A review on machine learning–based approaches for Internet traffic classification
Traffic classification acquired the interest of the Internet community early on. Different
approaches have been proposed to classify Internet traffic to manage both security and …
approaches have been proposed to classify Internet traffic to manage both security and …
A survey of key technologies for constructing network covert channel
J Tian, G Xiong, Z Li, G Gou - Security and Communication …, 2020 - Wiley Online Library
In order to protect user privacy or guarantee free access to the Internet, the network covert
channel has become a hot research topic. It refers to an information channel in which the …
channel has become a hot research topic. It refers to an information channel in which the …
Blocking-resistant communication through domain fronting
D Fifield, C Lan, R Hynes, P Wegmann… - … on Privacy Enhancing …, 2015 - petsymposium.org
We describe “domain fronting,” a versatile censorship circumvention technique that hides
the remote endpoint of a communication. Domain fronting works at the application layer …
the remote endpoint of a communication. Domain fronting works at the application layer …
How the Great Firewall of China detects and blocks fully encrypted traffic
M Wu, J Sippe, D Sivakumar, J Burg… - 32nd USENIX Security …, 2023 - usenix.org
One of the cornerstones in censorship circumvention is fully encrypted protocols, which
encrypt every byte of the payload in an attempt to “look like nothing”. In early November …
encrypt every byte of the payload in an attempt to “look like nothing”. In early November …
Hyper4: Using p4 to virtualize the programmable data plane
D Hancock, J Van der Merwe - Proceedings of the 12th International on …, 2016 - dl.acm.org
Through virtualization, single physical data planes can logically support multiple networking
contexts. We propose HyPer4 as a portable virtualization solution. HyPer4 provides a …
contexts. We propose HyPer4 as a portable virtualization solution. HyPer4 provides a …
Bringing a gan to a knife-fight: Adapting malware communication to avoid detection
Generative Adversarial Networks (GANs) have been successfully used in a large number of
domains. This paper proposes the use of GANs for generating network traffic in order to …
domains. This paper proposes the use of GANs for generating network traffic in order to …
[PDF][PDF] The use of TLS in Censorship Circumvention.
TLS, the Transport Layer Security protocol, has quickly become the most popular protocol on
the Internet, already used to load over 70% of web pages in Mozilla Firefox. Due to its …
the Internet, already used to load over 70% of web pages in Mozilla Firefox. Due to its …
Examining how the great firewall discovers hidden circumvention servers
Recently, the operators of the national censorship infrastructure of China began to employ"
active probing" to detect and block the use of privacy tools. This probing works by passively …
active probing" to detect and block the use of privacy tools. This probing works by passively …
Meteor: Cryptographically secure steganography for realistic distributions
Despite a long history of research and wide-spread applications to censorship resistant
systems, practical steganographic systems capable of embedding messages into realistic …
systems, practical steganographic systems capable of embedding messages into realistic …
Seeing through network-protocol obfuscation
Censorship-circumvention systems are designed to help users bypass Internet censorship.
As more sophisticated deep-packet-inspection (DPI) mechanisms have been deployed by …
As more sophisticated deep-packet-inspection (DPI) mechanisms have been deployed by …