Dns over https detection using standard flow telemetry

K Jerabek, K Hynek, O Rysavy, I Burgetova - IEEE Access, 2023 - ieeexplore.ieee.org
traffic shape. This section describes the process of creating the machine learning model for
DoH detection. … We used the proposed detector with ML trained on the design dataset and …

Application of artificial intelligence to network forensics: Survey, challenges and future directions

S Rizvi, M Scanlon, J Mcgibney, J Sheppard - Ieee Access, 2022 - ieeexplore.ieee.org
… in network traffic detection, which is a burden on the model’s … However, MLtrained models
may reduce their accuracy on … The AI-based DNS detection technology is shown in Figure 6…

[PDF][PDF] An anomaly detection framework for DNS-over-HTTPS (DoH) tunnel using time-series analysis

M MontazeriShatoori - 2020 - unbscholar.lib.unb.ca
… To have a comprehensive view of DNS security concerns, I … [17] defined a flow-based DNS
tunnel traffic detection … They provided classification results for several ML trained models

[PDF][PDF] Machine Learning for Securing SDN based 5G network

HA Alamri, V Thayananthan, J Yazdani - Int. J. Comput. Appl, 2021 - researchgate.net
… attacks such as session hijacking, DNS spoofing, eavesdropping, and black hole … database
and ML trained model for identifying and analyzing the network … Ensuring secure access and …

Passban IDS: An intelligent anomaly-based intrusion detection system for IoT edge devices

M Eskandari, ZH Janjua, M Vecchio… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
… challenging research branches of information technology, … today’s technology, we identify
the Raspberry Pi 3, model B1 as … classification models able to distinguish normal traffic from …

Augmenting iot healthcare security and reliability with early detection of iot botnet attacks

A Kumar, I Sharma - … Conference for Emerging Technology  …, 2023 - ieeexplore.ieee.org
… paper have presented a new model that can be combined with … and DNS packets, to identify
and filter DDoS attack traffic from … ML-trained chip will initiate the process by gathering traffic

A reference architecture for cloud–edge meta-operating systems enabling cross-domain, data-intensive, ML-assisted applications: Architectural overview and key …

P Trakadas, X Masip-Bruin, FM Facca, ST Spantideas… - Sensors, 2022 - mdpi.com
… , as a sort of clever DNS, converts abstract endpoints into … traffic lights or on the move) and
share data and models in a … and the exchange of ML trained models. Additionally, these shifts …

A Study on Cyber-Attack Detection and Classification Using Machine Learning Techniques

SS Shafin, SA Prottoy, S Abbas - 2021 - 103.82.172.44
… shows that ML trained show higher detection accuracy when … measures applied on
CICIDDos-19 dataset in cases of DNS, … a model perform in correctly recognizing the samples that …

Federated learning for distributed intrusion detection systems in public networks

A Bakhshi Zadi Mahmoodi - 2023 - oulurepo.oulu.fi
… of information technology (IT) and operational technology (OT)… HTTP, SMTP, DNS, TLS/SSL,
and others. In addition to rule-… to evaluate the FED-ML trained models is displayed in Figure …

SmFD: Machine Learning Controlled Smart Factory Management Through IoT DDoS Device Identification

A Kumari, I Sharma - … Technologies and Internet of Things …, 2024 - ieeexplore.ieee.org
… In the proposed model ML trained chip systems are capable … resources are overloaded by
this enormous amount of traffic, … response by using mirrored protocols or open DNS resolvers. …