Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

PDF

Elizabethtown College

Conference

2019

Articles 1 - 1 of 1

Full-Text Articles in Physical Sciences and Mathematics

Applying Machine Learning To Encrypted Network Traffic For Malware Detection, Derek Manning Jul 2019

Applying Machine Learning To Encrypted Network Traffic For Malware Detection, Derek Manning

Landmark Conference Summer Research Symposium

The landscape of network analysis is ever-evolving as the fields of technology and business progress. While the landscape of the analysis may change, at the core of network analysis is the detection of malicious activity. In real-time traffic flow, it is non-trivial to determine whether a particular flow is malicious in nature. Most malicious software (malware) analysis is done after the flow has already reached its end target, and is analyzed in the form of network traffic captures. For any network analysis system, it is important that the privacy of the data being transmitted it not compromised in the process. …