[Home ] [Archive]   [ فارسی ]  
:: Main :: About :: Current Issue :: Archive :: Search :: Submit :: Contact ::
Main Menu
Home::
Journal Information::
Articles archive::
For Authors::
For Reviewers::
Registration::
Site Facilities::
Indexing::
Contact us::
::
Search in website

Advanced Search
..
Receive site information
Enter your Email in the following box to receive the site news and information.
..
Print ISSN
Print ISSN: 2476-3047
..
:: Volume 11, Issue 2 (3-2023) ::
منادی 2023, 11(2): 33-43 Back to browse issues page
Designing and Implementing two Laboratory Samples of the Intelligent System for Detecting Encrypted VoIP Skype Traffic and the Lantern Escape Tool using Deep Learning Method
Mahmoud saeidi * , Nasrin Taaj , Azadeh Bamdad Moghaddam
Information and Technology Research Communication Institute (ITRC), Tehran, Iran
Abstract:   (1269 Views)
The proposed method for implementing cryptographic traffic detector systems and evasive tools in this article is a method based on deep learning, which due to the importance of optimal and automatic extraction of features from the input data set, an automatic encoder network has been used in the feature extraction phase. Then, the output of the middle hidden layer of this network is applied to a deep convolutional neural network. Deep convolutional neural networks can play an effective role in improving the performance of the system by taking into account the spatial connections between features. Finally, the output of deep convolutional neural network is also applied to two fully connected layers in order to perform the classification process. So that the number of neurons in the second fully connected layer will be equal to the expected number of layers of the system. In the first part of this article, the specifications of the proposed systems for the implementation of cryptographic traffic detectors and evasion tools will be mentioned in terms of operational architecture and features. Then, the characteristics of the networks used in the implementation of the system, and the method of their integration to form the final identifier system are briefly stated. After that, the training stage of the system and its implementation method will be introduced and at the end, how to adjust the parameters of the model and the mechanisms used to improve the overall performance of the system and the results of its performance evaluation will be presented.
Keywords: the proposed architecture of the intelligent system for identifying cryptographic, traffic and evasive tools, deep learning, proposed automatic coding network, deep convolutional neural networks, evaluation of system performance tests
Full-Text [PDF 1643 kb]   (1084 Downloads)    
Type of Study: Research Article | Subject: Special
Received: 2023/02/24 | Accepted: 2023/03/1 | Published: 2023/03/1
Send email to the article author

Add your comments about this article
Your username or Email:

CAPTCHA


XML   Persian Abstract   Print


Download citation:
BibTeX | RIS | EndNote | Medlars | ProCite | Reference Manager | RefWorks
Send citation to:

saeidi M, Taaj N, Bamdad Moghaddam A. Designing and Implementing two Laboratory Samples of the Intelligent System for Detecting Encrypted VoIP Skype Traffic and the Lantern Escape Tool using Deep Learning Method. منادی 2023; 11 (2) :33-43
URL: http://monadi.isc.org.ir/article-1-229-en.html


Rights and permissions
Creative Commons License This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Volume 11, Issue 2 (3-2023) Back to browse issues page
دوفصل نامه علمی  منادی امنیت فضای تولید و تبادل اطلاعات( افتا) Biannual Journal Monadi for Cyberspace Security (AFTA)
Persian site map - English site map - Created in 0.05 seconds with 39 queries by YEKTAWEB 4660