This paper describes a novel approach to classify network traffic into encrypted and unencrypted traffic. The classifier is able to operate in real-time as only the first packet of each flow is processed. The main metric used for classification is an estimation of the entropy of the first packet payload. The approach is evaluated based on encrypted ground truth traces and on real network traces. Encrypted traffic such as Skype, or encrypted eDonkey traffic are detected as encrypted with probability higher than 94%. Unencrypted protocols such as SMTP, HTTP, POP3 or FTP are detected as unencrypted with probability higher than 99.9%. The presented approach, named real-time encrypted traffic detector (RT-ETD), is well suited to operate as pre-f...
Since its inception until today, the Internet has been in constant transformation. The analysis and ...
There are several techniques for classifying internet traffic, i.e. associating a flow of packets t...
There are several techniques for classifying internet traffic, i.e. associating a flow of packets t...
Network security requires real-time monitoring of network traffic in order to detect new and unexpec...
High entropy (HE) traffic may result from encrypted traffic such as CandC botnet communication. Such...
High entropy (HE) traffic may result from encrypted traffic such as CandC botnet communication. Such...
Network anomaly detection is a broad area of research. The use of entropy and distributions of traff...
Obfuscated and encrypted protocols hinder traffic classification by classical techniques such as por...
With the rapid increase in encrypted traffic in the network environment and the increasing proportio...
Today, the Internet allows virtually anytime, anywhere access to a seemingly unlimited supply of inf...
This paper proposes and analyzes the performance of a novel technique for the classification of Int...
Abstract—Interest in traffic classification, in both industry and academia, has dramatically grown i...
There are several techniques for classifying internet traffic, i.e. associating a flow of packets t...
This paper proposes and analyzes the performance of a novel technique for the classification of Int...
This paper proposes and analyzes the performance of a novel technique for the classification of Int...
Since its inception until today, the Internet has been in constant transformation. The analysis and ...
There are several techniques for classifying internet traffic, i.e. associating a flow of packets t...
There are several techniques for classifying internet traffic, i.e. associating a flow of packets t...
Network security requires real-time monitoring of network traffic in order to detect new and unexpec...
High entropy (HE) traffic may result from encrypted traffic such as CandC botnet communication. Such...
High entropy (HE) traffic may result from encrypted traffic such as CandC botnet communication. Such...
Network anomaly detection is a broad area of research. The use of entropy and distributions of traff...
Obfuscated and encrypted protocols hinder traffic classification by classical techniques such as por...
With the rapid increase in encrypted traffic in the network environment and the increasing proportio...
Today, the Internet allows virtually anytime, anywhere access to a seemingly unlimited supply of inf...
This paper proposes and analyzes the performance of a novel technique for the classification of Int...
Abstract—Interest in traffic classification, in both industry and academia, has dramatically grown i...
There are several techniques for classifying internet traffic, i.e. associating a flow of packets t...
This paper proposes and analyzes the performance of a novel technique for the classification of Int...
This paper proposes and analyzes the performance of a novel technique for the classification of Int...
Since its inception until today, the Internet has been in constant transformation. The analysis and ...
There are several techniques for classifying internet traffic, i.e. associating a flow of packets t...
There are several techniques for classifying internet traffic, i.e. associating a flow of packets t...