Analysis of Encrypted Internet Traffic with Deep Learning

Lu Fangzheng

Supervisor: Dr. S.M. Yiu

Introduction

Background & Objective

Background & Objective, May 3rd, 2018

Back in 1903, when the first hacker in the history, Nevil Maskelyn, disrupted John Ambrose Fleming’s public demonstration by hacking into wireless telegraphy, nobody would even image how significant cyber security would ne today. In the past decades, with the widespread of personal computer and rapid development of internet technology, people started to equip themselves with weapons to protect themselves against potential attacks from the internet.

Updated on   May 3rd


deep-learning

Methodology

Methodology, May 3rd, 2018

This project involves building a deep learning model to analyze the encrypted network traffic to allow people to protect their personal computer from cyber attack. Deep learning model will be employed to classify the encrypted network packets to extract useful information like whether the packets are sent through VPN, whether the packets contain malicious contents.This section includes all the detailed methodology of this project.

Updated on   May 3rd, 2018

About Us

Lu Fangzheng, UID: 3035142780

FYP Account: fyp17034

Supervisor: Dr. S.M. Yiu


Progress of the project

  • Image Deliverable Phase 1 Complete
    Detailed Project Plan
  • Image Deliverable Phase 2 Complete
    Intermediate Report
  • Image Final Phase Complete
    Final Report, Presentataion, and Poster