A review on machine learning–based approaches for Internet traffic classification

O Salman, IH Elhajj, A Kayssi, A Chehab - Annals of Telecommunications, 2020 - Springer
Traffic classification acquired the interest of the Internet community early on. Different
approaches have been proposed to classify Internet traffic to manage both security and …

A survey of key technologies for constructing network covert channel

J Tian, G Xiong, Z Li, G Gou - Security and Communication …, 2020 - Wiley Online Library
In order to protect user privacy or guarantee free access to the Internet, the network covert
channel has become a hot research topic. It refers to an information channel in which the …

Blocking-resistant communication through domain fronting

D Fifield, C Lan, R Hynes, P Wegmann… - … on Privacy Enhancing …, 2015 - petsymposium.org
We describe “domain fronting,” a versatile censorship circumvention technique that hides
the remote endpoint of a communication. Domain fronting works at the application layer …

How the Great Firewall of China detects and blocks fully encrypted traffic

M Wu, J Sippe, D Sivakumar, J Burg… - 32nd USENIX Security …, 2023 - usenix.org
One of the cornerstones in censorship circumvention is fully encrypted protocols, which
encrypt every byte of the payload in an attempt to “look like nothing”. In early November …

Hyper4: Using p4 to virtualize the programmable data plane

D Hancock, J Van der Merwe - Proceedings of the 12th International on …, 2016 - dl.acm.org
Through virtualization, single physical data planes can logically support multiple networking
contexts. We propose HyPer4 as a portable virtualization solution. HyPer4 provides a …

Bringing a gan to a knife-fight: Adapting malware communication to avoid detection

M Rigaki, S Garcia - 2018 IEEE Security and Privacy …, 2018 - ieeexplore.ieee.org
Generative Adversarial Networks (GANs) have been successfully used in a large number of
domains. This paper proposes the use of GANs for generating network traffic in order to …

[PDF][PDF] The use of TLS in Censorship Circumvention.

S Frolov, E Wustrow - NDSS, 2019 - freehaven.net
TLS, the Transport Layer Security protocol, has quickly become the most popular protocol on
the Internet, already used to load over 70% of web pages in Mozilla Firefox. Due to its …

Examining how the great firewall discovers hidden circumvention servers

R Ensafi, D Fifield, P Winter, N Feamster… - Proceedings of the …, 2015 - dl.acm.org
Recently, the operators of the national censorship infrastructure of China began to employ"
active probing" to detect and block the use of privacy tools. This probing works by passively …

Meteor: Cryptographically secure steganography for realistic distributions

G Kaptchuk, TM Jois, M Green, AD Rubin - Proceedings of the 2021 …, 2021 - dl.acm.org
Despite a long history of research and wide-spread applications to censorship resistant
systems, practical steganographic systems capable of embedding messages into realistic …

Seeing through network-protocol obfuscation

L Wang, KP Dyer, A Akella, T Ristenpart… - Proceedings of the 22nd …, 2015 - dl.acm.org
Censorship-circumvention systems are designed to help users bypass Internet censorship.
As more sophisticated deep-packet-inspection (DPI) mechanisms have been deployed by …