A comprehensive survey of covert communication techniques, limitations and future challenges

I Makhdoom, M Abolhasan, J Lipman - Computers & Security, 2022‏ - Elsevier
Data encryption aims to protect the confidentiality of data at storage, during transmission, or
while in processing. However, it is not always the optimum choice as attackers know the …

A review on machine learning–based approaches for Internet traffic classification

O Salman, IH Elhajj, A Kayssi, A Chehab - Annals of Telecommunications, 2020‏ - Springer
Traffic classification acquired the interest of the Internet community early on. Different
approaches have been proposed to classify Internet traffic to manage both security and …

Blocking-resistant communication through domain fronting

D Fifield, C Lan, R Hynes, P Wegmann… - … on Privacy Enhancing …, 2015‏ - petsymposium.org
We describe “domain fronting,” a versatile censorship circumvention technique that hides
the remote endpoint of a communication. Domain fronting works at the application layer …

Elligator: elliptic-curve points indistinguishable from uniform random strings

DJ Bernstein, M Hamburg, A Krasnova… - Proceedings of the 2013 …, 2013‏ - dl.acm.org
Censorship-circumvention tools are in an arms race against censors. The censors study all
traffic passing into and out of their controlled sphere, and try to disable censorship …

Bringing a gan to a knife-fight: Adapting malware communication to avoid detection

M Rigaki, S Garcia - 2018 IEEE Security and Privacy …, 2018‏ - ieeexplore.ieee.org
Generative Adversarial Networks (GANs) have been successfully used in a large number of
domains. This paper proposes the use of GANs for generating network traffic in order to …

The parrot is dead: Observing unobservable network communications

A Houmansadr, C Brubaker… - 2013 IEEE Symposium …, 2013‏ - ieeexplore.ieee.org
In response to the growing popularity of Tor and other censorship circumvention systems,
censors in non-democratic countries have increased their technical capabilities and can …

Meteor: Cryptographically secure steganography for realistic distributions

G Kaptchuk, TM Jois, M Green, AD Rubin - Proceedings of the 2021 …, 2021‏ - dl.acm.org
Despite a long history of research and wide-spread applications to censorship resistant
systems, practical steganographic systems capable of embedding messages into realistic …

[PDF][PDF] The cyber security body of knowledge

D Basin - University of Bristol, ch. Formal Methods for, 2021‏ - cybok.org
The CyBOK project would like to understand how the CyBOK is being used and its uptake.
The project would like organisations using, or intending to use, CyBOK for the purposes of …

Seeing through network-protocol obfuscation

L Wang, KP Dyer, A Akella, T Ristenpart… - Proceedings of the 22nd …, 2015‏ - dl.acm.org
Censorship-circumvention systems are designed to help users bypass Internet censorship.
As more sophisticated deep-packet-inspection (DPI) mechanisms have been deployed by …

Protocol misidentification made easy with format-transforming encryption

KP Dyer, SE Coull, T Ristenpart… - Proceedings of the 2013 …, 2013‏ - dl.acm.org
Deep packet inspection (DPI) technologies provide much-needed visibility and control of
network traffic using port-independent protocol identification, where a network flow is …