What can you learn from an IP?

S Patil, N Borisov - Proceedings of the Applied Networking Research …, 2019 - dl.acm.org
The Internet was not designed with security in mind. A number of recent protocols such as
Encrypted DNS, HTTPS, etc. target encrypting critical parts of the web architecture, which …

Towards web service classification using addresses and DNS

M Trevisan, I Drago, M Mellia… - … and Mobile Computing …, 2016 - ieeexplore.ieee.org
The identification of the services that generate traffic is crucial for ISPs and companies to
plan and monitor the network. The widespread deployment of encryption and the …

AWESoME: Big data for automatic Web service management in SDN

M Trevisan, I Drago, M Mellia… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Software defined network (SDN) has enabled consistent and programmable management in
computer networks. However, the explosion of cloud services and content delivery networks …

Improving SNI-based HTTPS security monitoring

WM Shbair, T Cholez, J François… - 2016 IEEE 36th …, 2016 - ieeexplore.ieee.org
Recent surveys show that the proportion of encrypted web traffic is quickly increasing. On
one side, it provides users with essential properties of security and privacy, but on the other …

History-based classification of traffic into QoS class with self-update

CJ Su, K Jain, SG Hong - US Patent 10,341,241, 2019 - Google Patents
Methods and systems of history-based instantaneous QoS class classification of traffic flow.
QoS classifications are mapped to target destinations such that, when a first flow parcket …

STI: A self-evolutive traffic identification system for unknown applications based on improved random forest

Y Liang, F Wang, S Chen, B Chen, Y Bo - Computer Communications, 2024 - Elsevier
Artificial intelligence technology has proven potential and effective in traffic identification for
network management and security. However, the accuracy of its identification is easily …

Machine learning and feature engineering for computer network security

JJ Davis - 2017 - eprints.qut.edu.au
This thesis studies the application of machine learning to the field of Cyber security. Machine
learning algorithms promise to enhance Cyber security by identifying malicious activity …

Waterfall: Rapid identification of IP flows using cascade classification

P Foremski, C Callegari, M Pagano - … , CN 2014, Brunów, Poland, June 23 …, 2014 - Springer
In the last years network traffic classification has attracted much research effort, given that it
represents the foundation of many Internet functionalities such as Quality of Service (QoS) …

What's my app? ml-based classification of rtc applications

D Markudova, M Trevisan, P Garza, M Meo… - ACM SIGMETRICS …, 2021 - dl.acm.org
With the spread of broadband Internet, Real-Time Communication (RTC) platforms have
become increasingly popular and have transformed the way people communicate. Thus, it is …

WHAT: A big data approach for accounting of modern web services

M Trevisan, I Drago, M Mellia… - … conference on big …, 2016 - ieeexplore.ieee.org
HTTP (S) has become the main means to access the Internet. The web is a tangle, with (i)
multiple services and applications co-located on the same infrastructure and (ii) several …