Determining attributes of encrypted data traffic using feature selection method

1Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Encrypted packages such as banking and e-commerce are widely used in various fields because it is advantages in terms of data security. However, the problem occurs when checking attributes package to determine if it is a safe packet instead of malware. The purpose of this study is to get the best attributes using feature selection processes by ranking.The results of this study found that from the two best methods of IG and One R, in average IG better than One R. If based on the results of the response, the data produced for the estimated data of TLS V1.0 IG method has better accuracy compared to the One R method, on the contrary inTLS V1.2 One R data is better than IG.

Cite

CITATION STYLE

APA

Tasmi, Setiawan, H., Stiawan, D., Husnawati, & Valiata, S. A. (2019). Determining attributes of encrypted data traffic using feature selection method. International Journal of Engineering and Advanced Technology, 9(1), 3500–3504. https://doi.org/10.35940/ijeat.A2674.109119

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free