A survey on encrypted network traffic analysis applications, techniques, and countermeasures

E Papadogiannaki, S Ioannidis - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
The adoption of network traffic encryption is continually growing. Popular applications use
encryption protocols to secure communications and protect the privacy of users. In addition …

CETAnalytics: Comprehensive effective traffic information analytics for encrypted traffic classification

C Dong, C Zhang, Z Lu, B Liu, B Jiang - Computer Networks, 2020 - Elsevier
Encrypted traffic classification is of great significance for advanced network services. Though
encryption methods seem unbroken in protecting users' privacy, existing studies have …

Network intrusion detection in encrypted traffic

E Papadogiannaki, G Tsirantonakis… - 2022 IEEE Conference …, 2022 - ieeexplore.ieee.org
Traditional signature-based intrusion detection systems inspect packet headers and
payloads to report any malicious or abnormal traffic behavior that is observed in the network …

CNN-based anomaly detection for packet payloads of industrial control system

JY Song, R Paul, JH Yun, HC Kim… - International Journal of …, 2021 - inderscienceonline.com
Industrial control systems (ICSs) are more vulnerable to cyber threats owing to their network
connectivity. The intrusion detection system (IDS) has been deployed to detect sophisticated …

When free tier becomes free to enter: A non-intrusive way to identify security cameras with no cloud subscription

Y He, Q He, S Fang, Y Liu - Proceedings of the 2023 ACM SIGSAC …, 2023 - dl.acm.org
Wireless security cameras may deter intruders. Accompanying the hardware, consumers
may pay recurring monthly fees for recording videos to the cloud, or use the free tier offering …

[HTML][HTML] Acceleration of intrusion detection in encrypted network traffic using heterogeneous hardware

E Papadogiannaki, S Ioannidis - Sensors, 2021 - mdpi.com
More than 75% of Internet traffic is now encrypted, and this percentage is constantly
increasing. The majority of communications are secured using common encryption protocols …

MBTree: Detecting encryption RATs communication using malicious behavior tree

C Dong, Z Lu, Z Cui, B Liu… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Network trace signature matching is one reliable approach to detect active Remote Control
Trojan,(RAT). Compared to statistical-based detection of malicious network traces in the face …

Pump up the JARM: Studying the evolution of Botnets using active TLS fingerprinting

E Papadogiannaki, S Ioannidis - 2023 IEEE Symposium on …, 2023 - ieeexplore.ieee.org
The growing adoption of network encryption protocols, like TLS, has altered the scene of
monitoring network traffic. With the advent increase in network encryption, typical DPI …

Unmasking the Internet: A Survey of Fine-Grained Network Traffic Analysis

Y Feng, J Li, J Mirkovic, C Wu, C Wang… - … Surveys & Tutorials, 2025 - ieeexplore.ieee.org
Fine-grained traffic analysis (FGTA), as an advanced form of traffic analysis (TA), aims to
analyze network traffic to deduce fine-grained information on or above the application layer …

Classifying and tracking enterprise assets via dual-grained network behavioral analysis

M Lyu, HH Gharakheili, V Sivaraman - Computer Networks, 2022 - Elsevier
Enterprise networks continue to grow in scale and complexity, encompassing a wide range
of Internet-connected end-points including web servers/proxies, DNS/VPN/mail servers, and …