
Published: (2007) -
Approximate Entropy-Based Epileptic EEG Detection Using Artificial Neural Networks
by: Srinivasan, Vairavan, et al.
Published: (2007) -
Dawn Of The Mobile Malware: Reviewing Mobile Worms .
by: Sarwar, Usman, et al.
Published: (2007) -
Textured Renyl Entropy for Image Thresholding
by: Abu Shareha, Ahmad Adel, et al.
Published: (2008)