[go: up one dir, main page]

Csikor et al., 2021 - Google Patents

Privacy of DNS-over-HTTPS: Requiem for a Dream?

Csikor et al., 2021

View PDF
Document ID
7041229922391383467
Author
Csikor L
Singh H
Kang M
Divakaran D
Publication year
Publication venue
2021 IEEE European Symposium on Security and Privacy (EuroS&P)

External Links

Snippet

The recently proposed DNS-over-HTTPS (DoH) protocol is becoming increasingly popular in addressing the privacy concerns of exchanging plain-text DNS messages over potentially malicious transit networks (eg, mass surveillance at ISPs). By employing HTTPS to encrypt …
Continue reading at lendulet.tmit.bme.hu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection

Similar Documents

Publication Publication Date Title
Csikor et al. Privacy of DNS-over-HTTPS: Requiem for a Dream?
Vekshin et al. Doh insight: Detecting dns over https by machine learning
Siby et al. Encrypted DNS--> privacy? A traffic analysis perspective
Lyu et al. A survey on DNS encryption: Current development, malware misuse, and inference techniques
Anderson et al. Deciphering malware’s use of TLS (without decryption)
Wang et al. Effective attacks and provable defenses for website fingerprinting
Husák et al. HTTPS traffic analysis and client identification using passive SSL/TLS fingerprinting
US11838330B2 (en) Selective information extraction from network traffic traces both encrypted and non-encrypted
Jeya et al. Efficient classifier for R2L and U2R attacks
Chatzoglou et al. Revisiting QUIC attacks: A comprehensive review on QUIC security and a hands-on study
Yen et al. Browser fingerprinting from coarse traffic summaries: Techniques and implications
Hynek et al. Refined detection of ssh brute-force attackers using machine learning
RU2601147C2 (en) System and method for detection of target attacks
Gomez et al. Unsupervised detection and clustering of malicious tls flows
Satam et al. Dns-ids: Securing dns in the cloud era
Singh et al. A comparative review of malware analysis and detection in HTTPs traffic
Wichmann et al. Detection of brute-force attacks in end-to-end encrypted network traffic
Bannat Wala et al. Insights into doh: Traffic classification for dns over https in an encrypted network
Papadogiannaki et al. Pump up the JARM: Studying the evolution of Botnets using active TLS fingerprinting
Mimura et al. A practical experiment of the HTTP-based RAT detection method in proxy server logs
Moure-Garrido et al. Detecting malicious use of doh tunnels using statistical traffic analysis
Di Martino et al. Knocking on IPs: Identifying HTTPS Websites for Zero‐Rated Traffic
Wickramasinghe et al. SoK: Decoding the Enigma of Encrypted Network Traffic Classifiers
Hu et al. Characterizing privacy leakage in encrypted DNS traffic
Oudah et al. Using burstiness for network applications classification