A survey on encrypted network traffic analysis applications, techniques, and countermeasures
E Papadogiannaki, S Ioannidis - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
The adoption of network traffic encryption is continually growing. Popular applications use
encryption protocols to secure communications and protect the privacy of users. In addition …
encryption protocols to secure communications and protect the privacy of users. In addition …
The Complete Guide to SCION
The first SCION book, published in 2017, summarized the results of eight years of work by
over a dozen researchers. Now, five years later, we have completely rewritten the book. It …
over a dozen researchers. Now, five years later, we have completely rewritten the book. It …
A Systematic Survey On Security in Anonymity Networks: Vulnerabilities, Attacks, Defenses, and Formalization
D Chao, D Xu, F Gao, C Zhang… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
The importance of safeguarding individuals' privacy rights in online activities is unmistakable
in today's anonymity networks. Since the introduction of Mixnet by Chaum, numerous …
in today's anonymity networks. Since the introduction of Mixnet by Chaum, numerous …
Clarion: Anonymous communication from multiparty shuffling protocols
S Eskandarian, D Boneh - Cryptology ePrint Archive, 2021 - eprint.iacr.org
This paper studies the role of multiparty shuffling protocols in enabling more efficient
metadata-hiding communication. We show that the process of shuffling messages can be …
metadata-hiding communication. We show that the process of shuffling messages can be …
Breaking and (partially) fixing provably secure onion routing
C Kuhn, M Beck, T Strufe - 2020 IEEE Symposium on Security …, 2020 - ieeexplore.ieee.org
After several years of research on onion routing, Camenisch and Lysyanskaya, in an attempt
at rigorous analysis, defined an ideal functionality in the universal composability model …
at rigorous analysis, defined an ideal functionality in the universal composability model …
Cooperative location privacy in vehicular networks: Why simple mix zones are not enough
M Khodaei, P Papadimitratos - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
Vehicular communications disclose rich information about the vehicles and their
whereabouts. Pseudonymous authentication secures communication while enhancing user …
whereabouts. Pseudonymous authentication secures communication while enhancing user …
{spine}: Surveillance protection in the network elements
Internet Protocol (IP) addresses can reveal information about communicating Internet users
and devices, even when the rest of the traffic between them is encrypted. At the same time …
and devices, even when the rest of the traffic between them is encrypted. At the same time …
Network intrusion detection in encrypted traffic
E Papadogiannaki, G Tsirantonakis… - 2022 IEEE Conference …, 2022 - ieeexplore.ieee.org
Traditional signature-based intrusion detection systems inspect packet headers and
payloads to report any malicious or abnormal traffic behavior that is observed in the network …
payloads to report any malicious or abnormal traffic behavior that is observed in the network …
[HTML][HTML] Acceleration of intrusion detection in encrypted network traffic using heterogeneous hardware
E Papadogiannaki, S Ioannidis - Sensors, 2021 - mdpi.com
More than 75% of Internet traffic is now encrypted, and this percentage is constantly
increasing. The majority of communications are secured using common encryption protocols …
increasing. The majority of communications are secured using common encryption protocols …
Every byte matters: Traffic analysis of bluetooth wearable devices
L Barman, A Dumur, A Pyrgelis… - Proceedings of the ACM on …, 2021 - dl.acm.org
Wearable devices such as smartwatches, fitness trackers, and blood-pressure monitors
process, store, and communicate sensitive and personal information related to the health …
process, store, and communicate sensitive and personal information related to the health …