The Internet Archive has a preservation copy of this work in our general collections.
The file type is application/pdf
.
Filters
Website Detection Using Remote Traffic Analysis
[article]
2011
arXiv
pre-print
To demonstrate the threat of such remote traffic analysis, we study a remote website detection attack that works against home broadband users. ...
We also show how such website detection can be used to deanonymize message board users. ...
As compared with previous work, using our remote traffic analysis technique for identifying websites introduces two additional challenges. ...
arXiv:1109.0097v1
fatcat:xheg2phwpbbgffkwlnwlcorzau
Website Detection Using Remote Traffic Analysis
[chapter]
2012
Lecture Notes in Computer Science
To demonstrate the threat of such remote traffic analysis, we study a remote website detection attack that works against home broadband users. ...
We also show how such website detection can be used to deanonymize message board users. ...
We show how this channel can be used to carry out a remote attack to detect a remote user's browsing patterns. This highlights the importance of traffic analysis attacks in today's connected Internet. ...
doi:10.1007/978-3-642-31680-7_4
fatcat:nyb6rnozfzakvnawms3jhoriva
Fingerprinting websites using remote traffic analysis
2010
Proceedings of the 17th ACM conference on Computer and communications security - CCS '10
We demonstrate the threat of such remote traffic analysis by developing a remote website fingerprinting attack that works against home broadband users. ...
This shows that remote traffic analysis represents a real threat to privacy on the Internet. ...
As compared with the previous work, using remote traffic analysis for website fingerprinting introduces two additional challenges. ...
doi:10.1145/1866307.1866397
dblp:conf/ccs/GongKB10
fatcat:5th5spp3kva6hls7c3pldgvg3y
Hierarchy Website Fingerprint Using N-gram Byte Distribution
2017
Transactions on Networks and Communications
Websites classification based on traffic analysis has become a difficult problem due to the large number of websites within the internet. ...
In this paper, a two-level websites' classification technique is proposed. At the first level, the traffic is classified to a general category such as sports, news, social, healthy, education, etc. ...
Gong in [6] proposed work is trying to prove that the remote traffic analysis could be used by eavesdroppers. ...
doi:10.14738/tnc.56.3767
fatcat:hgx7c5fbmnhpfmtae4wi5tgmhy
Detection of Covert Botnet Command and Control Channels by Causal Analysis of Traffic Flows
[chapter]
2013
Lecture Notes in Computer Science
Techniques as encryption, steganography, and recently the use of social network websites as a proxy, impede conventional detection of botnet communication. ...
Identifying the direct causes of traffic flows, allows for real-time bot detection with a low exposure to malware, and offline forensic analysis of traffic. ...
C&C communication that uses websites of popular services and social networks as a proxy, is an effective method to hide the C&C traffic, because malicious and legitimate traffic share the same destinations ...
doi:10.1007/978-3-319-03584-0_10
fatcat:l3ou5ke56bc3zavlb46jqahxte
Emerging and Unconventional: New Attacks and Innovative Detection Techniques
2018
Security and Communication Networks
Detection is the second area. Novel forms of detection are mandatory to counteract sophisticated malware or to perform traffic analysis in emerging and complex scenarios. ...
amounts of unlabeled raw network traffic data using deep learning approaches. ...
doi:10.1155/2018/9672523
fatcat:wgxoc6njwnff7ojqnxbgz4wxxe
Cross-layer detection of malicious websites
2013
Proceedings of the third ACM conference on Data and application security and privacy - CODASPY '13
In this paper, we propose an analysis of the corresponding network-layer traffic between the browser and the web server by incorporating the static analysis of website contents, which is conducted at the ...
The insight of this approach is that the network-layer may expose useful information about malicious websites from a different perspective. ...
Our Contributions We propose an analysis of the corresponding network-layer traffic between the browser and the web server by incorporating the static analysis of website contents. ...
doi:10.1145/2435349.2435366
dblp:conf/codaspy/XuZXY13
fatcat:67udwfwbf5hdxiohmzbutwshua
Analysis on Remote Access Trojan Role in Advance Persistent Threat: A Concern for Cyber Criminal Investigations
2016
Figshare
The purpose of this study is to analyze one of the attack tools that can be used in an Advance Persistent Threat (APT), a Remote Access Trojan (RAT). ...
Remote Access Trojan played a prominent role in many targeted cyber incidents throughout history. ...
