Exploring quic security and privacy: A comprehensive survey on quic security and privacy vulnerabilities, threats, attacks and future research directions

YA Joarder, C Fung - IEEE Transactions on Network and …, 2024 - ieeexplore.ieee.org
QUIC is a modern transport protocol aiming to improve Web connection performance and
security. It is the transport layer for HTTP/3. QUIC offers numerous advantages over …

ZDNS: a fast DNS toolkit for internet measurement

L Izhikevich, G Akiwate, B Berger… - Proceedings of the …, 2022 - dl.acm.org
Active DNS measurement is fundamental to understanding and improving the DNS
ecosystem. However, the absence of an extensible, high-performance, and easy-to-use …

A Survey on the Security Issues of QUIC

YA Joarder, C Fung - 2022 6th Cyber Security in Networking …, 2022 - ieeexplore.ieee.org
A newly established multiplexed network protocol-QUIC, which is based on User Datagram
Protocol (UDP), has emerged in recent years and gained a large share of Internet traffic …

Understanding Web Fingerprinting with a Protocol-Centric Approach

B Cebere, C Rossow - Proceedings of the 27th International Symposium …, 2024 - dl.acm.org
Recent breakthroughs in machine learning (ML) have unleashed several approaches to
fingerprinting web traffic based on traffic analysis. In particular, researchers report …

Early Traffic Classification with Encrypted ClientHello: a Multi-Country Study

D Shamsimukhametov, A Kurapov… - IEEE …, 2024 - ieeexplore.ieee.org
Quality of service provisioning in modern networks requires traffic to be classified as quickly
as possible according to its requirements and service type. However, traffic classification …

Maybenot: A framework for traffic analysis defenses

T Pulls, E Witwer - Proceedings of the 22nd Workshop on Privacy in the …, 2023 - dl.acm.org
In light of the increasing ubiquity of end-to-end encryption and the use of technologies such
as Tor and VPNs, analyzing communications metadata---traffic analysis---is a last resort for …

Connecting the Dots in the Sky: Website Fingerprinting in Low Earth Orbit Satellite Internet

P Singh, D Barradas, T Elahi, N Limam - 2024 - uwspace.uwaterloo.ca
Despite the implementation of encrypted channels, such as those offered by anonymity
networks like Tor, network adversaries have demonstrated the ability to compromise users' …

A novel TLS-based Fingerprinting approach that combines feature expansion and similarity map**

A Thomson, L Maglaras, N Moradpoor - arxiv preprint arxiv:2410.03817, 2024 - arxiv.org
Malicious domains are part of the landscape of the internet but are becoming more prevalent
and more dangerous to both companies and individuals. They can be hosted on variety of …

An Analysis of QUIC Connection Migration in the Wild

A Buchet, C Pelsser - arxiv preprint arxiv:2410.06066, 2024 - arxiv.org
As QUIC gains attention, more applications that leverage its capabilities are emerging.
These include defenses against on-path IP tracking and traffic analysis. However, the …

Tor Traffic Analysis: Data-driven Attacks and Defenses

JK Holland Jr - 2024 - search.proquest.com
Anonymity networks such as Tor aim to protect the confidentiality of both the data and
metadata—who communicates with whom—of their users. However, traffic analysis …