A survey on encrypted network traffic analysis applications, techniques, and countermeasures
E Papadogiannaki, S Ioannidis - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
The adoption of network traffic encryption is continually growing. Popular applications use
encryption protocols to secure communications and protect the privacy of users. In addition …
encryption protocols to secure communications and protect the privacy of users. In addition …
A comprehensive survey of recent internet measurement techniques for cyber security
MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …
vulnerable to its security flaws. Despite substantial efforts to address many of these …
Flowprint: Semi-supervised mobile-app fingerprinting on encrypted network traffic
T Van Ede, R Bortolameotti, A Continella… - Network and distributed …, 2020 - par.nsf.gov
Mobile-application fingerprinting of network traffic is valuable for many security solutions as
it provides insights into the apps active on a network. Unfortunately, existing techniques …
it provides insights into the apps active on a network. Unfortunately, existing techniques …
Iot inspector: Crowdsourcing labeled network traffic from smart home devices at scale
The proliferation of smart home devices has created new opportunities for empirical
research in ubiquitous computing, ranging from security and privacy to personal health. Yet …
research in ubiquitous computing, ranging from security and privacy to personal health. Yet …
An end-to-end, large-scale measurement of dns-over-encryption: How far have we come?
DNS packets are designed to travel in unencrypted form through the Internet based on its
initial standard. Recent discoveries show that real-world adversaries are actively exploiting …
initial standard. Recent discoveries show that real-world adversaries are actively exploiting …
IoTLS: understanding TLS usage in consumer IoT devices
Consumer IoT devices are becoming increasingly popular, with most leveraging TLS to
provide connection security. In this work, we study a large number of TLS-enabled consumer …
provide connection security. In this work, we study a large number of TLS-enabled consumer …
Coming of age: A longitudinal study of tls deployment
P Kotzias, A Razaghpanah, J Amann… - Proceedings of the …, 2018 - dl.acm.org
The Transport Layer Security (TLS) protocol is the de-facto standard for encrypted
communication on the Internet. However, it has been plagued by a number of different …
communication on the Internet. However, it has been plagued by a number of different …
Detecting DNS over HTTPS based data exfiltration
DNS is often used by attackers as a covert channel for data exfiltration, also known as DNS
tunneling. Since the plaintext DNS lookup leads to privacy issues, DNS over HTTPS (DoH) …
tunneling. Since the plaintext DNS lookup leads to privacy issues, DNS over HTTPS (DoH) …
Survey of network intrusion detection methods from the perspective of the knowledge discovery in databases process
B Molina-Coronado, U Mori… - … on Network and …, 2020 - ieeexplore.ieee.org
The identification of network attacks which target information and communication systems
has been a focus of the research community for years. Network intrusion detection is a …
has been a focus of the research community for years. Network intrusion detection is a …
Studying TLS usage in Android apps
A Razaghpanah, AA Niaki… - Proceedings of the 13th …, 2017 - dl.acm.org
Transport Layer Security (TLS), has become the de-facto standard for secure Internet
communication. When used correctly, it provides secure data transfer, but used incorrectly, it …
communication. When used correctly, it provides secure data transfer, but used incorrectly, it …