Filters








35 Hits in 5.4 sec

CNN for User Activity Detection Using Encrypted In-App Mobile Data

Madushi H. Pathmaperuma, Yogachandran Rahulamathavan, Safak Dogan, Ahmet M. Kondoz
2022 Future Internet  
The proposed method extracts and selects salient features for encrypted traffic classification. This is the first-known approach proposing to filter unknown traffic with an average accuracy of 88%.  ...  The proposed framework uses a time window-based approach to split the activity's encrypted traffic flow into segments, so that in-app activities can be identified just by observing only a part of the activity-related  ...  In [18] , Wang et al. proposed an end-to-end encrypted traffic classification approach with 1D CNN to detect traffic types such as streaming, VoIP, and file transfer. Lopez-Martin et al.  ... 
doi:10.3390/fi14020067 fatcat:moosqemiinctxi5ptynkgynrla

Policy implications of technology for detecting P2P and copyright violations

Jon M. Peha, Alexandre M. Mateus
2014 Telecommunications Policy  
weeks of monitoring provided that traffic is unencrypted, which is useful for some purposes.  ...  This paper describes capabilities, limitations, privacy issues, and policy implications of detection technologies and their countermeasures, in part through quantitative analysis of empirical data.  ...  Fig. 6 Fig. 6 . 66 which characterizes traffic between the university and the rest of the Internet.  ... 
doi:10.1016/j.telpol.2013.04.007 fatcat:pkuq6npbmzdjlfks645l5bb4ee

A Monitoring Framework for Side-Channel Information Leaks

Michael Lescisin, Qusay H. Mahmoud
2020 2020 IEEE International Conference on Consumer Electronics (ICCE)  
Research in this topic has revealed sidechannels formed by observable signals such as acoustic noise from a CPU, encrypted network traffic patterns, and ambient monitor light.  ...  The above committee determined that the thesis is acceptable in form and content and that a satisfactory knowledge of the field covered by the thesis was demonstrated by the candidate during an oral examination  ...  For the scenarios of SSH console access traffic, analysis of HTTPS web browsing traffic, analysis of the VNC protocol tunnelled over SSH, and analysis of the Mumble encrypted VoIP communication system  ... 
doi:10.1109/icce46568.2020.9042987 dblp:conf/iccel/LescisinM20 fatcat:tedyne4qavhgvletmjhlapo7c4

An application layer non-repudiation wireless system: A cross-layer approach

Sasan Adibi
2010 2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM)  
In terms of research contributions, this thesis embodies a thorough research on layered and cross-layer QoS and security schemes, in particular, featuring an adaptive Forward Error Correction (FEC) at  ...  ) for encryption and authentication, the Elliptic Curve Digital Signature Algorithm (ECDSA) for digital signatures, and the Secure Hash Algorithm (SHA) for integrity.  ...  An empirical approach to Inter-AS traffic classification [60, 61] includes extensive Internet-wide measurements and characterizing, classifying, and ranking them into individual ASs based on the utilities  ... 
doi:10.1109/wowmom.2010.5534971 dblp:conf/wowmom/Adibi10 fatcat:tzhws7t5tzao7eh7qcxfn5srfy

Digging into HTTPS

Dominik Schatzmann, Wolfgang Mühlbauer, Thrasyvoulos Spyropoulos, Xenofontas Dimitropoulos
2010 Proceedings of the 10th annual conference on Internet measurement - IMC '10  
In this paper we propose a novel, passive approach to identify webmail traffic solely based on network-level data in order to obtain a comprehensive view of the mail system.  ...  Given the importance of e-mail for personal and business use alike, and its exposure to imminent threats, there exists the need for a comprehensive view of the Internet mail system, including webmail traffic  ...  Acknowledgments We are grateful to SWITCH for providing their traffic traces and to the anonymous reviewers for their helpful comments.  ... 
doi:10.1145/1879141.1879184 dblp:conf/imc/SchatzmannMSD10 fatcat:ukvhtn4pw5fj5mmubzssfoxkdq

A network analysis on cloud gaming: Stadia, GeForce Now and PSNow [article]

Andrea Di Domenico, Gianluca Perna, Martino Trevisan, Luca Vassio, Danilo Giordano
2021 arXiv   pre-print
Three of the leading tech companies, (Google, Sony and NVIDIA) entered this market with their own products, and others, like Microsoft and Amazon, are planning to launch their own platforms in the near  ...  Cloud gaming is a new class of services that promises to revolutionize the videogame market.  ...  In this paper, we close this gap and provide a first characterization of the generated traffic in terms of employed protocols and network workload.  ... 
arXiv:2012.06774v3 fatcat:vleugy23q5ehvhiomrofakkleu

Characterizing and Improving the Reliability of Broadband Internet Access [article]

Zachary S. Bischof, Fabian E. Bustamante, Nick Feamster
2017 arXiv   pre-print
We present an approach for broadband reliability characterization using data collected by many emerging national initiatives to study broadband and apply it to the data gathered by the Federal Communications  ...  Motivated by our findings, we present the design, implementation, and evaluation of a practical approach for improving the reliability of broadband Internet access with multihoming.  ...  Using an encrypted tunnel ensures that user traffic remains confidential when it traverses the backup path.  ... 
arXiv:1709.09349v1 fatcat:bosjurmhone4bp3q2ynvengpjy

