Wifi-based iot devices profiling attack based on eavesdropping of encrypted wifi traffic

M Alyami, I Alharbi, C Zou, Y Solihin… - 2022 IEEE 19th …, 2022 - ieeexplore.ieee.org
Recent research has shown that in-network observers of WiFi communication (ie, observers
who have joined the WiFi network) can obtain much information regarding the types, user …

GAN tunnel: Network traffic steganography by using GANs to counter internet traffic classifiers

S Fathi-Kazerooni, R Rojas-Cessa - Ieee Access, 2020 - ieeexplore.ieee.org
In this paper, we introduce a novel traffic masking method, called Generative Adversarial
Network (GAN) tunnel, to protect the identity of applications that generate network traffic from …

Iot event classification based on network traffic

B Charyyev, MH Gunes - IEEE INFOCOM 2020-IEEE …, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) consists of sensors and actuators that facilitate many aspects of
our daily life. Compared to typical computing devices such as laptops and smartphones …

Artificial noise aided scheme to secure UAV-assisted Internet of Things with wireless power transfer

Q Wang, HN Dai, X Li, MK Shukla, M Imran - Computer Communications, 2020 - Elsevier
The proliferation of massive Internet of Things (IoT) devices poses research challenges
especially in unmanned aerial vehicles (UAV)-assisted IoT. In particular, the limited battery …

Countering machine-learning classification of applications by equalizing network traffic statistics

S Fathi-Kazerooni… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
We propose to equalize primary statistical metrics to decrease adversarial classification
accuracy of network traffic classifiers that are based on supervised machine learning (ML) …

[PDF][PDF] A review on internet traffic classification based on artificial intelligence techniques

MP Malek, S Naderi, HG Garakani - International Journal of …, 2022 - academia.edu
Almost every industry has revolutionized with Artificial Intelligence. The telecommunication
industry is one of them to improve customers' Quality of Services and Quality of Experience …

Machine Learning Based Encrypted Content Type Identification

Z Mehmood, A Sultan, F Khan… - 2023 International …, 2023 - ieeexplore.ieee.org
In the advancing era, Machine Learning has become the backbone of IT and is being used
almost in every system. Whereas Cryptography is another widely used technology, which is …

An Identification Algorithm of Attacking Programs based on Quadratic Feature Selection and Fast Decision Tree

D Shi, S Cai, S Qin, Z Wang, Q Zhong… - 2021 IEEE 21st …, 2021 - ieeexplore.ieee.org
With the rapid development of Internet, the scale of the network is gradually expanding,
which brings convenience to our life, as well as brings many network security issues, such …

Internet-of-Things Privacy in WiFi Networks: Side-Channel Leakage and Mitigations

M Alyami - 2024 - stars.library.ucf.edu
WiFi networks are susceptible to statistical traffic analysis attacks. Despite encryption, the
metadata of encrypted traffic, such as packet inter-arrival time and size, remains visible. This …

Application of Machine Learning Models for Device Identification in Wireless Network Traffic

RN Anaedevha - 2024 Conference of Young Researchers in …, 2024 - ieeexplore.ieee.org
T Variants of vulnerabilities in wireless network are rapidly increasing as a result of
emerging network traffic complexities. The addition of network communication protocols …