Machine learning based encrypted traffic classification: Identifying ssh and skype

R Alshammari… - 2009 IEEE symposium on …, 2009 - ieeexplore.ieee.org
The objective of this work is to assess the robustness of machine learning based traffic
classification for classifying encrypted traffic where SSH and Skype are taken as good …

On the identification and analysis of Skype traffic

S Molnár, M Perényi - International Journal of communication …, 2011 - Wiley Online Library
Skype applies strong encryption to provide secure communication inside the whole Skype
network. It also uses several techniques to conceal the traffic and the protocol. As a …

Identification and analysis of skype peer-to-peer traffic

D Zhang, C Zheng, H Zhang… - 2010 Fifth International …, 2010 - ieeexplore.ieee.org
More and more applications are adopting peer-to-peer (P2P) technology. Skype is a P2P
based, popular VoIP software. The software works almost seamlessly across Network …

Vulnerability of virtual private networks to web fingerprinting attack

KMA Kamal, S Almuhammadi - … in Security, Networks, and Internet of …, 2021 - Springer
Virtual private networks (VPN) are used to maintain secrecy of internet usage. They provide
end-to-end encrypted traffic to hide the content and destination details from potential …

Unveiling Skype encrypted tunnels using GP

R Alshammari… - IEEE Congress on …, 2010 - ieeexplore.ieee.org
The classification of Encrypted Traffic, namely Skype, from network traffic represents a
particularly challenging problem. Solutions should ideally be both simple-therefore efficient …

Detecting VoIP calls hidden in web traffic

EP Freire, A Ziviani, RM Salles - IEEE Transactions on Network …, 2008 - ieeexplore.ieee.org
Peer-to-peer (P2P) voice over IP (VoIP) applications (eg Skype or Google Talk) commonly
use Web TCP ports (80 or 443) as a fallback mechanism to delude restrictive firewalls. This …

Whole home proxies: Bringing enterprise-grade security to residential networks

CR Taylor, CA Shue, ME Najd - 2016 IEEE International …, 2016 - ieeexplore.ieee.org
While enterprise networks follow best practices and security measures, residential networks
often lack these protections. Home networks have constrained resources and lack a …

Enhanced skype traffic identification

M Perényi, S Molnár - 2nd International ICST Conference on Performance …, 2010 - eudl.eu
Skype applies strong encryption to provide secure communication inside the whole Skype
network. The communication ports of clients are chosen randomly. As a consequence …

Skytracer: Towards fine-grained identification for skype traffic via sequence signatures

Z Yuan, C Du, X Chen, D Wang… - 2014 International …, 2014 - ieeexplore.ieee.org
Skype has been a typical choice for providing VoIP service nowadays and is well-known for
its broad range of features, including voice-calls, instant messaging, file transfer and video …

[图书][B] 网络流量分类方法与实践

汪立东, 钱丽萍, 王大伟, 常鹏 - 2013 - books.google.com
本书基于理论结合实践, 基础结合前沿的编写原则,< wbr> 系统地讲解了网络流量分类技术的
相关知识.< wbr> 在内容编排上注重夯实基础, 阐明技术, 关注前沿, 指导实践.< wbr> …