0
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Analysis of Encrypted Network Traffic for Enhancing Cyber-security in Dynamic Environments

ORCID Icon
Article: 2381882 | Received 09 Mar 2024, Accepted 11 Jul 2024, Published online: 26 Jul 2024

References

  • Ahmad, J., M. U. Zia, I. H. Naqvi, J. N. Chattha, F. A. Butt, T. Huang, and W. Xiang. 2024. Machine learning and blockchain technologies for cybersecurity in connected vehicles. WIREs Data Mining and Knowledge Discovery 14 (1):e1515. doi:10.1002/widm.1515.
  • Al-Bakhat, L., and S. Almuhammadi. 2022. Intrusion detection on quic traffic: A machine learning approach. 2022 7th International Conference on Data Science and Machine Learning Applications (CDMA), 194–42. IEEE. doi:10.1109/CDMA54072.2022.9752695.
  • Alrayes, F. S., M. Zakariah, M. Driss, and W. Boulila. 2023. Deep neural decision forest (DNDF): A novel approach for enhancing intrusion detection systems in network traffic analysis. Sensors 23 (20):8362. doi:10.3390/s23208362.
  • Alwasel, B., A. Aldribi, M. Alreshoodi, I. S. Alsukayti, and M. Alsuhaibani. 2023. Leveraging graph-based representations to enhance machine learning performance in IIoT network security and attack detection. Applied Sciences 13 (13):7774. doi:10.3390/app13137774.
  • Bakhsh, S. A., M. A. Khan, F. Ahmed, M. S. Alshehri, H. Ali, and J. Ahmad. 2023. Enhancing IoT network security through deep learning-powered intrusion detection system. Internet of Things 24:100936. doi:10.1016/j.iot.2023.100936.
  • Chuang, H. M., and L. J. Ye. 2023. Applying transfer learning approaches for intrusion detection in software-defined networking. Sustainability 15 (12):9395. doi:10.3390/su15129395.
  • Djenna, A., E. Barka, A. Benchikh, and K. Khadir. 2023. Unmasking cybercrime with artificial-intelligence-driven cybersecurity analytics. Sensors 23 (14):6302. doi:10.3390/s23146302.
  • Faragallah, O. S., W. El-Shafai, A. I. Sallam, I. Elashry, E. S. M. EL-Rabaie, A. Afifi, and H. S. El-Sayed. 2022. Cybersecurity framework of hybrid watermarking and selective encryption for secure HEVC. Multimedia Tools & Applications 81 (8):11577–606. doi:10.1007/s11042-022-12389-4.
  • Fu, C., Q. Li, and K. Xu. 2023. Detecting unknown encrypted malicious traffic in real time via flow interaction graph analysis. arXiv preprint arXiv:2301.13686. doi:10.48550/arXiv.2301.13686.
  • Gazzan, M., and F. T. Sheldon. 2023. An enhanced minimax loss function technique in generative adversarial network for ransomware behavior prediction. Future Internet 15 (10):318. doi:10.3390/fi15100318.
  • Gebremariam, G. G., J. Panda and S. Indu. 2023. Blockchain-based secure localization against malicious nodes in iot-based wireless sensor networks using federated learning. Wireless Communications and Mobile Computing 2023 (1):8068038.
  • Gupta, L., T. Salman, A. Ghubaish, D. Unal, A. K. Al-Ali, and R. Jain. 2022. Cybersecurity of multi-cloud healthcare systems: A hierarchical deep learning approach. Applied Soft Computing 118:108439. doi:10.1016/j.asoc.2022.108439.
  • Hsiao, S. J., and W. T. Sung. 2022. Enhancing cybersecurity using blockchain technology based on IoT data fusion. IEEE Internet of Things Journal 10 (1):486–98. doi:10.1109/JIOT.2022.3199735.
  • Ilca, L. F., O. P. Lucian, and T. C. Balan. 2023. Enhancing cyber-resilience for small and medium-sized organizations with prescriptive malware analysis, detection and response. Sensors 23 (15):6757. doi:10.3390/s23156757.
  • Ilyas, M. U., and S. A. Alharbi. 2022. Machine learning approaches to network intrusion detection for contemporary internet traffic. Computing 104 (5):1061–76. doi:10.1007/s00607-021-01050-5.
  • Jorgensen, S., J. Holodnak, J. Dempsey, K. de Souza, A. Raghunath, V. Rivet, N. DeMoes, A. Alejos, and A. Wollaber. 2023. Extensible machine learning for encrypted network traffic application labeling via uncertainty quantification. IEEE Transactions on Artificial Intelligence 5 (1):420–33. doi:10.1109/TAI.2023.3244168.
  • Kadakia, Y. A., A. Suryavanshi, A. Alnajdi, F. Abdullah, and P. D. Christofides. 2024. Integrating machine learning detection and encrypted control for enhanced cybersecurity of nonlinear processes. Computers & Chemical Engineering 180:108498. doi:10.1016/j.compchemeng.2023.108498.
  • Khan, L., H. T. Ullah, T. Ali, A. Ali, M. A. A. Mamun, and N. Kumar. 2023. A secure and efficient federated learning framework for IIoT using blockchain and reinforcement learning. IEEE Transactions on Industrial Informatics 19 (5):4797–805. doi:10.1109/TII.2022.3198618.
