Results 161 to 170 of about 4,077 (204)
Some of the next articles are maybe not open access.

Encrypted Web Traffic Classification

2018 3rd International Conference on Contemporary Computing and Informatics (IC3I), 2018
Traffic analysis is very much essential in many network monitoring/surveillance and middle box appliances installed at the perimeter of the internal and the external network. Internet Service Providers are also required to do traffic analysis for the purpose of providing the Quality of Service (QoS) parameters as mentioned in the Service Level ...
Suman Balhwan   +2 more
openaire   +1 more source

Detecting encrypted botnet traffic

2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 2013
Bot detection methods that rely on deep packet inspection (DPI) can be foiled by encryption. Encryption, however, increases entropy. This paper investigates whether adding high-entropy detectors to an existing bot detection tool that uses DPI can restore some of the bot visibility. We present two high-entropy classifiers, and use one of them to enhance
Han Zhang   +2 more
openaire   +1 more source

Correlation-Based Traffic Analysis on Encrypted VoIP Traffic

2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing, 2010
Trusted computing and chain of trust are the very mechanisms to solve the security problems of information system. A chain of trust is established by validating each component of hardware and software from the bottom up. There is an urgent need to test the chain of trust according to the specification of TC to ensure its security. This paper presents a
Yuanchao Lu, Ye Zhu
openaire   +1 more source

Traffic Encryption: SSL/TLS

2021
On today’s Internet, encryption is no longer optional. System administrators want security, users and customers demand privacy and confidentiality, governments and other authorities demand protection of privacy, and web browsers and search engines also insist on encryption.
openaire   +1 more source

Realtime Classification for Encrypted Traffic

2010
Classifying network flows by their application type is the backbone of many crucial network monitoring and controlling tasks, including billing, quality of service, security and trend analyzers. The classical “port-based” and “payload-based” approaches to traffic classification have several shortcomings.
Roni Bar - Yanai   +3 more
openaire   +1 more source

Protocol Identification of Encrypted Network Traffic

2006 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2006 Main Conference Proceedings)(WI'06), 2006
New means of communication are constantly emerg- ing, some of which may constitute resource mis- use of an organisation?s network system. Identify- ing the protocols used is straight-forward when in- specting network logs, but we focus on the problem of identifying the underlying protocol present in an unknown TCP connection.
Matthew Gebski   +2 more
openaire   +1 more source

VPN Encrypted Traffic classification using XGBoost

International Journal of Emerging Trends in Engineering Research, 2021
Classification network traffic are becoming ever more relevant in understanding and addressing security issues inInternet applications. Virtual Private Networks (VPNs) have become one famous communication forms on the Internet.
openaire   +1 more source

P2P traffic classification in encrypted tunnels

2013 19th Asia-Pacific Conference on Communications (APCC), 2013
In recent years, users have begun using encrypted tunnels to transport data in order to protect transmitted messages. However, it is very difficult for network engineers to manage the quality of network traffic in encrypted tunnels. Therefore, the issue of how to classify encrypted tunnels becomes more important and it has been studied so far. However,
null Tzong-Jye Liu   +2 more
openaire   +1 more source

Alternate encryption scheme for VoIP traffic

43rd Annual 2009 International Carnahan Conference on Security Technology, 2009
Voice over IP is fast emerging as a strong contender to the traditional circuit-switched PSTN networks. Unlike the PSTN network, which requires dedicated lines, VoIP can share the network that is laid out to carry data traffic as well as other traffic categories.
N Thanthry, G Gopalakrishnan, R Pendse
openaire   +1 more source

An Entropy Based Encrypted Traffic Classifier

2016
This paper proposes an approach of encrypted network traffic classification based on entropy calculation and machine learning technique. Apart from using ordinary Shannon’s entropy, we examine entropy after encoding and a weighted average of Shannon binary entropy called BiEntropy.
Mohammad Saiful Islam Mamun   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy