A comprehensive analysis of website fingerprinting defenses on Tor

X Xiao, X Zhou, Z Yang, L Yu, B Zhang, Q Liu… - Computers & Security, 2024 - Elsevier
Website fingerprinting (WF) enables eavesdroppers to identify the website a user is visiting
by network surveillance, even if the traffic is protected by anonymous communication …

An ensemble framework for detection of DNS-Over-HTTPS (DOH) traffic

A Aggarwal, M Kumar - Multimedia Tools and Applications, 2024 - Springer
Abstract Domain Name System (DNS) is a fundamental protocol and backbone of the
internet that translates domain names to Internet Protocol (IP) addresses. Initially, it was only …

MP-GUARD: A novel multi-pronged intrusion detection and mitigation framework for scalable SD-IoT networks using cooperative monitoring, ensemble learning, and …

A El-Sayed, W Said, A Tolba, Y Alginahi… - Computers and Electrical …, 2024 - Elsevier
The ever-increasing complexity of the Internet of Things (IoT) environment demands robust
and adaptable intrusion detection frameworks, as existing approaches struggle with real …

Intelligent model for the detection and classification of encrypted network traffic in cloud infrastructure

M Dawood, C Xiao, S Tu, FA Alotaibi, MM Alnfiai… - PeerJ Computer …, 2024 - peerj.com
This article explores detecting and categorizing network traffic data using machine-learning
(ML) methods, specifically focusing on the Domain Name Server (DNS) protocol. DNS has …

Insights into doh: Traffic classification for dns over https in an encrypted network

F Bannat Wala, S Campbell, M Kiran - … of the 2023 on Systems and …, 2023 - dl.acm.org
In the past few years there has been a growing desire to provide more built in functionality to
protect user communications from eavesdropping. An example of this is DNS over HTTPS …

A Multi-Path Approach to Protect DNS Against DDoS Attacks

S Alouneh - Journal of Cyber Security and Mobility, 2023 - journals.riverpublishers.com
Abstract Domain Name System (DNS) is considered a vital service for the internet and
networks operations, and practically this service is configured and accessible across …

[引用][C] BIG DATA ANALYSIS TECHNIQUES FOR NETWORK TRAFFIC MONITORING: THE STORY OF DNS OVER HTTPS DETECTION