Sok: Content moderation for end-to-end encryption

S Scheffler, J Mayer - arXiv preprint arXiv:2303.03979, 2023 - arxiv.org
Popular messaging applications now enable end-to-end-encryption (E2EE) by default, and
E2EE data storage is becoming common. These important advances for security and privacy …

Is encrypted clienthello a challenge for traffic classification?

D Shamsimukhametov, A Kurapov… - IEEE …, 2022 - ieeexplore.ieee.org
Although the widely-used Transport Layer Security (TLS) protocol hides application data, an
unencrypted part of the TLS handshake, specifically the server name indication (SNI), is a …

[PDF][PDF] BSTFNet: An Encrypted Malicious Traffic Classification Method Integrating Global Semantic and Spatiotemporal Features.

H Huang, X Zhang, Y Lu, Z Li… - Computers, Materials & …, 2024 - cdn.techscience.cn
While encryption technology safeguards the security of network communications, malicious
traffic also uses encryption protocols to obscure its malicious behavior. To address the …

Fingerprinting the Shadows: Unmasking Malicious Servers with Machine Learning-Powered TLS Analysis

A Theofanous, E Papadogiannaki, A Shevtsov… - Proceedings of the …, 2024 - dl.acm.org
Over the last few years, the adoption of encryption in network traffic has been constantly
increasing. The percentage of encrypted communications worldwide is estimated to exceed …

Security Operation Support by Estimating Cyber Attacks Without Traffic Decryption

S Hiruta, I Hosomi, H Hasegawa… - 2023 IEEE 47th Annual …, 2023 - ieeexplore.ieee.org
The use of encrypted communications has become common and now majority on Internet
traffic. Taking advantage of this trend, attackers also use encrypted communications for …

A machine learning classification approach to detect TLS-based malware using entropy-based flow set features

K Keshkeh, A Jantan, K Alieyan - Journal of Information and …, 2022 - e-journal.uum.edu.my
Transport Layer Security (TLS) based malware is one of the most hazardous malware types,
as it relies on encryption to conceal connections. Due to the complexity of TLS traffic …