Csikor et al., 2021 - Google Patents
Privacy of DNS-over-HTTPS: Requiem for a Dream?Csikor et al., 2021
View PDF- Document ID
- 7041229922391383467
- Author
- Csikor L
- Singh H
- Kang M
- Divakaran D
- Publication year
- Publication venue
- 2021 IEEE European Symposium on Security and Privacy (EuroS&P)
External Links
Snippet
The recently proposed DNS-over-HTTPS (DoH) protocol is becoming increasingly popular in addressing the privacy concerns of exchanging plain-text DNS messages over potentially malicious transit networks (eg, mass surveillance at ISPs). By employing HTTPS to encrypt …
- 238000000034 method 0 abstract description 47
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Csikor et al. | Privacy of DNS-over-HTTPS: Requiem for a Dream? | |
Vekshin et al. | Doh insight: Detecting dns over https by machine learning | |
Siby et al. | Encrypted DNS--> privacy? A traffic analysis perspective | |
Lyu et al. | A survey on DNS encryption: Current development, malware misuse, and inference techniques | |
Anderson et al. | Deciphering malware’s use of TLS (without decryption) | |
Wang et al. | Effective attacks and provable defenses for website fingerprinting | |
Husák et al. | HTTPS traffic analysis and client identification using passive SSL/TLS fingerprinting | |
US11838330B2 (en) | Selective information extraction from network traffic traces both encrypted and non-encrypted | |
Jeya et al. | Efficient classifier for R2L and U2R attacks | |
Chatzoglou et al. | Revisiting QUIC attacks: A comprehensive review on QUIC security and a hands-on study | |
Yen et al. | Browser fingerprinting from coarse traffic summaries: Techniques and implications | |
Hynek et al. | Refined detection of ssh brute-force attackers using machine learning | |
RU2601147C2 (en) | System and method for detection of target attacks | |
Gomez et al. | Unsupervised detection and clustering of malicious tls flows | |
Satam et al. | Dns-ids: Securing dns in the cloud era | |
Singh et al. | A comparative review of malware analysis and detection in HTTPs traffic | |
Wichmann et al. | Detection of brute-force attacks in end-to-end encrypted network traffic | |
Bannat Wala et al. | Insights into doh: Traffic classification for dns over https in an encrypted network | |
Papadogiannaki et al. | Pump up the JARM: Studying the evolution of Botnets using active TLS fingerprinting | |
Mimura et al. | A practical experiment of the HTTP-based RAT detection method in proxy server logs | |
Moure-Garrido et al. | Detecting malicious use of doh tunnels using statistical traffic analysis | |
Di Martino et al. | Knocking on IPs: Identifying HTTPS Websites for Zero‐Rated Traffic | |
Wickramasinghe et al. | SoK: Decoding the Enigma of Encrypted Network Traffic Classifiers | |
Hu et al. | Characterizing privacy leakage in encrypted DNS traffic | |
Oudah et al. | Using burstiness for network applications classification |