نتایج جستجو برای: encrypted traffic

تعداد نتایج: 104589  

Journal: :Security and Communication Networks 2021

An increasing number of Internet application services are relying on encrypted traffic to offer adequate consumer privacy. Anomaly detection in circumvent and mitigate cyber security threats is, however, an open ongoing research challenge due the limitation existing classification techniques. Deep learning is emerging as a promising paradigm, allowing reduction manual determination feature set ...

Journal: :CoRR 2016
Jonathan Muehlstein Yehonatan Zion Maor Bahumi Itay Kirshenboim Ran Dubin Amit Dvir Ofir Pele

Desktops and laptops can be maliciously exploited to violate privacy. There are two main types of attack scenarios: active and passive. In this paper, we consider the passive scenario where the adversary does not interact actively with the device, but he is able to eavesdrop on the network traffic of the device from the network side. Most of the internet traffic is encrypted and thus passive at...

2010
T. Kivinen D. McDonald

This document describes a set of heuristics for distinguishing IPsec ESP-NULL (Encapsulating Security Payload without encryption) packets from encrypted ESP packets. These heuristics can be used on intermediate devices, like traffic analyzers, and deep-inspection engines, to quickly decide whether or not a given packet flow is encrypted, i.e., whether or not it can be inspected. Use of these he...

2017

II. EVALUATION OF INDIVIDUAL CRITERIA Assignment challenging Evaluation of thesis difficulty of assignment. The difficulty assignment of this thesis was challenging. The student worked on a problem that is even challenging for most security companies: the analysis of malware using encrypted connections. The topic requires several different skills to be analyzed properly: understanding of encryp...

Journal: :Simulation 2009
David M. Nicol Nabil Schear

Encrypted protocols, such as SSL, are becoming more prevalent because of the growing use of e-commerce, anonymity services, and secure authentication. Likewise, traffic analysis is becoming more common because it is often the only way to analyze these protocols. Though there are many valid uses for traffic analysis (such as network policy enforcement and intrusion detection), it can also be use...

Journal: :Journal of King Saud University - Computer and Information Sciences 2015

Journal: :International Journal of Network Management 2015

2001
X. Fu B. Graham R. Bettati

The first objective of NetCamo is to provide security services beyond the traditional encryption techniques that have played an important role in network security. It is a misconception that to secure a network, one only needs to encrypt the traffic. With increasing amounts of traffic being encrypted and its contents, therefore, being beyond the reach of effective cryptanalysis, attention is sh...

2012
Bradley Miller Bradley A. Miller Anthony D. Joseph

In this thesis, we apply the pattern recognition and data processing strengths of machine learning to accomplish traffic analysis objectives. Traffic analysis relies on the use of observable features of encrypted traffic in order to infer plaintext contents. We apply a clustering technique to HTTPS encrypted traffic on websites covering medical, legal and financial topics and achieve accuracy r...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید