A survey on encrypted network traffic analysis applications, techniques, and countermeasures

E Papadogiannaki, S Ioannidis - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
The adoption of network traffic encryption is continually growing. Popular applications use
encryption protocols to secure communications and protect the privacy of users. In addition …

[HTML][HTML] A comprehensive survey of recent internet measurement techniques for cyber security

MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …

Et-bert: A contextualized datagram representation with pre-training transformers for encrypted traffic classification

X Lin, G Xiong, G Gou, Z Li, J Shi, J Yu - Proceedings of the ACM Web …, 2022 - dl.acm.org
Encrypted traffic classification requires discriminative and robust traffic representation
captured from content-invisible and imbalanced traffic data for accurate classification, which …

Realtime robust malicious traffic detection via frequency domain analysis

C Fu, Q Li, M Shen, K Xu - Proceedings of the 2021 ACM SIGSAC …, 2021 - dl.acm.org
Machine learning (ML) based malicious traffic detection is an emerging security paradigm,
particularly for zero-day attack detection, which is complementary to existing rule based …

[HTML][HTML] Network traffic classification: Techniques, datasets, and challenges

A Azab, M Khasawneh, S Alrabaee, KKR Choo… - Digital Communications …, 2022 - Elsevier
In network traffic classification, it is important to understand the correlation between network
traffic and its causal application, protocol, or service group, for example, in facilitating lawful …

[HTML][HTML] Network traffic classification for data fusion: A survey

J Zhao, X Jing, Z Yan, W Pedrycz - Information Fusion, 2021 - Elsevier
Traffic classification groups similar or related traffic data, which is one main stream
technique of data fusion in the field of network management and security. With the rapid …

New directions in automated traffic analysis

J Holland, P Schmitt, N Feamster, P Mittal - Proceedings of the 2021 …, 2021 - dl.acm.org
Machine learning is leveraged for many network traffic analysis tasks in security, from
application identification to intrusion detection. Yet, the aspects of the machine learning …

Deepcase: Semi-supervised contextual analysis of security events

T Van Ede, H Aghakhani, N Spahn… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
Security monitoring systems detect potentially malicious activities in IT infrastructures, by
either looking for known signatures or for anomalous behaviors. Security operators …

Detecting DNS over HTTPS based data exfiltration

M Zhan, Y Li, G Yu, B Li, W Wang - Computer Networks, 2022 - Elsevier
DNS is often used by attackers as a covert channel for data exfiltration, also known as DNS
tunneling. Since the plaintext DNS lookup leads to privacy issues, DNS over HTTPS (DoH) …

Characterization and prediction of mobile-app traffic using Markov modeling

G Aceto, G Bovenzi, D Ciuonzo… - … on Network and …, 2021 - ieeexplore.ieee.org
Modeling network traffic is an endeavor actively carried on since early digital
communications, supporting a number of practical applications, that range from network …