Mosaic

Ning Xia, Han Hee Song, Yong Liao, Marios Iliofotou, Antonio Nucci, Zhi-Li Zhang, Aleksandar Kuzmanovic
2013 Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM - SIGCOMM '13  
We conclude by discussing approaches for preventing and mitigating the alarming leakage of sensitive user information.  ...  These pose a serious threat to user privacy as they enable an adversary to attribute significant portions of data traffic including the ones with NO identity leaks to network users' true identities.  ...  Acknowledgments: We would like to thank Nina Taft and the anonymous reviewers for their helpful comments and suggestions.  ... 
doi:10.1145/2486001.2486008 dblp:conf/sigcomm/XiaSLINZK13 fatcat:oc4q32agrzcwbjzqvmkq6vr6au

Mosaic

Ning Xia, Han Hee Song, Yong Liao, Marios Iliofotou, Antonio Nucci, Zhi-Li Zhang, Aleksandar Kuzmanovic
2013 Computer communication review  
We conclude by discussing approaches for preventing and mitigating the alarming leakage of sensitive user information.  ...  These pose a serious threat to user privacy as they enable an adversary to attribute significant portions of data traffic including the ones with NO identity leaks to network users' true identities.  ...  Acknowledgments: We would like to thank Nina Taft and the anonymous reviewers for their helpful comments and suggestions.  ... 
doi:10.1145/2534169.2486008 fatcat:sip5i3jsmvec5dft7c6wb3s3ae

A comprehensive survey on machine learning for networking: evolution, applications and research opportunities

Raouf Boutaba, Mohammad A. Salahuddin, Noura Limam, Sara Ayoubi, Nashid Shahriar, Felipe Estrada-Solano, Oscar M. Caicedo
2018 Journal of Internet Services and Applications  
Machine Learning (ML) has been enjoying an unprecedented surge in applications that solve problems and enable automation in diverse domains.  ...  Therefore, this is a timely contribution of the implications of ML for networking, that is pushing the barriers of autonomic network operation and management.  ...  Acknowledgments We thank the anonymous reviewers for their insightful comments and suggestions that helped us improve the quality of the paper.  ... 
doi:10.1186/s13174-018-0087-2 fatcat:jvwpewceevev3n4keoswqlcacu

An Empirical Study of Skype Data Retrieval from Physical Memory

Ahmad Ghafarian, Ash Mady, Charlie Wood
2019 International Journal of Computer Applications  
Traditional static media computer forensics approach is not effective in retrieving traces of instant messaging activity.  ...  At the application level, we evaluated Skype activity artifacts such as logins credentials, audio and video conversations, transferred files, emails, and geographical location of the caller.  ...  They summarized the difficulties in characterizing Skype traffic in forensic contexts. An overview of static media forensics on Skype application is reported by Castle [5] .  ... 
doi:10.5120/ijca2019919115 fatcat:2ztkbo2alfesbiq4eet62szicu

APHIDS++: Evolution of A Programmable Hybrid Intrusion Detection System [chapter]

Mohammed S. Alam, Abhishek Gupta, Jake Wires, Son Vuong
2005 Lecture Notes in Computer Science  
VoIP (Voice over IP) and generic intrusions; and an XML implementation of our Agent Deployment and Correlation Script (ADCS), which is used to initialize the agent environment, allowing for flexible user  ...  In this thesis we provide a description of improvements made to the initial APHIDS design, comprising the addition of an optional intelligent agent meant to improve the response of APHIDS in detecting  ...  This research is supported in part by the Directorate of Telecom Engineering and Certification of the Department of Industry Canada.  ... 
doi:10.1007/11569510_3 fatcat:wabp3jgoerd6bbi3qiwz5pz4zi

Attacks and Countermeasures on 802.16: Analysis and Assessment

Constantinos Kolias, Georgios Kambourakis, Stefanos Gritzalis
2013 IEEE Communications Surveys and Tutorials  
As far as we are aware of, this is the first time an exhaustive and detailed survey of this kind is attempted.  ...  First, it provides a comprehensive taxonomy of attacks and countermeasures on 802.16.  ...  The IV field is static for the entire TEK lifetime and is transmitted as an unencrypted field of the RSP: Key Reply message.  ... 
doi:10.1109/surv.2012.021312.00138 fatcat:ngn2sw46u5af5d2ownvlyari6a

Hiding from Whom?

Ksenia Ermoshina, Francesca Musiani
2018 intermédialités  
ACKNOWLEDGEMENTS The authors would like to extend their deepest gratitude to a number of individuals who have provided support and feedback in the production of this report, including (in alphabetical  ...  Any errors remain the fault of the authors alone.  ...  an irresponsible approach to encryption policy.  ... 
doi:10.7202/1058473ar fatcat:z2x3cfbpczehjgpmlzxjsfkrd4

IoT Behavioral Monitoring via Network Traffic Analysis [article]

Arunan Sivanathan
2020 arXiv   pre-print
For our first contribution, we collect traffic traces and characterize the network behavior of IoT devices via attributes from traffic patterns.  ...  We begin this thesis by surveying IoT ecosystem, while reviewing current approaches to vulnerability assessments, intrusion detection, and behavioral monitoring.  ...  We also develop a systematical approach to evaluate the security of smart home devices, validate it empirically in the lab using many consumer IoT devices, and compare it against threats and solutions  ... 
arXiv:2001.10632v1 fatcat:ylly7ksir5bpfhr3wplqsg6eta
« Previous Showing results 1 — 15 out of 35 results