نتایج جستجو برای: encrypted traffic

تعداد نتایج: 104589  

2016

"It ia certain that all bodies whatsoever, though they have no sense, yet they have perception; for when one body b applied to another, there is a kind of election to embrace that which i s agreeable, and to exclude or expel that which i s ingrate; and whether th,e body be alterant or altered, evermore a perception precedeth operation; for eke all bodies would be like one to another." Francia B...

Journal: :IEEE Access 2022

Recently, many video streaming services, such as YouTube, Twitch, and Facebook, have contributed to traffic, leading the possibility of unwanted inappropriate content minors or individuals at workplaces. Therefore, monitoring is necessary. Although traffic encrypted, several studies proposed techniques using data decipher users’ activity on web. Dynamic Adaptive Streaming over HTTP (DASH...

Journal: :Computers & Security 2006
Vafa D. Izadinia Derrick G. Kourie Jan H. P. Eloff

Operating System fingerprinting is a reconnaissance method which can be used by attackers or forensic investigators. It identifies a system's identity by observing its responses to targeted probes, or by listening on a network and passively observing its network ‘etiquette’. The increased deployment of encrypted tunnels and Virtual Private Networks (VPNs) calls for the formulation of new finger...

2007
Charles V. Wright Lucas Ballard Fabian Monrose Gerald M. Masson

Voice over IP (VoIP) has become a popular protocol for making phone calls over the Internet. Due to the potential transit of sensitive conversations over untrusted network infrastructure, it is well understood that the contents of a VoIP session should be encrypted. However, we demonstrate that current cryptographic techniques do not provide adequate protection when the underlying audio is enco...

2012
B. Bazeer Ahamed S. Hariharan

Network based attacks have become a serious threat to the critical information infrastructure on which we depend .Identifying the source of the attackers behind the stepping stone(s), it is necessary to correlate the incoming and outgoing flows or connections of a stepping stone. To resist attempts at correlation, the attacker may encrypt or otherwise manipulate the connection traffic. Timing b...

2007
Jeffrey Pang Srinivasan Seshan Adrian Perrig Peter Steenkiste David Wetherall

The proliferation of mobile wireless devices enables or magnifies several privacy threats that traditional link layer confidentiality mechanisms, such as payload encryption, do not protect against: user tracking, profiling, and traffic analysis. For example, it is well known that the exposure of long-lived, unique device addresses can be used to track users over time. Although these addresses c...

Journal: :Information Systems Frontiers 2010
Ruixi Yuan Zhu Li Xiaohong Guan Li Xu

Accurate and timely traffic classification is critical in network security monitoring and traffic engineering. Traditional methods based on port numbers and protocols have proven to be ineffective in terms of dynamic port allocation and packet encapsulation. The signature matching methods, on the other hand, require a known signature set and processing of packet payload, can only handle the sig...

2005
Sebastian Zander Thuy T. T. Nguyen Grenville J. Armitage

A number of key areas in IP network engineering, management and surveillance greatly benefit from the ability to dynamically identify traffic flows according to the applications responsible for their creation. Currently such classifications rely on selected packet header fields (e.g. destination port) or application layer protocol decoding. These methods have a number of shortfalls e.g. many ap...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید