Essays about: "Encrypted traffic."
Showing result 1 - 5 of 22 essays containing the words Encrypted traffic..
-
1. Preserving Privacy in Cloud Services by Using an Explainable Deep-Learning Model for Anomaly Detection
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : As cloud services become increasingly popular, ensuring their privacy and security has become a significant concern for users. Cloud computing involves Data Service Outsourcing and Computation Outsourcing, which require additional security considerations compared to traditional computing. READ MORE
-
2. Towards Realistic Datasets forClassification of VPN Traffic : The Effects of Background Noise on Website Fingerprinting Attacks
University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)Abstract : Virtual Private Networks (VPNs) is a booming business with significant margins once a solid user base has been established and big VPN providers are putting considerable amounts of money into marketing. However, there exists Website Fingerprinting (WF) attacks that are able to correctly predict which website a user is visiting based on web traffic even though it is going through a VPN tunnel. READ MORE
-
3. The Effect Background Traffic in VPNs has on Website Fingerprinting
University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)Abstract : Tor and VPNs are used by many to be anonymous and circumvent censorship on the Internet. Therefore, traffic analysis attacks that enable adversaries to link users to their online activities are a severe threat. READ MORE
-
4. Generic Encrypted Traffic Identification using Network Grammar : A Case Study in Passive OS Fingerprinting
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : The increase in cybercrime and cyber-warfare has spurred the cat-and-mouse game of finding and attacking vulnerable devices on government or private company networks. The devices attacked are often forgotten computers that run operating systems with known exploits. READ MORE
-
5. Security analysis of a modern smart camera
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : IoT devices have historically lacked in the security standards but at the same time it is a continuously growing market it is important that the security analyzes continue in order to evaluate the development of the security in the IoT industry. This research is a security analysis of the Deltaco SH-IPC05 WIFI Camera, it is an inexpensive device that can be accessed through a mobile application from anywhere on the internet via the cloud. READ MORE