A survey on TLS-encrypted malware network traffic analysis applicable to security operations centers

C Oh, J Ha, H Roh - Applied Sciences, 2021 - mdpi.com
Recently, a majority of security operations centers (SOCs) have been facing a critical issue
of increased adoption of transport layer security (TLS) encryption on the Internet, in network …

Appsniffer: Towards robust mobile app fingerprinting against VPN

S Oh, M Lee, H Lee, E Bertino, H Kim - Proceedings of the ACM Web …, 2023 - dl.acm.org
Application fingerprinting is a useful data analysis technique for network administrators,
marketing agencies, and security analysts. For example, an administrator can adopt …

[HTML][HTML] Collection of datasets with DNS over HTTPS traffic

K Jeřábek, K Hynek, T Čejka, O Ryšavý - Data in Brief, 2022 - Elsevier
Recently, the Internet has adopted the DNS over HTTPS (DoH) resolution mechanism for
privacy-aware network applications. As DoH becomes more disseminated, it has also …

TLS Malicious Encrypted Traffic Identification Research.

K Peng, Y Wenzhong… - Journal of Computer …, 2022 - search.ebscohost.com
With the advent of the 5G era and the increasing public awareness of the Internet, the public
has paid more and more attention to the protection of personal privacy. Due to malicious …

Clid: Identifying TLS Clients With Unsupervised Learning on Domain Names

I Nam, G Wan - ar**
A Thomson, L Maglaras, N Moradpoor - arxiv preprint arxiv:2410.03817, 2024 - arxiv.org
Malicious domains are part of the landscape of the internet but are becoming more prevalent
and more dangerous to both companies and individuals. They can be hosted on variety of …

Experience Report: Using JA4+ Fingerprints for Malware Detection in Encrypted Traffic

P Matoušek, O Ryšavý… - 2024 20th International …, 2024 - ieeexplore.ieee.org
Detection of malware communications is limited due to encryption. Malware control,
updates, and distribution are encapsulated in TLS tunnels, making it difficult to distinguish …

Towards Identification of Network Applications in Encrypted Traffic

I Burgetová, O Ryšavý… - 2024 8th Cyber Security in …, 2024 - ieeexplore.ieee.org
Network traffic monitoring for security threat detection and network performance
management is challenging because most communications are protected by encryption …

Evaluation of HTTP DDOS cyber attack on web servers Apache and Nginx

H Tang - 2024 - researchbank.ac.nz
DDoS attack is one of the most common cyber-attacks. Usually, attackers will manipulate
zombie hosts distributed in different geographical locations to send thousands of network …