no code implementations • 6 Dec 2023 • Anish Singh Shekhawat, Fabio Di Troia, Mark Stamp
In this paper, we apply three machine learning techniques to the problem of distinguishing malicious encrypted HTTP traffic from benign encrypted traffic and obtain results comparable to previous work.