[go: up one dir, main page]

Kausar et al., 2019 - Google Patents

Traffic analysis attack for identifying users' online activities

Kausar et al., 2019

Document ID
6951501382216930219
Author
Kausar F
Aljumah S
Alzaydi S
Alroba R
Publication year
Publication venue
IT Professional

External Links

Snippet

Traffic analysis is a serious threat over the network. An attacker can analyze network traffic patterns to infer packet's content, even though it is encrypted. This article demonstrates a traffic analysis attack that exploits vulnerabilities in encrypted smartphone communications …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing

Similar Documents

Publication Publication Date Title
US12206692B2 (en) Malware detection using watermark cookies
Jansen et al. Inside Job: Applying Traffic Analysis to Measure Tor from Within.
US10853484B2 (en) Cookies watermarking in malware analysis
CA2966408C (en) A system and method for network intrusion detection of covert channels based on off-line network traffic
Saltaformaggio et al. Eavesdropping on {Fine-Grained} user activities within smartphone apps over encrypted network traffic
Shen et al. Webpage fingerprinting using only packet length information
Kausar et al. Traffic analysis attack for identifying users’ online activities
Papadogiannaki et al. Otter: A scalable high-resolution encrypted traffic identification engine
US20220141252A1 (en) System and method for data filtering in machine learning model to detect impersonation attacks
Almubayed et al. A model for detecting tor encrypted traffic using supervised machine learning
Tayal et al. Active monitoring & postmortem forensic analysis of network threats: A survey
Wang et al. Comparing website fingerprinting attacks and defenses
Ring et al. A toolset for intrusion and insider threat detection
Matoušek et al. On reliability of JA3 hashes for fingerprinting mobile applications
Feng et al. Cj-sniffer: Measurement and content-agnostic detection of cryptojacking traffic
Caprolu et al. Cryptomining makes noise: a machine learning approach for cryptojacking detection
Vanrykel et al. Leaky birds: Exploiting mobile application traffic for surveillance
Agrawal et al. A survey on analyzing encrypted network traffic of mobile devices
Feng et al. Unmasking the Internet: A Survey of Fine-Grained Network Traffic Analysis
Modi Detecting ransomware in encrypted network traffic using machine learning
Siby et al. You get PADDING, everybody gets PADDING! You get privacy? Evaluating practical QUIC website fingerprinting protections for the masses
Bhatiaa et al. A survey on analyzing encrypted network traffic of mobile devices
Mitra et al. Snoopy: a webpage fingerprinting framework with finite query model for mass-surveillance
Yolanda et al. Analyzing Proxychains Traffic on the Pentest Scenario: Enhancements in Network Forensics through Wireshark
Livingston et al. Analysis of Network Traffic for Identifying Vulnerabilities in Encrypted Smartphone Communications