z-logo
open-access-imgOpen Access
Can We Detect Malicious Behaviours in Encrypted DNS Tunnels Using Network Flow Entropy?
Author(s) -
Yulduz Khodjaeva,
A. Nur Zincir-Heywood,
İbrahim Zincir
Publication year - 2022
Publication title -
journal of cyber security and mobility
Language(s) - English
Resource type - Journals
eISSN - 2245-4578
pISSN - 2245-1439
DOI - 10.13052/jcsm2245-1439.1135
Subject(s) - byte , computer science , entropy (arrow of time) , network packet , encryption , approximate entropy , classifier (uml) , data mining , artificial intelligence , theoretical computer science , pattern recognition (psychology) , computer network , operating system , physics , quantum mechanics

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here