ScrambleSuit: A polymorphic network protocol to circumvent censorship
Deep packet inspection technology became a cornerstone of Internet censorship by
facilitating cheap and effective filtering of what censors consider undesired information …
facilitating cheap and effective filtering of what censors consider undesired information …
Anonymity services tor, i2p, jondonym: classifying in the dark (web)
Traffic Classification (TC) is an important tool for several tasks, applied in different fields
(security, management, traffic engineering, R&D). This process is impaired or prevented by …
(security, management, traffic engineering, R&D). This process is impaired or prevented by …
[PDF][PDF] 网络流量分类研究进展与展望
熊刚, 孟姣, 曹自刚, 王勇, 郭莉, 方滨兴 - 集成技术, 2012 - academia.edu
摘要近年来, 随着互联网的迅猛发展, 越来越多的新型网络应用逐渐兴起, 网络规模不断扩大,
网络组成也越来越复杂. 网络流量分类技术作为增强网络可控性的基础技术之一 …
网络组成也越来越复杂. 网络流量分类技术作为增强网络可控性的基础技术之一 …
Entropy estimation for real-time encrypted traffic identification (short paper)
P Dorfinger, G Panholzer, W John - … , TMA 2011, Vienna, Austria, April 27 …, 2011 - Springer
This paper describes a novel approach to classify network traffic into encrypted and
unencrypted traffic. The classifier is able to operate in real-time as only the first packet of …
unencrypted traffic. The classifier is able to operate in real-time as only the first packet of …
Traffic flow analysis of tor pluggable transports
K Shahbar, AN Zincir-Heywood - 2015 11th International …, 2015 - ieeexplore.ieee.org
Tor provides the users the ability to use the Internet anonymously. On the Tor network, the
users connect to three relays run by volunteers. The addresses of these relays are publicly …
users connect to three relays run by volunteers. The addresses of these relays are publicly …
[PDF][PDF] Dust: A blocking-resistant internet transport protocol
B Wiley - Technical rep ort. http://blanu. net/Dust. pdf, 2011 - freehaven.net
Censorship of information on the Internet has been an increasing problem as the methods
have become more sophisticated and increasing resources have been allocated to censor …
have become more sophisticated and increasing resources have been allocated to censor …
Entropy-based prediction of network protocols in the forensic analysis of dns tunnels
I Homem, P Papapetrou, S Dosis - arXiv preprint arXiv:1709.06363, 2017 - arxiv.org
DNS tunneling techniques are often used for malicious purposes but network security
mechanisms have struggled to detect these. Network forensic analysis has thus been used …
mechanisms have struggled to detect these. Network forensic analysis has thus been used …
Security in the internet of things through obfuscation and diversification
Internet of Things (IoT) is composed of heterogeneous embedded and wearable sensors
and devices that collect and share information over the Internet. This may contain private …
and devices that collect and share information over the Internet. This may contain private …
Harnessing predictive models for assisting network forensic investigations of DNS tunnels
I Homem, P Papapetrou - 2017 - commons.erau.edu
In recent times, DNS tunneling techniques have been used for malicious purposes, however
network security mechanisms struggle to detect them. Network forensic analysis has been …
network security mechanisms struggle to detect them. Network forensic analysis has been …
An analysis of Tor pluggable transports under adversarial conditions
K Shahbar, AN Zincir-Heywood - 2017 IEEE Symposium Series …, 2017 - ieeexplore.ieee.org
Tor Pluggable transports enable the users to overcome the adversaries which block access
to the Tor network. Different pluggable transport systems use different mechanisms …
to the Tor network. Different pluggable transport systems use different mechanisms …