نتایج جستجو برای: encrypted traffic

تعداد نتایج: 104589  

Journal: :Computers & Security 2023

The popularity of encryption mechanisms poses a great challenge to malicious traffic detection. reason is traditional detection techniques cannot work without the decryption encrypted traffic. Currently, research on has focused feature extraction and choice machine learning or deep algorithms. In this paper, we first provide an in-depth analysis features compare different state-of-the-art creat...

Journal: :CoRR 2014
Saman Feghhi Douglas J. Leith

We introduce an attack against encrypted web traffic that makes use only of packet timing information on the uplink. This attack is therefore impervious to existing packet padding defences. In addition, unlike existing approaches this timing-only attack does not require knowledge of the start/end of web fetches and so is effective against traffic streams. We demonstrate the effectiveness of the...

2017
Noah Apthorpe Dillon Reisman Nick Feamster

The increasing popularity of specialized Internetconnected devices and appliances, dubbed the Internet-of-Things (IoT), promises both new conveniences and new privacy concerns. Unlike traditional web browsers, many IoT devices have always-on sensors that constantly monitor fine-grained details of users’ physical environments and influence the devices’ network communications. Passive network obs...

Journal: :IET Communications 2011
C. B. Hays

QoS applications rely on accurate detection of protocols in order to effectively manage traffic passing across networks. Peer-to-peer developers already use encryption and network overlays to bypass ISP traffic shaping but their methods only obfuscate telltale signatures. Unidentifiable or encrypted traffic can still be classified as such and therefore can still be managed. The author addresses...

Journal: :CoRR 2017
Aaron Gibson Hamilton Scott Clouse

Growing concern for individual privacy, driven by an increased public awareness of the degree to which many of our electronic activities are tracked by interested third parties (e.g. Google knows what I am thinking before I finish entering my search query), is driving the development anonymizing technologies (e.g. Tor). The coming mass migration to IPv6 as the primary transport of Internet traf...

2013
Andrew M. White Srinivas Krishnan Michael Bailey Fabian Monrose Phillip A. Porras

Opaque traffic, i.e., traffic that is compressed or encrypted, incurs particularly high overhead for deep packet inspection engines and often yields little or no useful information. Our experiments indicate that an astonishing 89% of payload-carrying TCP packets — and 86% of bytes transmitted — are opaque, forcing us to consider the challenges this class of traffic presents for network security...

Journal: :CoRR 2017
Mohammad Lotfollahi Ramin Shirali Hossein Zade Mahdi Jafari Siavoshani Mohammdsadegh Saberian

Network traffic classification has become significantly important with rapid growth of current Internet network and online applications. There have been numerous studies on this topic which have led to many different approaches. Most of these approaches use predefined features extracted by an expert in order to classify network traffic. In contrast, in this study, we propose a deep learning bas...

Journal: :CoRR 2017
Erwin van de Wiel Mark Scanlon Nhien-An Le-Khac

In criminal investigations, telecommunication wiretaps have become a common technique used by law enforcement. While phone-based wiretapping is well documented and the procedure for their execution are well known, the same cannot be said for Internet taps. Lawfully intercepted network traffic often contains a lot of encrypted traffic making it increasingly difficult to find useful information i...

Journal: :Expert Systems With Applications 2022

Ransomware is considered as a significant threat for home users and enterprises. In corporate scenarios, users’ computers usually store only system program files, while all the documents are accessed from shared servers. these one crypto-ransomware infected host capable of locking access to files it has to, which can be whole set workgroup users. We propose tool detect block activity based on f...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید