Detecting unknown encrypted malicious traffic in real time via flow interaction graph analysis

C Fu, Q Li, K Xu - arXiv preprint arXiv:2301.13686, 2023 - arxiv.org
In this paper, we propose HyperVision, a realtime unsupervised machine learning (ML)
based malicious traffic detection system. Particularly, HyperVision is able to detect unknown …

Frequency domain feature based robust malicious traffic detection

C Fu, Q Li, M Shen, K Xu - IEEE/ACM Transactions on …, 2022 - ieeexplore.ieee.org
Machine learning (ML) based malicious traffic detection is an emerging security paradigm,
particularly for zero-day attack detection, which is complementary to existing rule based …

MASK: practical source and path verification based on Multi-AS-Key

S Fu, Q Li, M Zhu, X Wang, S Yao… - IEEE/ACM …, 2022 - ieeexplore.ieee.org
The source and path verification in Path-Aware Networking considers the two critical
issues:(1) end hosts could verify that the network follows their forwarding decisions, and (2) …

Protection schemes for DDoS, ARP spoofing, and IP fragmentation attacks in smart factory

TU Chai, HG Goh, SY Liew, V Ponnusamy - Systems, 2023 - mdpi.com
Industry Revolution 4.0 connects the Internet of Things (IoT) resource-constrained devices to
Smart Factory solutions and delivers insights. As a result, a complex and dynamic network …

Poster: Off-Path DNSSEC Downgrade Attacks

E Heftrig, H Shulman, M Waidner - Proceedings of the ACM SIGCOMM …, 2023 - dl.acm.org
Recent works found that signing zones with new cryptographic ciphers may disable
DNSSEC validation in DNS resolvers. Adversaries could exploit this to manipulate algorithm …

Athena: Analyzing and Quantifying Side Channels of Transport Layer Protocols

F Yu, Q Zhou, SR Hussain, D Zhang - 33rd USENIX Security Symposium …, 2024 - usenix.org
Recent research has shown a growing number of side-channel vulnerabilities in transport
layer protocols, such as TCP and UDP. Those side channels can be exploited by …

Flow Interaction Graph Analysis: Unknown Encrypted Malicious Traffic Detection

C Fu, Q Li, K Xu - IEEE/ACM Transactions on Networking, 2024 - ieeexplore.ieee.org
Nowadays traffic on the Internet has been widely encrypted to protect its confidentiality and
privacy. However, traffic encryption is always abused by attackers to conceal their malicious …

Secure Fault Localization in Path Aware Networking

S Fu, Q Li, X Wang, S Yao, X Feng… - … on Dependable and …, 2024 - ieeexplore.ieee.org
Secure data forwarding is critical for users to meet their requirements. In this paper, we
propose D3 (Demon Detector in Data Plane), a source-driven, secure fault localization …

Toward Practical Inter-Domain Source Address Validation

X Wang, K Xu, Y Guo, H Wang, S Fu… - IEEE/ACM …, 2024 - ieeexplore.ieee.org
The Internet Protocol (IP) is the most fundamental building block of the Internet. However, it
provides no explicit notion of packet-level authenticity. Such a weakness allows malicious …

Threat Modeling for ML-based Topology Prediction in Vehicular Edge Computing Architecture

HH Doan, AA Paul, H Zeindlinger… - 2023 IEEE Intl Conf …, 2023 - ieeexplore.ieee.org
The Internet of Vehicles (IoV), a network that interlinks vehicles, infrastructure, and assorted
entities, serves as a cornerstone for intelligent transportation systems and the emergence of …