نتایج جستجو برای: encrypted traffic

تعداد نتایج: 104589  

Journal: :International Journal of Advanced Computer Science and Applications 2018

2010
Robert Koch Gabi Dreo Rodosek

The percentage of encrypted network traffic increases steadily not only by virtual private networks of companies but also by protocols like SSH or SSL in the private sector. Traditional Intrusion Detection Systems (IDS) are not able to cope with encrypted traffic. There are a few systems which are able to handle encrypted lines but none of them is applicable in general because of the necessity ...

2010
Michael Backes Goran Doychev Markus Dürmuth Boris Köpf

Transmitting voice communication over untrusted networks puts personal information at risk. Although voice streams are typically encrypted to prevent unwanted eavesdropping, additional features of voice communication protocols might still allow eavesdroppers to discover information on the transmitted content and the speaker. We develop a novel approach for unveiling the identity of speakers who...

Journal: :Proceedings of the ACM on Measurement and Analysis of Computing Systems 2019

Journal: :CoRR 2016
Ran Dubin Amit Dvir Ofir Pele Ofer Hadar Itay Richman Ofir Trabelsi

The increasing popularity of HTTP adaptive video streaming services has dramatically increased bandwidth requirements on operator networks, which attempt to shape their traffic through Deep Packet Inspection (DPI). However, Google and certain content providers have started to encrypt their video services. As a result, operators often encounter difficulties in shaping their encrypted video traff...

2011
Xiapu Luo Peng Zhou Edmond W. W. Chan Wenke Lee Rocky K. C. Chang Roberto Perdisci

Leakage of private information from web applications— even when the traffic is encrypted—is a major security threat to many applications that use HTTP for data delivery. This paper considers the problem of inferring from encrypted HTTP traffic the web sites or web pages visited by a user. Existing browser-side approaches to this problem cannot defend against more advanced attacks, and serversid...

2013
Mehdi Barati Azizol Abdullah Ramlan Mahmod Norwati Mustapha Nur Izura Udzir

Intrusion Detection System (IDS) is one method to detect unauthorized intrusions into computer systems and networks. On the other hand, encrypted exchanges between users are widely used to ensure data security. Traditional IDSs are not able to reactive efficiently in encrypted and tunneled traffic due to inability to analyze packet content. An encrypted malicious traffic is able to evade the de...

Journal: :Electronics 2022

The SSL/TLS protocol is widely used in data encryption transmission. Aiming at the problem of detecting SSL/TLS-encrypted malicious traffic with small-scale and unbalanced training data, a deep-forest-based detection method called DF-IDS proposed this paper. According to characteristics SSL/TSL protocol, network was split into sessions according 5-tuple information. Each session then transforme...

2007
Meng-Da Wu Stephen Wolthusen

Network forensics is increasingly hampered by the ubiquitous use of encrypted channels by legitimate and illegitimate network traffic. Both types of traffic are frequently tunneled over application-layer encryption mechanisms, generally using the ubiquitous TLS (SSL) protocol. This results in traditional network forensics tools being largely limited to recording external characteristics (source...

2010
Ye Zhu

Silence suppression, an essential feature of speech communications over the Internet, saves bandwidth by disabling voice packet transmission when silence is detected. On the other hand, silence suppression enables an adversary to recover talk patterns from packet timing. In this paper, we investigate privacy leakage through the silence suppression feature. More specifically, we propose a new cl...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید