[HTML][HTML] Challenges and Advances in Analyzing TLS 1.3-Encrypted Traffic: A Comprehensive Survey

J Zhou, W Fu, W Hu, Z Sun, T He, Z Zhang - Electronics, 2024 - mdpi.com
The widespread adoption of encrypted communication protocols has significantly enhanced
network security and user privacy, simultaneously elevating the importance of encrypted …

A comprehensive survey on deep packet inspection for advanced network traffic analysis: issues and challenges

M Çelebi, A Özbilen, U Yavanoğlu - Niğde Ömer Halisdemir …, 2023 - dergipark.org.tr
Deep Packet Inspection (DPI) provides full visibility into network traffic by performing
detailed analysis on both packet header and packet payload. Accordingly, DPI has critical …

Graph based encrypted malicious traffic detection with hybrid analysis of multi-view features

Y Hong, Q Li, Y Yang, M Shen - Information Sciences, 2023 - Elsevier
At present, the TLS cryptographic protocol is widely deployed. While protecting the security
and integrity of transmitted information, it also makes the detection of malicious behavior …

Building in-the-cloud network functions: Security and privacy challenges

P Jiang, Q Wang, M Huang, C Wang, Q Li… - Proceedings of the …, 2021 - ieeexplore.ieee.org
Network function virtualization (NFV) has been promising to improve the availability,
programmability, and flexibility of network function deployment and communication facilities …

SlimBox: Lightweight packet inspection over encrypted traffic

Q Liu, Y Peng, H Jiang, J Wu, T Wang… - … on Dependable and …, 2022 - ieeexplore.ieee.org
Due to the explosive increase of enterprise network traffic, middleboxes that inspect packets
through customized rules have been widely outsourced for cost-saving. Despite promising …

[HTML][HTML] A survey on TLS-encrypted malware network traffic analysis applicable to security operations centers

C Oh, J Ha, H Roh - Applied Sciences, 2021 - mdpi.com
Recently, a majority of security operations centers (SOCs) have been facing a critical issue
of increased adoption of transport layer security (TLS) encryption on the Internet, in network …

Dev-eta: an interpretable detection framework for encrypted malicious traffic

L Yang, S Fu, Y Wang, K Liang, F Mo… - The Computer …, 2023 - academic.oup.com
Traffic encrypted technology enables Internet users to protect their data secrecy, but it also
brings a challenge to malicious package detection. To tackle this issue, researchers have …

A word-level analytical approach for identifying malicious domain names caused by dictionary-based DGA malware

A Satoh, Y Fukuda, G Kitagata, Y Nakamura - Electronics, 2021 - mdpi.com
Computer networks are facing serious threats from the emergence of malware with
sophisticated DGAs (Domain Generation Algorithms). This type of DGA malware …

DCDPI: Dynamic and continuous deep packet inspection in secure outsourced middleboxes

M Deng, K Zhang, P Wu, M Wen… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Secure outsourced middleboxes are deployed in network function virtualization services that
detect malicious activities on communications, which provides privacy-preserving deep …

Detection of anonymising proxies using machine learning

S Miller, K Curran, T Lunney - … Journal of Digital Crime and Forensics …, 2021 - igi-global.com
Abstract Network Proxies and Virtual Private Networks (VPN) are tools that are used every
day to facilitate various business functions. However, they have gained popularity amongst …