نتایج جستجو برای: encrypted traffic

تعداد نتایج: 104589  

2006
Julien Olivain Jean Goubault-Larrecq

What happens when your implementation of SSL or some other cryptographic protocol is subverted through a buffer overflow attack? You have been hacked, yes. Unfortunately, you may be unaware of it: because normal traffic is encrypted, most IDSs cannot monitor it. We propose a simple, yet efficient technique to detect most of such attacks, by computing the entropy of the flow and comparing it aga...

2015
Kanchan Kaushal Varsha Sahni Vikash Kumar Anshu Jain Gurvinder Singh Baicher Kalpana Sharma M K Ghose Aristides Mpitziopoulos Damianos Gavalas Charalampos Konstantopoulos Jennifer Yick Biswanath Mukherjee Yong Wang Garhan Attebury Al-Sakib Khan Pathan Hyung-Woo Lee Choong Seon Hong

WSNs plays an important role in many of the applications like patient health monitoring, battlefields surveillance, traffic control, environmental observation, home automation and building intrusion surveillance. WSNs are convenient, cost effective, and give ease of integration with other networks and their components. However, wireless technology also produces new threats. Since WSNs communica...

2015
Simon Campbell Andrew Ker

The RC4 stream cipher is used to protect messages from eavesdroppers in many settings, including some of the Transport Layer Security (TLS) protocols used to secure much internet traffic. Nonuniformities in the output of a stream cipher are a weakness that an eavesdropper can exploit to gain information about the encrypted messages. In this report we verify the size of some nonuniformities of R...

2014

This chapter deals with a stream cipher method for encrypting images. As digital devices such as scanners and digital cameras become more and more available and mass storage media for digital data become more affordable, the use of digital images in practical applications are becoming more widespread. The wired and wireless IP networks are vulnerable to eavesdropping making essential the data t...

2003
William Weinstein Janet Lepanto

By monitoring Internet traffic in the vicinity of a given host—which can be a single computer or a gateway device with multiple computers behind it—an attacker can observe communications originating from and destined to this host. Even if the message contents are encrypted, the IP addresses must remain visible for the packets to be properly routed throughout the open Internet. So the attacker c...

2011
Mitra Baratchi Kamal Jamshidi

Wireless sensor networks are low powered energy operated sensors mainly deployed in remote environments. Using methods to save energy is of utmost importance in these systems. Data transmission in such networks is by far the most energy consuming task and by reducing its contribution a great amount of energy can be saved. Data aggregation can extend network lifetime and reduce its traffic. Howe...

Journal: :Digital Investigation 2010
Liaqat Ali Khan Muhammad Shamim Baig Amr M. Youssef

Most of the voice over IP (VoIP) traffic is encrypted prior to its transmission over the Internet. This makes the identity tracing of perpetrators during forensic investigations a challenging task since conventional speaker recognition techniques are limited to unencrypted speech communications. In this paper, we propose techniques for speaker identification and verification from encrypted VoIP...

2017
Ruchika Aggarwal Nanhay Singh

Traffic classification is an automated process which categorizes computer network traffic according to various parameters into a number of traffic classes. Many supervised classification algorithms and unsupervised clustering algorithms have been applied to categorize Internet traffic. Traditional traffic classification methods include the port-based prediction methods and payloadbased deep ins...

2016
Brendan Saltaformaggio Hongjun Choi Kristen Johnson Yonghwi Kwon Qi Zhang Xiangyu Zhang Dongyan Xu John Qian

Smartphone apps have changed the way we interact with online services, but highly specialized apps come at a cost to privacy. In this paper we will demonstrate that a passive eavesdropper is capable of identifying finegrained user activities within the wireless network traffic generated by apps. Despite the widespread use of fully encrypted communication, our technique, called NetScope, is base...

2013
Vinodh Ewards

The classification of traffic provides essential data for network management and research. Several classification approaches are developed and proposed to protect the network resources or enforce organizational policies. Whereas the port number based classification works only for some well-known applications and payload based classification is not suitable for encrypted packet payloads that mak...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید