<?xml version="1.0" encoding="utf-8"?>
<?xml-stylesheet type="text/xsl" href="style/detail_T.xsl"?>
<bibitem type="C">   <ARLID>0507114</ARLID> <utime>20240103222342.8</utime><mtime>20190731235959.9</mtime>   <SCOPUS>85030325858</SCOPUS> <WOS>000426964900077</WOS>  <DOI>10.1145/3098954.3107007</DOI>           <title language="eng" primary="1">End-node Fingerprinting for Malware Detection on HTTPS Data</title>  <specification> <page_count>7 s.</page_count> <media_type>P</media_type> </specification>   <serial><ARLID>cav_un_epca*0507113</ARLID><ISBN>978-1-4503-5257-4</ISBN><title>Proceedings of the 12th International Conference on Availability, Reliability and Security (ARES'17)</title><part_num/><part_title/><page_num>1-7</page_num><publisher><place>New York</place><name>ACM</name><year>2017</year></publisher></serial>    <keyword>HTTPS data</keyword>   <keyword>Malware detection</keyword>   <keyword>Supervised learning</keyword>    <author primary="1"> <ARLID>cav_un_auth*0352238</ARLID> <name1>Komárek</name1> <name2>T.</name2> <country>CZ</country> </author> <author primary="0"> <ARLID>cav_un_auth*0101197</ARLID> <name1>Somol</name1> <name2>Petr</name2> <full_dept language="cz">Rozpoznávání obrazu</full_dept> <full_dept>Department of Pattern Recognition</full_dept> <department language="cz">RO</department> <department>RO</department> <institution>UTIA-B</institution> <full_dept>Department of Pattern Recognition</full_dept> <fullinstit>Ústav teorie informace a automatizace AV ČR, v. v. i.</fullinstit> </author>   <source> <url>http://library.utia.cas.cz/separaty/2019/RO/somol-0507114.pdf</url> </source>        <cas_special>  <abstract language="eng" primary="1">One of the current challenges in network intrusion detection research is the malware communicating over HTTPS protocol. Usually the task is to detect infected end-nodes with this type of malware by monitoring network traffc. The challenge lies in a very limited number of weak features that can be extracted from the network traffc capture of encrypted HTTP communication. This paper suggests a novel fingerprinting method that addresses this problem by building a higher-level end-node representation on top of the weak features. Conducted large-scale experiments on real network data show superior performance of the proposed method over the state-of-the-art solution in terms of both a lower number of produced false alarms (precision) and a higher number of detected infections (recall).</abstract>    <action target="WRD"> <ARLID>cav_un_auth*0377822</ARLID> <name>the 12th International Conference on Availability, Reliability and Security (ARES'17)</name> <dates>20170829</dates> <unknown tag="mrcbC20-s">20170901</unknown> <place>Reggio Calabria</place> <country>IT</country>  </action>  <RIV>BC</RIV> <FORD0>20000</FORD0> <FORD1>20200</FORD1> <FORD2>20204</FORD2>    <reportyear>2020</reportyear>      <num_of_auth>2</num_of_auth>  <presentation_type> PR </presentation_type> <inst_support> RVO:67985556 </inst_support>  <permalink>http://hdl.handle.net/11104/0298533</permalink>   <confidential>S</confidential>  <article_num> 77 </article_num> <unknown tag="mrcbC86"> 3+4 Proceedings Paper Computer Science Information Systems  </unknown> <unknown tag="mrcbC86"> 3+4 Proceedings Paper Computer Science Information Systems  </unknown> <unknown tag="mrcbC86"> 3+4 Proceedings Paper Computer Science Information Systems  </unknown>       <arlyear>2017</arlyear>       <unknown tag="mrcbU14"> 85030325858 SCOPUS </unknown> <unknown tag="mrcbU24"> PUBMED </unknown> <unknown tag="mrcbU34"> 000426964900077 WOS </unknown> <unknown tag="mrcbU63"> cav_un_epca*0507113 Proceedings of the 12th International Conference on Availability, Reliability and Security (ARES'17) 978-1-4503-5257-4 1 7 New York ACM 2017 </unknown> </cas_special> </bibitem>