نتایج جستجو برای: encrypted traffic

تعداد نتایج: 104589  

2010

networks and data infrastructures. Instead of just forwarding packets, these intelligent devices implement various policies, like security and quality of service provisioning, that are based on packet content. Consequently, test labs evaluating today’s infrastructures need to simulate real-world traffic that emulates actual user behavior with respect to overall throughput and transaction types....

Journal: :IEEE Transactions on Network and Service Management 2019

Journal: :IEEE Transactions on Information Forensics and Security 2018

Journal: :CoRR 2017
Sankalp Bagaria R. Balaji B. S. Bindhumadhava

TLS uses X.509 certificates for server authentication. A X.509 certificate is a complex document and various innocent errors may occur while creating/ using it. Also, many certificates belong to malicious websites and should be rejected by the client and those web servers should not be visited. Usually, when a client finds a certificate that is doubtful using the traditional tests, it asks for ...

1998
Heyning Cheng Ron Avnur

The SSL protocol, an application-layer mechanism widely used for encrypted Web browsing, was not designed to address traffic analysis attacks. We investigate the threat to privacy posed by such attacks and consider possible defenses. We implement a prototype of a traffic analysis attack and employ it to identify the pages visited by users browsing a Web site. Numerical models and simulations ar...

Journal: :The Journal of Korean Institute of Communications and Information Sciences 2015

Journal: :International Journal of Distributed Sensor Networks 2018

Journal: :Neurocomputing 2022

Internet traffic recognition is an essential tool for access providers since recognizing categories related to different data packets transmitted on a network help them define adapted priorities. That means, instance, high priority requirements audio conference and low ones file transfer, enhance user experience. As internet becomes increasingly encrypted, the mainstream classic technique, payl...

Journal: :International Journal for Information Security Research 2020

Journal: :International Journal of Information Security 2022

Over the years, use of smartphones has come to dominate several areas, improving our lives, offering us convenience, and reshaping daily work circumstances. Beyond traditional for communication, they are used many peripheral tasks such as gaming, browsing, shopping. A significant amount traffic over Internet belongs applications running mobile devices. Applications encrypt their communication e...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید