Exposing the rat in the tunnel: Using traffic analysis for tor-based malware detection

P Dodia, M AlSabah, O Alrawi, T Wang - Proceedings of the 2022 ACM …, 2022 - dl.acm.org
Tor~\citetor is the most widely used anonymous communication network with millions of
daily users~\citetormetrics. Since Tor provides server and client anonymity, hundreds of …

View from above: exploring the malware ecosystem from the upper DNS hierarchy

A Faulkenberry, A Avgetidis, Z Ma, O Alrawi… - Proceedings of the 38th …, 2022 - dl.acm.org
This work explores authoritative DNS (AuthDNS) as a new measurement perspective for
studying the large-scale epidemiology of the malware ecosystem—when and where …

Examining Potential Threats of Eavesdropping in TCP Stream of Personal Interactive Transmission Session

A Abubakar, NM Najmuddin, RAM Alwi… - … on Perceptive and …, 2024 - journals.iium.edu.my
This study establishes that Personal Interactive Transmission Sessions conducted using
TCP streams provide exceptional convenience and immediacy. However, they also provide …

Speed Analysis on Client Server Architecture Using HTTP/2 Over HTTP/1: A Generic Review

A Kumar, RK Murugesan, H Chaudhary… - … On Emerging Trends In …, 2023 - Springer
The innovation and advancement of this digital era is where every physical deed is working
remotely and on online platform. Today our generation is surrounded with the plethora of …