Kausar et al., 2019 - Google Patents
Traffic analysis attack for identifying users' online activitiesKausar et al., 2019
- Document ID
- 6951501382216930219
- Author
- Kausar F
- Aljumah S
- Alzaydi S
- Alroba R
- Publication year
- Publication venue
- IT Professional
External Links
Snippet
Traffic analysis is a serious threat over the network. An attacker can analyze network traffic patterns to infer packet's content, even though it is encrypted. This article demonstrates a traffic analysis attack that exploits vulnerabilities in encrypted smartphone communications …
- 238000004458 analytical method 0 title abstract description 26
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US12206692B2 (en) | Malware detection using watermark cookies | |
Jansen et al. | Inside Job: Applying Traffic Analysis to Measure Tor from Within. | |
US10853484B2 (en) | Cookies watermarking in malware analysis | |
CA2966408C (en) | A system and method for network intrusion detection of covert channels based on off-line network traffic | |
Saltaformaggio et al. | Eavesdropping on {Fine-Grained} user activities within smartphone apps over encrypted network traffic | |
Shen et al. | Webpage fingerprinting using only packet length information | |
Kausar et al. | Traffic analysis attack for identifying users’ online activities | |
Papadogiannaki et al. | Otter: A scalable high-resolution encrypted traffic identification engine | |
US20220141252A1 (en) | System and method for data filtering in machine learning model to detect impersonation attacks | |
Almubayed et al. | A model for detecting tor encrypted traffic using supervised machine learning | |
Tayal et al. | Active monitoring & postmortem forensic analysis of network threats: A survey | |
Wang et al. | Comparing website fingerprinting attacks and defenses | |
Ring et al. | A toolset for intrusion and insider threat detection | |
Matoušek et al. | On reliability of JA3 hashes for fingerprinting mobile applications | |
Feng et al. | Cj-sniffer: Measurement and content-agnostic detection of cryptojacking traffic | |
Caprolu et al. | Cryptomining makes noise: a machine learning approach for cryptojacking detection | |
Vanrykel et al. | Leaky birds: Exploiting mobile application traffic for surveillance | |
Agrawal et al. | A survey on analyzing encrypted network traffic of mobile devices | |
Feng et al. | Unmasking the Internet: A Survey of Fine-Grained Network Traffic Analysis | |
Modi | Detecting ransomware in encrypted network traffic using machine learning | |
Siby et al. | You get PADDING, everybody gets PADDING! You get privacy? Evaluating practical QUIC website fingerprinting protections for the masses | |
Bhatiaa et al. | A survey on analyzing encrypted network traffic of mobile devices | |
Mitra et al. | Snoopy: a webpage fingerprinting framework with finite query model for mass-surveillance | |
Yolanda et al. | Analyzing Proxychains Traffic on the Pentest Scenario: Enhancements in Network Forensics through Wireshark | |
Livingston et al. | Analysis of Network Traffic for Identifying Vulnerabilities in Encrypted Smartphone Communications |