Results 161 to 170 of about 4,077 (204)
Some of the next articles are maybe not open access.
Encrypted Web Traffic Classification
2018 3rd International Conference on Contemporary Computing and Informatics (IC3I), 2018Traffic analysis is very much essential in many network monitoring/surveillance and middle box appliances installed at the perimeter of the internal and the external network. Internet Service Providers are also required to do traffic analysis for the purpose of providing the Quality of Service (QoS) parameters as mentioned in the Service Level ...
Suman Balhwan +2 more
openaire +1 more source
Detecting encrypted botnet traffic
2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 2013Bot detection methods that rely on deep packet inspection (DPI) can be foiled by encryption. Encryption, however, increases entropy. This paper investigates whether adding high-entropy detectors to an existing bot detection tool that uses DPI can restore some of the bot visibility. We present two high-entropy classifiers, and use one of them to enhance
Han Zhang +2 more
openaire +1 more source
Correlation-Based Traffic Analysis on Encrypted VoIP Traffic
2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing, 2010Trusted computing and chain of trust are the very mechanisms to solve the security problems of information system. A chain of trust is established by validating each component of hardware and software from the bottom up. There is an urgent need to test the chain of trust according to the specification of TC to ensure its security. This paper presents a
Yuanchao Lu, Ye Zhu
openaire +1 more source
2021
On today’s Internet, encryption is no longer optional. System administrators want security, users and customers demand privacy and confidentiality, governments and other authorities demand protection of privacy, and web browsers and search engines also insist on encryption.
openaire +1 more source
On today’s Internet, encryption is no longer optional. System administrators want security, users and customers demand privacy and confidentiality, governments and other authorities demand protection of privacy, and web browsers and search engines also insist on encryption.
openaire +1 more source
Realtime Classification for Encrypted Traffic
2010Classifying network flows by their application type is the backbone of many crucial network monitoring and controlling tasks, including billing, quality of service, security and trend analyzers. The classical “port-based” and “payload-based” approaches to traffic classification have several shortcomings.
Roni Bar - Yanai +3 more
openaire +1 more source
Protocol Identification of Encrypted Network Traffic
2006 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2006 Main Conference Proceedings)(WI'06), 2006New means of communication are constantly emerg- ing, some of which may constitute resource mis- use of an organisation?s network system. Identify- ing the protocols used is straight-forward when in- specting network logs, but we focus on the problem of identifying the underlying protocol present in an unknown TCP connection.
Matthew Gebski +2 more
openaire +1 more source
VPN Encrypted Traffic classification using XGBoost
International Journal of Emerging Trends in Engineering Research, 2021Classification network traffic are becoming ever more relevant in understanding and addressing security issues inInternet applications. Virtual Private Networks (VPNs) have become one famous communication forms on the Internet.
openaire +1 more source
P2P traffic classification in encrypted tunnels
2013 19th Asia-Pacific Conference on Communications (APCC), 2013In recent years, users have begun using encrypted tunnels to transport data in order to protect transmitted messages. However, it is very difficult for network engineers to manage the quality of network traffic in encrypted tunnels. Therefore, the issue of how to classify encrypted tunnels becomes more important and it has been studied so far. However,
null Tzong-Jye Liu +2 more
openaire +1 more source
Alternate encryption scheme for VoIP traffic
43rd Annual 2009 International Carnahan Conference on Security Technology, 2009Voice over IP is fast emerging as a strong contender to the traditional circuit-switched PSTN networks. Unlike the PSTN network, which requires dedicated lines, VoIP can share the network that is laid out to carry data traffic as well as other traffic categories.
N Thanthry, G Gopalakrishnan, R Pendse
openaire +1 more source
An Entropy Based Encrypted Traffic Classifier
2016This paper proposes an approach of encrypted network traffic classification based on entropy calculation and machine learning technique. Apart from using ordinary Shannon’s entropy, we examine entropy after encoding and a weighted average of Shannon binary entropy called BiEntropy.
Mohammad Saiful Islam Mamun +2 more
openaire +1 more source

