A comprehensive survey of covert communication techniques, limitations and future challenges

I Makhdoom, M Abolhasan, J Lipman - Computers & Security, 2022 - Elsevier
Data encryption aims to protect the confidentiality of data at storage, during transmission, or
while in processing. However, it is not always the optimum choice as attackers know the …

A review on machine learning–based approaches for Internet traffic classification

O Salman, IH Elhajj, A Kayssi, A Chehab - Annals of Telecommunications, 2020 - Springer
Traffic classification acquired the interest of the Internet community early on. Different
approaches have been proposed to classify Internet traffic to manage both security and …

Blocking-resistant communication through domain fronting

D Fifield, C Lan, R Hynes, P Wegmann… - … on Privacy Enhancing …, 2015 - petsymposium.org
We describe “domain fronting,” a versatile censorship circumvention technique that hides
the remote endpoint of a communication. Domain fronting works at the application layer …

Deepcorr: Strong flow correlation attacks on tor using deep learning

M Nasr, A Bahramali, A Houmansadr - Proceedings of the 2018 ACM …, 2018 - dl.acm.org
Flow correlation is the core technique used in a multitude of deanonymization attacks on
Tor. Despite the importance of flow correlation attacks on Tor, existing flow correlation …

[图书][B] How the great firewall of china is blocking tor

P Winter, S Lindskog - 2012 - usenix.org
How the Great Firewall of China is Blocking Tor Page 1 How the Great Firewall of China is
Blocking Tor Philipp Winter and Stefan Lindskog Karlstad University Aug. 6, 2012 Page 2 In a …

Bringing a gan to a knife-fight: Adapting malware communication to avoid detection

M Rigaki, S Garcia - 2018 IEEE Security and Privacy …, 2018 - ieeexplore.ieee.org
Generative Adversarial Networks (GANs) have been successfully used in a large number of
domains. This paper proposes the use of GANs for generating network traffic in order to …

The parrot is dead: Observing unobservable network communications

A Houmansadr, C Brubaker… - 2013 IEEE Symposium …, 2013 - ieeexplore.ieee.org
In response to the growing popularity of Tor and other censorship circumvention systems,
censors in non-democratic countries have increased their technical capabilities and can …

Stegotorus: a camouflage proxy for the tor anonymity system

Z Weinberg, J Wang, V Yegneswaran… - Proceedings of the …, 2012 - dl.acm.org
Internet censorship by governments is an increasingly common practice worldwide. Internet
users and censors are locked in an arms race: as users find ways to evade censorship …

Meteor: Cryptographically secure steganography for realistic distributions

G Kaptchuk, TM Jois, M Green, AD Rubin - Proceedings of the 2021 …, 2021 - dl.acm.org
Despite a long history of research and wide-spread applications to censorship resistant
systems, practical steganographic systems capable of embedding messages into realistic …

[PDF][PDF] The cyber security body of knowledge

D Basin - University of Bristol, ch. Formal Methods for, 2021 - cybok.org
The CyBOK project would like to understand how the CyBOK is being used and its uptake.
The project would like organisations using, or intending to use, CyBOK for the purposes of …