Filters








5,023 Hits in 4.8 sec

Robust Machine Learning for Encrypted Traffic Classification [article]

Amit Dvir, Yehonatan Zion, Jonathan Muehlstein, Ofir Pele, Chen Hajaj, Ran Dubin
2020 arXiv   pre-print
System (OS), browser and apps.  ...  In this scenario, while the attacker tries to choose the best vector attack by surreptitiously monitoring the victims encrypted network traffic in order to identify users parameters such as the Operating  ...  In summary: • We present a machine learning system to identify the user's operating system, browser and application from HTTPS traffic which achieves 96.06% accuracy.  ... 
arXiv:1603.04865v6 fatcat:j34e4mumajfzlijmqb2edhmmti

HTTPS traffic analysis and client identification using passive SSL/TLS fingerprinting

Martin Husák, Milan Čermák, Tomáš Jirsík, Pavel Čeleda
2016 EURASIP Journal on Information Security  
We built up a dictionary of SSL/TLS cipher suite lists and HTTP User-Agents and assigned the User-Agents to the observed SSL/TLS connections to identify communicating clients.  ...  The similar client identifier is a User-Agent value in a HTTP header, which is commonly used for identifying the client and classifying traffic.  ...  Acknowledgements The dataset, containing the dictionary and aggregated measurement data, is publicly available at https://is.muni.cz/repo/1321931/dataset-https_client_ identification.zip.  ... 
doi:10.1186/s13635-016-0030-7 fatcat:7kua5q5dsvaihae62obotutan4

QoS Web Service Security Dynamic Intruder Detection System for HTTP SSL services [article]

M Swamidas, A Govardhan, D Vijayalakshmi
2016 arXiv   pre-print
Analyzer and 3.User Interface.  ...  We proposed a novel Dynamic Intruder Detection System (DIDA) is safe guard against SSL secured transactions over message communications in intermediate routers that enable services to sender and receiver  ...  Web security developers provide secured operations and safety steps necessary to identify trusted systems.  ... 
arXiv:1605.00918v1 fatcat:bjj33vsgrfamrfvcef2lydp2vi

A Survey on Analyzing Encrypted Network Traffic of Mobile Devices [article]

Ashutosh Bhatiaa, Ankit AgrawalaAyush Bahugunaa, Kamlesh Tiwaria, K. Haribabua, Deepak Vishwakarmab
2020 arXiv   pre-print
and to profile the user.  ...  This paper proposes a framework to categorize the research works on analyzing encrypted network traffic related to mobile devices.  ...  This research was supported by the Center for Artificial Intelligence and Robotics (CAIR) lab of Defence Research and Development Organisation (DRDO), India, Bangalore under the CARS scheme.  ... 
arXiv:2006.12352v1 fatcat:cysjaqpqdfbxjn7b2gsy6gyelu

Efficiently bypassing SNI-based HTTPS filtering

Wazen M. Shbair, Thibault Cholez, Antoine Goichot, Isabelle Chrisment
2015 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM)  
Encrypted Internet traffic is an essential element to enable security and privacy in the Internet. Surveys show that websites are more and more being served over HTTPS.  ...  This motivates the development of new tools and methods to monitor and filter HTTPS traffic.  ...  It also preserves the privacy of users whose encrypted traffic is untouched. Many firewalls and Web Content Filtering solutions use SNI to identify and filter HTTPS traffic.  ... 
doi:10.1109/inm.2015.7140423 dblp:conf/im/ShbairCGC15 fatcat:zgni5b72afbipacrhmm7zs4oya

Measurement and characterization of DNS over HTTPS traffic [article]

Kamil Jerabek, Ondrej Rysavy, Ivana Burgetova
2022 arXiv   pre-print
Domain name system communication may provide sensitive information on users' Internet activity. DNS-over-TLS and DNS-over-HTTPS are proposals aiming at increasing the privacy of Internet end users.  ...  In this paper we present an overview of the current state in the deployment of DNS-over-HTTPS (DoH) implementations complemented by measurements of DoH traffic in terms of the incurred overhead and the  ...  Technically, Internet Service Providers (ISP), enterprise network administrators, and others with access to the Internet traffic can easily observe and analyze the DNS content, thus violating users' privacy  ... 
arXiv:2204.03975v1 fatcat:kdijqcv4wjaxdbhltco4v5n4tq

A Survey on DNS Encryption: Current Development, Malware Misuse, and Inference Techniques [article]

Minzhao Lyu, Hassan Habibi Gharakheili, Vijay Sivaraman
2022 arXiv   pre-print
To protect user privacy, the networking community has proposed standard encryption technologies such as DNS over TLS (DoT), DNS over HTTPS (DoH), and DNS over QUIC (DoQ) for DNS communications, enabling  ...  encrypted DNS traffic.  ...  , i.e., public resolvers and user applications (e.g., browsers and operating systems).  ... 
arXiv:2201.00900v1 fatcat:jzzfnvtyl5eurlhbesg5cbrxd4

A Review on Classification of Tor-Nontor Traffic and Forensic Analysis of Tor Browser

