Adaptive packet padding approach for smart home networks: A tradeoff between privacy and performance

AJ Pinheiro, PF de Araujo-Filho… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
The presence of connected devices in homes introduces numerous threats to privacy via the
analysis of the encrypted traffic these devices generate. Prior works have shown that traffic …

Espada: Enhanced payload analyzer for malware detection robust against adversarial threats

JM Vidal, MAS Monge, SMM Monterrubio - Future Generation Computer …, 2020 - Elsevier
The emergent communication technologies landscape has consolidated the anomaly-based
intrusion detection paradigm as one of the most prominent solutions able to discover …

Network traffic obfuscation: An adversarial machine learning approach

G Verma, E Ciftcioglu, R Sheatsley… - MILCOM 2018-2018 …, 2018 - ieeexplore.ieee.org
An agent (D) aims to defend a network's traffic (T) from inference (classification) of
applications or protocols (P) traversing that nework by an attacker (A). D aims to confuse A …

Optimizing honey traffic using game theory and adversarial learning

MS Miah, M Zhu, A Granados, N Sharmin… - … , Strategies, and Human …, 2022 - Springer
Enterprises are increasingly concerned about adversaries that slowly and deliberately
exploit resources over the course of months or even years. A key step in this kill chain is …

A realistic approach for network traffic obfuscation using adversarial machine learning

A Granados, MS Miah, A Ortiz, C Kiekintveld - Decision and Game Theory …, 2020 - Springer
Adversaries are becoming more sophisticated and standard countermeasures such as
encryption are no longer enough to prevent traffic analysis from revealing important …

Strategic Cyber Camouflage

C Kiekintveld, A Laszka, MS Miah, S Roy… - … Intelligent Cyber Defense …, 2023 - Springer
One of the most fundamental tasks for an AICA agent will be to manipulate information that
an adversary can observe, either about a network or the AICA agent itself. This includes …

[PDF][PDF] Context-Aware Networking and Cybersecurity for Resilient Networking (Summary Technical Report, Oct 2017–Sep 2020)

K Chan, E Graves, K Marcus, T Moore, J Perazzone… - 2022 - apps.dtic.mil
This report summarizes research results over the life of the Experimental Methods in
Network Science project covering approximately 2017–2020. The project focused on two …

Modeling prosumer behavior in the smart grid and implementing privacy design in IoT

M Rajabpour - 2022 - search.proquest.com
Smart cities include a diverse of set of infrastructures that are woven into the fabric of the
lives of its residents. These infrastructures range from communications to transportation to …

Game-Theoretic Deception Modeling for Distracting Network Adversaries

MS Miah - 2022 - search.proquest.com
In this day and age, adversaries in the cybersecurity space have become alarmingly
capable of identifying network vulnerabilities and work out various targets to attack where …

A Realistic Approach for Network Traffic Obfuscation Using Adversarial Machine Learning

C Kiekintveld - Decision and Game Theory for Security: 11th …, 2020 - books.google.com
Adversaries are becoming more sophisticated and standard countermeasures such as
encryption are no longer enough to prevent traffic analysis from revealing important …