A survey on encrypted network traffic analysis applications, techniques, and countermeasures

E Papadogiannaki, S Ioannidis - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
The adoption of network traffic encryption is continually growing. Popular applications use
encryption protocols to secure communications and protect the privacy of users. In addition …

The Complete Guide to SCION

L Chuat, M Legner, D Basin, D Hausheer, S Hitz… - Information Security and …, 2022 - Springer
The first SCION book, published in 2017, summarized the results of eight years of work by
over a dozen researchers. Now, five years later, we have completely rewritten the book. It …

A Systematic Survey On Security in Anonymity Networks: Vulnerabilities, Attacks, Defenses, and Formalization

D Chao, D Xu, F Gao, C Zhang… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
The importance of safeguarding individuals' privacy rights in online activities is unmistakable
in today's anonymity networks. Since the introduction of Mixnet by Chaum, numerous …

Clarion: Anonymous communication from multiparty shuffling protocols

S Eskandarian, D Boneh - Cryptology ePrint Archive, 2021 - eprint.iacr.org
This paper studies the role of multiparty shuffling protocols in enabling more efficient
metadata-hiding communication. We show that the process of shuffling messages can be …

Breaking and (partially) fixing provably secure onion routing

C Kuhn, M Beck, T Strufe - 2020 IEEE Symposium on Security …, 2020 - ieeexplore.ieee.org
After several years of research on onion routing, Camenisch and Lysyanskaya, in an attempt
at rigorous analysis, defined an ideal functionality in the universal composability model …

Cooperative location privacy in vehicular networks: Why simple mix zones are not enough

M Khodaei, P Papadimitratos - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
Vehicular communications disclose rich information about the vehicles and their
whereabouts. Pseudonymous authentication secures communication while enhancing user …

{spine}: Surveillance protection in the network elements

T Datta, N Feamster, J Rexford, L Wang - 9th USENIX Workshop on Free …, 2019 - usenix.org
Internet Protocol (IP) addresses can reveal information about communicating Internet users
and devices, even when the rest of the traffic between them is encrypted. At the same time …

Network intrusion detection in encrypted traffic

E Papadogiannaki, G Tsirantonakis… - 2022 IEEE Conference …, 2022 - ieeexplore.ieee.org
Traditional signature-based intrusion detection systems inspect packet headers and
payloads to report any malicious or abnormal traffic behavior that is observed in the network …

[HTML][HTML] Acceleration of intrusion detection in encrypted network traffic using heterogeneous hardware

E Papadogiannaki, S Ioannidis - Sensors, 2021 - mdpi.com
More than 75% of Internet traffic is now encrypted, and this percentage is constantly
increasing. The majority of communications are secured using common encryption protocols …

Every byte matters: Traffic analysis of bluetooth wearable devices

L Barman, A Dumur, A Pyrgelis… - Proceedings of the ACM on …, 2021 - dl.acm.org
Wearable devices such as smartwatches, fitness trackers, and blood-pressure monitors
process, store, and communicate sensitive and personal information related to the health …