Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

A survey on tls-encrypted malware network traffic analysis applicable to security operations centers

Full metadata record
DC Field Value Language
dc.contributor.authorOh, C.-
dc.contributor.authorHa, J.-
dc.contributor.authorRoh, H.-
dc.date.accessioned2022-02-23T01:40:26Z-
dc.date.available2022-02-23T01:40:26Z-
dc.date.created2022-02-11-
dc.date.issued2022-01-
dc.identifier.issn2076-3417-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/136564-
dc.description.abstractRecently, a majority of security operations centers (SOCs) have been facing a critical issue of increased adoption of transport layer security (TLS) encryption on the Internet, in network traffic analysis (NTA). To this end, in this survey article, we present existing research on NTA and related areas, primarily focusing on TLS-encrypted traffic to detect and classify malicious traffic with deployment scenarios for SOCs. Security experts in SOCs and researchers in academia can obtain useful information from our survey, as the main focus of our survey is NTA methods applicable to malware detection and family classification. Especially, we have discussed pros and cons of three main deployment models for encrypted NTA: TLS interception, inspection using cryptographic functions, and passive inspection without decryption. In addition, we have discussed the state-of-the-art methods in TLS-encrypted NTA for each component of a machine learning pipeline, typically used in the state-of-the-art methods. © 2021 by the authors. Licensee MDPI, Basel, Switzerland.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherMDPI-
dc.titleA survey on tls-encrypted malware network traffic analysis applicable to security operations centers-
dc.typeArticle-
dc.contributor.affiliatedAuthorRoh, H.-
dc.identifier.doi10.3390/app12010155-
dc.identifier.scopusid2-s2.0-85121682256-
dc.identifier.wosid000752633600001-
dc.identifier.bibliographicCitationApplied Sciences (Switzerland), v.12, no.1-
dc.relation.isPartOfApplied Sciences (Switzerland)-
dc.citation.titleApplied Sciences (Switzerland)-
dc.citation.volume12-
dc.citation.number1-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaChemistry-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalResearchAreaMaterials Science-
dc.relation.journalResearchAreaPhysics-
dc.relation.journalWebOfScienceCategoryChemistry, Multidisciplinary-
dc.relation.journalWebOfScienceCategoryEngineering, Multidisciplinary-
dc.relation.journalWebOfScienceCategoryMaterials Science, Multidisciplinary-
dc.relation.journalWebOfScienceCategoryPhysics, Applied-
dc.subject.keywordAuthorMalware-
dc.subject.keywordAuthorNetwork traffic analysis-
dc.subject.keywordAuthorSecurity operations center-
dc.subject.keywordAuthorTraffic classification-
dc.subject.keywordAuthorTransport layer security-
Files in This Item
There are no files associated with this item.
Appears in
Collections
Graduate School > Department of Cyber Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE