Sarfaraz et al., 2018 - Google Patents
Feature selection based correlation attack on HTTPS secure searchingSarfaraz et al., 2018
- Document ID
- 15713654447541033195
- Author
- Sarfaraz A
- Khan A
- Publication year
- Publication venue
- Wireless Personal Communications
External Links
Snippet
Search engine plays an irreplaceable role in web information organizing and accessing. It is very common for Internet users to query a search engine when retrieving web information. Sensitive data about search engine user's intentions or behavior can be inferred from his …
- 238000004458 analytical method 0 abstract description 14
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/30864—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
- G06F17/30867—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30634—Querying
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30613—Indexing
- G06F17/30619—Indexing indexing structures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2127—Bluffing
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Herrmann et al. | Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial naïve-bayes classifier | |
Yu et al. | Predicted packet padding for anonymous web browsing against traffic analysis attacks | |
Xie et al. | Resurf: Reconstructing web-surfing activity from network traffic | |
Mokhtar et al. | X-search: revisiting private web search using intel sgx | |
He et al. | A novel application classification attack against Tor | |
Zhan et al. | Website fingerprinting on early QUIC traffic | |
Taylor et al. | Detecting malicious exploit kits using tree-based similarity searches | |
Danezis | Traffic Analysis of the HTTP Protocol over TLS | |
Papaodyssefs et al. | Web identity translator: Behavioral advertising and identity privacy with wit | |
Wang et al. | Comparing website fingerprinting attacks and defenses | |
Kumar et al. | Machine learning models for phishing detection from TLS traffic | |
Trevisan et al. | Attacking DoH and ECH: Does server name encryption protect users’ privacy? | |
Herrmann et al. | Analyzing characteristic host access patterns for re-identification of web user sessions | |
Yu et al. | Attacking anonymous web browsing at local area networks through browsing dynamics | |
He et al. | Mobile app identification for encrypted network flows by traffic correlation | |
Gu et al. | A novel behavior-based tracking attack for user identification | |
Sarfaraz et al. | Feature selection based correlation attack on HTTPS secure searching | |
Sood et al. | The Covid-19 threat landscape | |
Sharma et al. | Critter: Content-rich traffic trace repository | |
Gu et al. | A novel attack to track users based on the behavior patterns | |
Boyapati et al. | Anti-phishing approaches in the era of the internet of things | |
Yang et al. | AAP: defending against website fingerprinting through burst obfuscation | |
Li et al. | Robust website fingerprinting through resource loading sequence | |
Zou et al. | PF: Website fingerprinting attack using probabilistic topic model | |
Yan et al. | Fingerprinting Search Keywords over HTTPS at Scale |