  • Latif, S., W. Boulila, A. Koubaa, Z. Zou, and J. Ahmad. 2024. DTL-IDS: An optimized intrusion detection framework using deep transfer learning and genetic algorithm. Journal of Network and Computer Applications 221:103784. doi:10.1016/j.jnca.2023.103784.
  • Lin, P., K. Ye, Y. Hu, Y. Lin, and C. Z. Xu. 2022. A novel multimodal deep learning framework for encrypted traffic classification. IEEE/ACM Transactions on Networking 31 (3):1369–84. doi:10.1109/TNET.2022.3215507.
  • Lo, W., H. Alqahtani, K. Thakur, A. Almadhor, S. Chander, and G. Kumar. 2022. A hybrid deep learning based intrusion detection system using spatial-temporal representation of In-vehicle network traffic. Vehicular Communications 35:100471. doi:10.1016/j.vehcom.2022.100471.
  • Meddeb, R., F. Jemili, B. Triki, and O. Korbaa. 2023. A deep learning-based intrusion detection approach for mobile ad-hoc network. Soft Computing 1–15. doi:10.1007/s00500-023-07974-0.
  • Mishra, A., Y. I. Alzoubi, M. J. Anwar, and A. Q. Gill. 2022. Attributes impacting cybersecurity policy development: An evidence from seven nations. Computers & Security 120:102820. doi:10.1016/j.cose.2022.102820.
  • Miyamoto, M., K. Teranishi, K. Emura, and K. Kogiso. 2023. Cybersecurity-enhanced encrypted control system using keyed-homomorphic public key encryption. Institute of Electrical and Electronics Engineers Access 11:45749–60. doi:10.1109/ACCESS.2023.3274691.
  • Mohamed, A., F. Wang, I. Butun, J. Qadir, R. Lagerström, P. Gastaldo, and D. D. Caviglia. 2022. Enhancing cyber security of LoRaWAN gateways under adversarial attacks. Sensors 22 (9):3498. doi:10.3390/s22093498.
  • Moustafa, N., and J. Slay. 2015. UNSW-NB15: A comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). 2015 Military Communications and Information Systems Conference (MilCIS), 1–6. IEEE. doi:10.1109/MilCIS.2015.7348942.
  • Ninu, S. B. 2023. An intrusion detection system using exponential henry gas solubility optimization based deep neuro fuzzy network in MANET. Engineering Applications of Artificial Intelligence 123:105969.
  • Papanikolaou, A., A. Alevizopoulos, C. Ilioudis, K. Demertzis, and K. Rantos. 2023. An AutoML network traffic analyzer for cyber threat detection. International Journal of Information Security 22 (5):1511–30. doi:10.1007/s10207-023-00703-0.
  • Pradeepthi, C., and B. U. Maheswari. 2023. Network intrusion detection and prevention strategy with data encryption using hybrid detection classifier. Multimedia Tools & Applications 83 (13):40147–78. doi:10.1007/s11042-023-16853-1.
  • Rezaei, S., and X. Liu. 2019. Deep learning for encrypted traffic classification: An overview. IEEE Communications Magazine 57 (5):76–81. doi:10.1109/MCOM.2019.1800819.
  • Salvakkam, D. B., V. Saravanan, P. K. Jain, and R. Pamula. 2023. Enhanced quantum-secure ensemble intrusion detection techniques for cloud based on deep learning. Cognitive Computation 1–20. doi:10.1007/s12559-023-10139-2.
  • Sharma, B., L. Sharma, C. Lal, and S. Roy. 2023. Anomaly based network intrusion detection for IoT attacks using deep learning technique. Computers & Electrical Engineering 107:108626. doi:10.1016/j.compeleceng.2023.108626.
  • Sood, T., S. Prakash, S. Sharma, A. Singh, and H. Choubey. 2022. Intrusion detection system in wireless sensor network using conditional generative adversarial network. Wireless Personal Communications 126 (1):911–31. doi:10.1007/s11277-022-09776-x.
  • Ullah, F., S. Ullah, G. Srivastava, and J. C. W. Lin. 2023. IDS-INT: Intrusion detection system using transformer-based transfer learning for imbalanced network traffic. Digital Communications and Networks 10 (1):190–204. doi:10.1016/j.dcan.2023.03.008.
  • Wang, Z., P. Wang, and Z. Sun. 2022. SDN traffic anomaly detection method based on convolutional autoencoder and federated learning. GLOBECOM 2022-2022 IEEE Global Communications Conference, 4154–60, IEEE. doi:10.1109/GLOBECOM48099.2022.10002485.
  • Xu, H., L. Sun, G. Fan, W. Li, and G. Kuang. 2023. A hierarchical intrusion detection model combining multiple deep learning models with attention mechanism. Institute of Electrical and Electronics Engineers Access 11:66212–26. doi:10.1109/ACCESS.2023.3290613.
  • Yan, R., Y. Wang, J. Dai, Y. Xu, and A. Q. Liu. 2022. Quantum-key-distribution-based microgrid control for cybersecurity enhancement. IEEE Transactions on Industry Applications 58 (3):3076–86. doi:10.1109/TIA.2022.3159314.
  • Zanasi, C., S. Russo, and M. Colajanni. 2024. Flexible zero trust architecture for the cybersecurity of industrial IoT infrastructures. Ad Hoc Networks 156:103414. doi:10.1016/j.adhoc.2024.103414.