Screenshot 2-10: Luminosity Link On-Join Command Feature
Remote Access Trojan Analysis Wireshark Wireshark is an advanced network analysis tools that allows the analyst to investigate network traffic ...
doi:10.6084/m9.figshare.3510224.v1
fatcat:vvt55nzgcbdxjfat6ftg6oopym
Traffic Fingerprinting Attacks on Internet of Things using Machine Learning
2020
IEEE Access
INDEX TERMS Internet of Things, machine learning, network traffic fingerprinting, privacy, traffic analysis. ...
The second part introduces and validates a method for the devices' state detection based on pattern recognition with ML. ...
TRAFFIC FINGERPRINTING A traffic analysis attack can be defined as network traffic monitoring to identify useful patterns in the traces that can be used for defense and detection of security risks (such ...
doi:10.1109/access.2020.2969015
fatcat:k6awfmm3ure5rl7udj4ea5squa
Detection of Malicious Servers for Preventing Client-Side Attacks
2021
Mehran University Research Journal of Engineering and Technology
First to detect malicious servers with passive detection which is often signature based. Second to detect the malicious servers with active detection often with dynamic malware analysis. ...
In this paper, we have proposed a solution for the detection and prevention of malicious servers that use the Bro Intrusion Detection System (IDS) and VirusTotal API 2.0. ...
The tool and techniques used for this are Bro IDS which depends on passive approach for detecting malicious servers by analysis of network traffic at the gateway. We are focusing on websites/ URL's. ...
doi:10.22581/muet1982.2101.20
doaj:50d9e66ce6ed4c8b882aebb50ce77eac
fatcat:eo5jwk625rflnnsfqmcemtvmm4
Slow flooding attack detection in cloud using change point detection approach
2018
International Journal of Engineering & Technology
Traffic of websites is observed by using remote java script. ...
Golden ration is used to compute the threshold and this threshold is further used along with the computed metric values of normal and malicious traffic for flooding attack detection. ...
The authors in [10] paper discussed about success of using an improved method for the detection of DDOS attack based on the analysis of multiple factors. ...
doi:10.14419/ijet.v7i2.30.13459
fatcat:qti644bhjzby5ovzhyob5csmtq
Performing Forensic Analysis on Network to Identify Malicious Traffic
2020
International Journal of Advanced Trends in Computer Science and Engineering
This paper proposes a Network forensics analysis framework to identify malicious threats in network traffic using Wireshark and generate alert using snort. ...
Snort is used to detect network-based attacks using some rules and all activities on network traffic are recorded on Snort are stored in a log file. ...
During the Initial Stage, examine the network traffic using network analysis tools. ...
doi:10.30534/ijatcse/2020/171922020
fatcat:dq6oshhbg5avzak7vgb6rjhfhu
Optimizing Rule on Open Source Firewall Using Content and PCRE Combination
2015
Journal of Advances in Computer Networks
The contribution of this paper is to provide a NIDS system that is more optimal and inexpensive in implementation because it uses Open Source Firewall of cyber-attacks. ...
NIDS (Network Intrusion Detection System) is a software application that can see deeper into the network to prevent suspicious activity such as malicious software or unauthenticated activity. ...
attack traffic using wireshark. ...
doi:10.18178/jacn.2015.3.4.188
fatcat:543wdgac2navbfo3gxcn3oqpcq
User-Assisted Host-Based Detection of Outbound Malware Traffic
[chapter]
2009
Lecture Notes in Computer Science
These types of traffic analysis may not catch stealthy attacks carried out by today's malware. ...
We describe how our studies can be applied to detecting bot infection. ...
They are counted as two different IP addresses in our analysis. (2) Many websites heavily use third-party content providers for multimedia contents or advertisements. ...
doi:10.1007/978-3-642-11145-7_23
fatcat:xfq7pff625ctvpwkdufcdnhl5m
Security Certification in Payment Card Industry
2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security - CCS '19
Our in-depth accuracy analysis also shows that PciCheckerLite's output is more precise than w3af. ...
Then we use the testbed to examine the capability and limitations of PCI scanners and the rigor of the certification process. ...
Network Traffic Analysis. We collected the incoming network requests from each of the scanners using the access log of our testbed. ...
doi:10.1145/3319535.3363195
dblp:conf/ccs/RahamanWY19
fatcat:tixdtxfbejacppssgg4vat6zrq
« Previous
Showing results 1 — 15 out of 18,640 results