Srusti D. Mehta, Deepak Upadhyay, Gujarat Technological University - Graduate School of Engineering and Technology
2020 International Journal of Engineering Research and  
In this paper a review on Classification of Tor-Nontor traffic and the Forensic Analysis of Tor Browser are there.  ...  Law Enforcement Agencies need to monitor and to investigate crimes hidden behind the anonymity provided by the Tor browser and there are also many other professions in which it would be helpful or necessary  ...  Jadoon, Iqbal analyzed system registry, memory and hard disk for all the artifacts that Tor browser leaves on user system when browser is open and after it is closed.  ... 
doi:10.17577/ijertv9is040701 fatcat:7bpaqh2fovbdvot65j6dzoxrda

Privacy and Security Issues in BAT Web Browsers

Jeffrey Knockel, Adam Senft, Ronald J. Deibert
2016 USENIX Security Symposium  
Despite the massive user bases of these browsers, particularly in China, there has been limited attention paid to the applications by the information security research community.  ...  This lack of attention is problematic, as it is known that the insecure transmission of personal user data by UC Browser has been used by the intelligence community to perform surveillance.  ...  By injecting network traffic, we were able to attack the browser and cause it to prompt the user to install an arbitrary app.  ... 
dblp:conf/uss/KnockelSD16 fatcat:ki4jomxck5dkziiaqvr3kp6ofm

Summary of DNS Over HTTPS Abuse

Karel Hynek, Dmitrii Vekshin, Jan Luxemburk, Tomas Cejka, Armin Wasicek
2022 IEEE Access  
This paper surveys DoH related research works and analyzes malicious and unwanted activities that leverage DNS over HTTPS and can be currently observed in the wild.  ...  According to our observations and the analysis described in this paper, protecting DNS queries using HTTPS entails security threats.  ...  With the large-scale deployment of DoH in popular browsers and Operating Systems, malware DNS communication might get encrypted without the malware's intention or awareness of the encryption.  ... 
doi:10.1109/access.2022.3175497 fatcat:sxehblcsknbkvi5qhlipgbqrja

Investigation into the security and privacy of iOS VPN applications

Jack Wilson, David McLuskie, Ethan Bayne
2020 Proceedings of the 15th International Conference on Availability, Reliability and Security  
1 Due to the increasing number of recommendations for people to use Virtual Private Networks (VPNs) to protect their privacy, more application developers are creating VPN applications and publishing them  ...  In this 'gold rush', applications are being developed quickly and, in turn, not being developed with security in mind.  ...  The first step analyzed HTTP traffic to check if the application was using the HTTP protocol, and if so, whether the HTTP traffic contained any data that could be deemed personally identifiable.  ... 
doi:10.1145/3407023.3407029 dblp:conf/IEEEares/WilsonMB20 fatcat:i4hu7abnznfgno322uhspusswm

Privacy-Enhancing Technologies [chapter]

Kent Seamons
2021 Modern Socio-Technical Perspectives on Privacy  
This chapter discusses the primary privacy-enhancing technologies that the usable security research community has analyzed and identifies issues, recommendations, and future research directions.  ...  Frequent reports of data breaches and sensitive data disclosures underscore the need for effective technologies that users and administrators can deploy to protect sensitive data.  ...  Acknowledgments I want to thank Daniel Zappala and our students at BYU that participated in some of the research described in this chapter.  ... 
doi:10.1007/978-3-030-82786-1_8 fatcat:2hciujom6rawxgbhpuahtxfv6i

Can We Identify NAT Behavior by Analyzing Traffic Flows?

Yasemin Gokcen, Vahid Aghaei Foroushani, A. Nur Zincir Heywood
2014 2014 IEEE Security and Privacy Workshops  
In this research, we explore how far we can push a machine learning (ML) approach to identify such behaviors using only network flows.  ...  We evaluate our proposed approach on different traffic data sets against passive fingerprinting approaches and show that the performance of a machine learning approach is very promising evenwithout using  ...  The CSSP is led by the Defense Research and Development Canada, Centre for Security Science (CSS) on behalf of the Government of Canada and its partners across all levels of government, response and emergency  ... 
doi:10.1109/spw.2014.28 dblp:conf/sp/GokcenFZ14 fatcat:hfxn4tox5zddliwr2u645mgbga

Privacy Model: Detect Privacy Leakage for Chinese Browser Extensions

Yufei Zhao, Liqun Yang, Zhoujun Li, Longtao He, Yipeng Zhang
2021 IEEE Access  
It first builds privacy models for extensions and records all network traffic when accessing test pages.  ...  categories and the malicious domain name that collecting the users' privacy, as well as the results changing of detection over time.  ...  Browser information and operating system information often appear together in network traffic.  ... 
doi:10.1109/access.2021.3063814 fatcat:d5n2cwaz2bgbfce4bxyde24p64

Fingerprinting Techniques for Target-oriented Investigations in Network Forensics

Dominik Herrmann, Karl-Peter Fuchs, Hannes Federrath
2014 Sicherheit  
In three case studies, we explore the use of fingerprinting techniques to improve and extend current investigative methods and showcase why fingerprinting allows for more target-oriented investigations  ...  In each case study,wereviewthe applicability of the current state of the art from the field of information security.T he paper is intended to be as tarting point for ad iscussion about the opportunities  ...  The authors are grateful to all participants for their insightful ideas and fruitful feedback. We also thank our colleague Christoph Gerber for inspiring our discussions of the case studies.  ... 
dblp:conf/sicherheit/HerrmannFF14 fatcat:5zoehqaasrfuxefxhgpvsc64dy
« Previous Showing results 1 — 15 out of 5,023 results