AI/ML for network security: The emperor has no clothes
Several recent research efforts have proposed Machine Learning (ML)-based solutions that
can detect complex patterns in network traffic for a wide range of network security problems …
can detect complex patterns in network traffic for a wide range of network security problems …
Evaluating QUIC performance over web, cloud storage, and video workloads
T Shreedhar, R Panda, S Podanev… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
QUIC was launched in 2013 with a goal to provide reliable, connection-oriented and end-to-
end encrypted transport and is recently standardized in May 2021 by the Internet …
end encrypted transport and is recently standardized in May 2021 by the Internet …
MIRAGE: Mobile-app traffic capture and ground-truth creation
Network traffic analysis, ie, the umbrella of procedures for distilling information from network
traffic, represents the enabler for highly-valuable profiling information, other than being the …
traffic, represents the enabler for highly-valuable profiling information, other than being the …
DNS privacy with speed? Evaluating DNS over QUIC and its impact on web performance
Over the last decade, Web traffic has significantly shifted towards HTTPS due to an
increased awareness for privacy. However, DNS traffic is still largely unencrypted, which …
increased awareness for privacy. However, DNS traffic is still largely unencrypted, which …
IPAL: breaking up silos of protocol-dependent and domain-specific industrial intrusion detection systems
The increasing interconnection of industrial networks exposes them to an ever-growing risk
of cyber attacks. To reveal such attacks early and prevent any damage, industrial intrusion …
of cyber attacks. To reveal such attacks early and prevent any damage, industrial intrusion …
The pos framework: a methodology and toolchain for reproducible network experiments
S Gallenmüller, D Scholz, H Stubbe… - Proceedings of the 17th …, 2021 - dl.acm.org
In scientific research, the independent reproduction of experimental results is the source of
trust. The release of experimental artifacts enables the reproduction of results; however …
trust. The release of experimental artifacts enables the reproduction of results; however …
Measuring DNS over TLS from the edge: adoption, reliability, and response times
Abstract The Domain Name System (DNS) is a cornerstone of communication on the
Internet. DNS over TLS (DoT) has been standardized in 2016 as an extension to the DNS …
Internet. DNS over TLS (DoT) has been standardized in 2016 as an extension to the DNS …
An empirical view on consolidation of the web
The majority of Web content is delivered by only a few companies that provide Content
Delivery Infrastructuress (CDIss) such as Content Delivery Networkss (CDNss) and cloud …
Delivery Infrastructuress (CDIss) such as Content Delivery Networkss (CDNss) and cloud …
[HTML][HTML] Challenges and recent advances in the design of real-time wireless Cyber-Physical Systems
R Jacob - BenchCouncil Transactions on Benchmarks, Standards …, 2022 - Elsevier
Abstract Cyber-Physical Systems (CPS) refer to systems where some intelligence is
embedded into devices that interact with their environment. Using wireless technology in …
embedded into devices that interact with their environment. Using wireless technology in …
One to rule them all? a first look at dns over quic
The DNS is one of the most crucial parts of the Internet. Since the original DNS
specifications defined UDP and TCP as the underlying transport protocols, DNS queries are …
specifications defined UDP and TCP as the underlying transport protocols, DNS queries are …