Machine learning-powered encrypted network traffic analysis: A comprehensive survey
Traffic analysis is the process of monitoring network activities, discovering specific patterns,
and gleaning valuable information from network traffic. It can be applied in various fields …
and gleaning valuable information from network traffic. It can be applied in various fields …
Measuring {HTTPS} adoption on the web
HTTPS ensures that the Web has a base level of privacy and integrity. Security engineers,
researchers, and browser vendors have long worked to spread HTTPS to as much of the …
researchers, and browser vendors have long worked to spread HTTPS to as much of the …
An adaptive multi-layer botnet detection technique using machine learning classifiers
In recent years, the botnets have been the most common threats to network security since it
exploits multiple malicious codes like a worm, Trojans, Rootkit, etc. The botnets have been …
exploits multiple malicious codes like a worm, Trojans, Rootkit, etc. The botnets have been …
Padding ain't enough: Assessing the privacy guarantees of encrypted {DNS}
DNS over TLS (DoT) and DNS over HTTPS (DoH) encrypt DNS to guard user privacy by
hiding DNS resolutions from passive adversaries. Yet, past attacks have shown that …
hiding DNS resolutions from passive adversaries. Yet, past attacks have shown that …
A survey on TLS-encrypted malware network traffic analysis applicable to security operations centers
Recently, a majority of security operations centers (SOCs) have been facing a critical issue
of increased adoption of transport layer security (TLS) encryption on the Internet, in network …
of increased adoption of transport layer security (TLS) encryption on the Internet, in network …
Fingerprinting Obfuscated Proxy Traffic with Encapsulated {TLS} Handshakes
The global escalation of Internet censorship by nation-state actors has led to an ongoing
arms race between censors and obfuscated circumvention proxies. Research over the past …
arms race between censors and obfuscated circumvention proxies. Research over the past …
Seeing traffic paths: Encrypted traffic classification with path signature features
Although many network traffic protection methods have been developed to protect user
privacy, encrypted traffic can still reveal sensitive user information with sophisticated …
privacy, encrypted traffic can still reveal sensitive user information with sophisticated …
I know what you saw last minute—encrypted http adaptive video streaming title classification
Desktops can be exploited to violate privacy. There are two main types of attack scenarios:
active and passive. We consider the passive scenario where the adversary does not interact …
active and passive. We consider the passive scenario where the adversary does not interact …
[HTML][HTML] An intelligent context-aware threat detection and response model for smart cyber-physical systems
Smart cities, businesses, workplaces, and even residences have all been converged by the
Internet of Things (IoT). The types and characteristics of these devices vary depending on …
Internet of Things (IoT). The types and characteristics of these devices vary depending on …
Analyzing HTTPS encrypted traffic to identify user's operating system, browser and application
J Muehlstein, Y Zion, M Bahumi… - 2017 14th IEEE …, 2017 - ieeexplore.ieee.org
Desktops and laptops can be maliciously exploited to violate privacy. There are two main
types of attack scenarios: active and passive. In this paper, we consider the passive scenario …
types of attack scenarios: active and passive. In this paper, we consider the passive scenario …