A survey on encrypted network traffic analysis applications, techniques, and countermeasures

E Papadogiannaki, S Ioannidis - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
The adoption of network traffic encryption is continually growing. Popular applications use
encryption protocols to secure communications and protect the privacy of users. In addition …

A comprehensive survey of recent internet measurement techniques for cyber security

MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …

Flowprint: Semi-supervised mobile-app fingerprinting on encrypted network traffic

T Van Ede, R Bortolameotti, A Continella… - Network and distributed …, 2020 - par.nsf.gov
Mobile-application fingerprinting of network traffic is valuable for many security solutions as
it provides insights into the apps active on a network. Unfortunately, existing techniques …

Iot inspector: Crowdsourcing labeled network traffic from smart home devices at scale

DY Huang, N Apthorpe, F Li, G Acar… - Proceedings of the ACM …, 2020 - dl.acm.org
The proliferation of smart home devices has created new opportunities for empirical
research in ubiquitous computing, ranging from security and privacy to personal health. Yet …

An end-to-end, large-scale measurement of dns-over-encryption: How far have we come?

C Lu, B Liu, Z Li, S Hao, H Duan, M Zhang… - Proceedings of the …, 2019 - dl.acm.org
DNS packets are designed to travel in unencrypted form through the Internet based on its
initial standard. Recent discoveries show that real-world adversaries are actively exploiting …

IoTLS: understanding TLS usage in consumer IoT devices

MT Paracha, DJ Dubois, N Vallina-Rodriguez… - Proceedings of the 21st …, 2021 - dl.acm.org
Consumer IoT devices are becoming increasingly popular, with most leveraging TLS to
provide connection security. In this work, we study a large number of TLS-enabled consumer …

Coming of age: A longitudinal study of tls deployment

P Kotzias, A Razaghpanah, J Amann… - Proceedings of the …, 2018 - dl.acm.org
The Transport Layer Security (TLS) protocol is the de-facto standard for encrypted
communication on the Internet. However, it has been plagued by a number of different …

Detecting DNS over HTTPS based data exfiltration

M Zhan, Y Li, G Yu, B Li, W Wang - Computer Networks, 2022 - Elsevier
DNS is often used by attackers as a covert channel for data exfiltration, also known as DNS
tunneling. Since the plaintext DNS lookup leads to privacy issues, DNS over HTTPS (DoH) …

Survey of network intrusion detection methods from the perspective of the knowledge discovery in databases process

B Molina-Coronado, U Mori… - … on Network and …, 2020 - ieeexplore.ieee.org
The identification of network attacks which target information and communication systems
has been a focus of the research community for years. Network intrusion detection is a …

Studying TLS usage in Android apps

A Razaghpanah, AA Niaki… - Proceedings of the 13th …, 2017 - dl.acm.org
Transport Layer Security (TLS), has become the de-facto standard for secure Internet
communication. When used correctly, it provides secure data transfer, but used incorrectly, it …