Machine learning-powered encrypted network traffic analysis: A comprehensive survey

M Shen, K Ye, X Liu, L Zhu, J Kang… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Traffic analysis is the process of monitoring network activities, discovering specific patterns,
and gleaning valuable information from network traffic. It can be applied in various fields …

Measuring {HTTPS} adoption on the web

AP Felt, R Barnes, A King, C Palmer, C Bentzel… - 26th USENIX security …, 2017 - usenix.org
HTTPS ensures that the Web has a base level of privacy and integrity. Security engineers,
researchers, and browser vendors have long worked to spread HTTPS to as much of the …

An adaptive multi-layer botnet detection technique using machine learning classifiers

RU Khan, X Zhang, R Kumar, A Sharif, NA Golilarz… - Applied Sciences, 2019 - mdpi.com
In recent years, the botnets have been the most common threats to network security since it
exploits multiple malicious codes like a worm, Trojans, Rootkit, etc. The botnets have been …

Padding ain't enough: Assessing the privacy guarantees of encrypted {DNS}

J Bushart, C Rossow - 10th USENIX Workshop on Free and Open …, 2020 - usenix.org
DNS over TLS (DoT) and DNS over HTTPS (DoH) encrypt DNS to guard user privacy by
hiding DNS resolutions from passive adversaries. Yet, past attacks have shown that …

A survey on TLS-encrypted malware network traffic analysis applicable to security operations centers

C Oh, J Ha, H Roh - Applied Sciences, 2021 - mdpi.com
Recently, a majority of security operations centers (SOCs) have been facing a critical issue
of increased adoption of transport layer security (TLS) encryption on the Internet, in network …

Fingerprinting Obfuscated Proxy Traffic with Encapsulated {TLS} Handshakes

D Xue, M Kallitsis, A Houmansadr… - 33rd USENIX Security …, 2024 - usenix.org
The global escalation of Internet censorship by nation-state actors has led to an ongoing
arms race between censors and obfuscated circumvention proxies. Research over the past …

Seeing traffic paths: Encrypted traffic classification with path signature features

SJ Xu, GG Geng, XB **, DJ Liu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Although many network traffic protection methods have been developed to protect user
privacy, encrypted traffic can still reveal sensitive user information with sophisticated …

I know what you saw last minute—encrypted http adaptive video streaming title classification

R Dubin, A Dvir, O Pele, O Hadar - IEEE transactions on …, 2017 - ieeexplore.ieee.org
Desktops can be exploited to violate privacy. There are two main types of attack scenarios:
active and passive. We consider the passive scenario where the adversary does not interact …

[HTML][HTML] An intelligent context-aware threat detection and response model for smart cyber-physical systems

Z Noor, S Hina, F Hayat, GA Shah - Internet of Things, 2023 - Elsevier
Smart cities, businesses, workplaces, and even residences have all been converged by the
Internet of Things (IoT). The types and characteristics of these devices vary depending on …

Analyzing HTTPS encrypted traffic to identify user's operating system, browser and application

J Muehlstein, Y Zion, M Bahumi… - 2017 14th IEEE …, 2017 - ieeexplore.ieee.org
Desktops and laptops can be maliciously exploited to violate privacy. There are two main
types of attack scenarios: active and passive. In this paper, we consider the passive scenario …