نتایج جستجو برای: encrypted traffic

تعداد نتایج: 104589  

2008
Siddharth Maru Timothy X. Brown

This paper examines the denial of service attacks that an 802.16 Broadband Wireless Access network is susceptible to at the physical and medium access control layers. In our threat model, we assume that the attacker is external to the network i.e. the attacker cannot associate with the network and send packets as a participant; nor can the attacker decrypt encrypted data. However , the attacker...

2018
Muhammad Fahad Umer Muhammad Sher Yaxin Bi

The next-generation network provides state-of-the-art access-independent services over converged mobile and fixed networks. Security in the converged network environment is a major challenge. Traditional packet and protocol-based intrusion detection techniques cannot be used in next-generation networks due to slow throughput, low accuracy and their inability to inspect encrypted payload. An alt...

2015
David Choffnes Phillipa Gill Alan Mislove

Traffic differentiation empowers network operators to give different levels of service to different types of network flows, and can be used to manage QoE for end users. Without regulation or accountability, such network management practices could be used to raise the barrier to entry for new technologies, or block them entirely. As a result, the FCC recently passed new rules making differentiat...

Journal: :IEEE Transactions on Cognitive Communications and Networking 2022

Network Traffic Classification (NTC) has become an important feature in various network management operations, e.g., Quality of Service (QoS) provisioning and security services. Machine Learning (ML) algorithms as a popular approach for NTC can promise reasonable accuracy classification deal with encrypted traffic. However, ML-based techniques suffer from the shortage labeled traffic data which...

2006
Gaurav Shah Andrés Molina

This paper introduces JitterBugs, a class of inline interception mechanisms that covertly transmit data by perturbing the timing of input events likely to affect externally observable network traffic. JitterBugs positioned at input devices deep within the trusted environment (e.g., hidden in cables or connectors) can leak sensitive data without compromising the host or its software. In particul...

2008
Jeffrey Pang

The proliferation of mobile wireless devices enables or magnifies several privacy threats that traditional link layer confidentiality mechanisms, such as payload encryption, do not protect against: user tracking, profiling, and traffic analysis. For example, it is well known that the exposure of long-lived, unique device addresses can be used to track users over time. Although these addresses c...

2000
Yin Zhang Vern Paxson

One widely-used technique by which network attackers attain anonymity and complicate their apprehension is by employing stepping stones: they launch attacks not from their own computer but from intermediary hosts that they previously compromised. We develop an efficient algorithm for detecting stepping stones by monitoring a site’s Internet access link. The algorithm is based on the distinctive...

Journal: :Computer and Information Science 2009
Farok Azmat Md Ikhwan Hamdan Jusoff Hj. Kamaruzaman

Virtual Private Network (VPN) can be implemented by corporate and public user in a few methods. The methods included proprietary or open source solutions. It has shown great potential due to its encrypted traffic flow which gives it a secure environment. With a good reception of internet in Malaysia it is unfortunate that the major Internet Service Providers (ISPs) have imposed packet filtering...

2010
Hua Dai Al F. Salam

The purpose of this study is to provide insights into consumers’ perception of service convenience and services consumption experience (conceptualized as two second-order formative constructs) and their potential influence on the development of long-term exchange relationship among consumers and service providers in the context of E-Services or broadly Services in the Electronic Meditated Envir...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید