Essays about: "encrypted traffic"

Showing result 1 - 5 of 22 essays containing the words encrypted traffic.

  1. 1. Preserving Privacy in Cloud Services by Using an Explainable Deep-Learning Model for Anomaly Detection

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Shiwei Dong; [2023]
    Keywords : ;

    Abstract : As cloud services become increasingly popular, ensuring their privacy and security has become a significant concern for users. Cloud computing involves Data Service Outsourcing and Computation Outsourcing, which require additional security considerations compared to traditional computing. READ MORE

  2. 2. Towards Realistic Datasets forClassification of VPN Traffic : The Effects of Background Noise on Website Fingerprinting Attacks

    University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)

    Author : Christoffer Sandquist; Jon-Erik Ersson; [2023]
    Keywords : Data collection; Website fingerprinting; dataset; traffic analysis; VPN; encrypted traffic; machine learning; deep learning; network measurements; twitch; Datainsamling; Profilering av hemsidor; dataset; trafikanalys; VPN; krypterad trafik; maskininlärning; djupinlärning; nätverksmätningar; twitch;

    Abstract : Virtual Private Networks (VPNs) is a booming business with significant margins once a solid user base has been established and big VPN providers are putting considerable amounts of money into marketing. However, there exists Website Fingerprinting (WF) attacks that are able to correctly predict which website a user is visiting based on web traffic even though it is going through a VPN tunnel. READ MORE

  3. 3. The Effect Background Traffic in VPNs has on Website Fingerprinting

    University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)

    Author : Gustav Rehnholm; [2023]
    Keywords : Website Fingerprinting; Virtual Private Network; Deep Learning; Mönsterigenkänning; Virtuellt Privat Nätverk; Djup Inlärning;

    Abstract : Tor and VPNs are used by many to be anonymous and circumvent censorship on the Internet. Therefore, traffic analysis attacks that enable adversaries to link users to their online activities are a severe threat. READ MORE

  4. 4. Generic Encrypted Traffic Identification using Network Grammar : A Case Study in Passive OS Fingerprinting

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Lukas Rajala; Kevin Scott; [2022]
    Keywords : Passive OS Fingerprinting; Encrypted Traffic Identification; Automated Traffic Analysis; Machine Learning; Supervised Learning; Networks; Packet Classification; Security and Privacy;

    Abstract : The increase in cybercrime and cyber-warfare has spurred the cat-and-mouse game of finding and attacking vulnerable devices on government or private company networks. The devices attacked are often forgotten computers that run operating systems with known exploits. READ MORE

  5. 5. Security analysis of a modern smart camera

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Simon Johannesson; Victor Pettersson; [2022]
    Keywords : Internet of Things; Security; Pentesting; PatrIoT; Wi-Fi Camera; Sakernas internet; Säkerhet; Penetrationstest; PatrIot; Wi-Fi-Kamera;

    Abstract : IoT devices have historically lacked in the security standards but at the same time it is a continuously growing market it is important that the security analyzes continue in order to evaluate the development of the security in the IoT industry. This research is a security analysis of the Deltaco SH-IPC05 WIFI Camera, it is an inexpensive device that can be accessed through a mobile application from anywhere on the internet via the cloud. READ MORE