A comprehensive survey of recent internet measurement techniques for cyber security
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …
vulnerable to its security flaws. Despite substantial efforts to address many of these …
A survey on DNS encryption: Current development, malware misuse, and inference techniques
The domain name system (DNS) that maps alphabetic names to numeric Internet Protocol
(IP) addresses plays a foundational role in Internet communications. By default, DNS …
(IP) addresses plays a foundational role in Internet communications. By default, DNS …
Realtime robust malicious traffic detection via frequency domain analysis
Machine learning (ML) based malicious traffic detection is an emerging security paradigm,
particularly for zero-day attack detection, which is complementary to existing rule based …
particularly for zero-day attack detection, which is complementary to existing rule based …
Doh insight: Detecting dns over https by machine learning
Over the past few years, a new protocol DNS over HTTPS (DoH) has been created to
improve users' privacy on the internet. DoH can be used instead of traditional DNS for …
improve users' privacy on the internet. DoH can be used instead of traditional DNS for …
Detecting unknown encrypted malicious traffic in real time via flow interaction graph analysis
In this paper, we propose HyperVision, a realtime unsupervised machine learning (ML)
based malicious traffic detection system. Particularly, HyperVision is able to detect unknown …
based malicious traffic detection system. Particularly, HyperVision is able to detect unknown …
Detecting DNS over HTTPS based data exfiltration
DNS is often used by attackers as a covert channel for data exfiltration, also known as DNS
tunneling. Since the plaintext DNS lookup leads to privacy issues, DNS over HTTPS (DoH) …
tunneling. Since the plaintext DNS lookup leads to privacy issues, DNS over HTTPS (DoH) …
" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …
seemingly contradictory results and expands the boundaries of known discoveries …
Point cloud analysis for ML-based malicious traffic detection: Reducing majorities of false positive alarms
As an emerging security paradigm, machine learning (ML) based malicious traffic detection
is an essential part of automatic defense against network attacks. Powered by dedicated …
is an essential part of automatic defense against network attacks. Powered by dedicated …
Padding ain't enough: Assessing the privacy guarantees of encrypted {DNS}
DNS over TLS (DoT) and DNS over HTTPS (DoH) encrypt DNS to guard user privacy by
hiding DNS resolutions from passive adversaries. Yet, past attacks have shown that …
hiding DNS resolutions from passive adversaries. Yet, past attacks have shown that …
{Zero-Knowledge} Middleboxes
This paper initiates research on zero-knowledge middleboxes (ZKMBs). A ZKMB is a
network middlebox that enforces network usage policies on encrypted traffic. Clients send …
network middlebox that enforces network usage policies on encrypted traffic. Clients send …