Virtual private networks are often used to secure communication between two hosts and preserve privacy by tunneling all traffic over a single encrypted channel. Previous work has already shown that metadata of different secured channels can be used to fingerprint various kinds of information. In this work, we will dive into the encrypted tunnels as used by VPNs. We have collected automatically generated data of 9 network protocols sent over 8 different VPN solutions with 3 different rates for mixed traffic each. Due to the single combined traffic channel of the VPN, this work had to focus on packet-wise features instead of stream-wise ones, requiring the development of new features compared to related work. Both Random Forest and Markov Cha...
This dissertation proposes multiple network defense mechanisms. In a typical virtualized network, th...
The persistent emergence of new network applications, along with encrypted network communication, ha...
Different techniques for traffic classification are utilized in various fields of application. In th...
Several fundamental security mechanisms for restricting access to network resources rely on the abil...
Several fundamental security mechanisms for restricting access to network resources rely on the abil...
Path fingerprinting is an essential component of applications that distinguish among different netwo...
Cryptographic protocols secure data transmission over an untrusted network. Although the encryption ...
Cryptographic protocols secure data transmission over an untrusted network. Although the encryption ...
Abstract—The use of covert application-layer tunnels to bypass security gateways has become quite po...
Application-layer tunnels nowadays represent a significant security threat for any network protected...
Application-layer tunnels nowadays represent a significant security threat for any network protected...
Encryption of network traffic should guarantee anonymity and prevent potential interception of infor...
Encryption of network traffic should guarantee anonymity and prevent potential interception of infor...
Research in traffic classification is reaching into ever more difficult areas. Traditional technique...
Tunnels, a key technology of traffic obfuscation, are increasingly being used to evade censorship. W...
This dissertation proposes multiple network defense mechanisms. In a typical virtualized network, th...
The persistent emergence of new network applications, along with encrypted network communication, ha...
Different techniques for traffic classification are utilized in various fields of application. In th...
Several fundamental security mechanisms for restricting access to network resources rely on the abil...
Several fundamental security mechanisms for restricting access to network resources rely on the abil...
Path fingerprinting is an essential component of applications that distinguish among different netwo...
Cryptographic protocols secure data transmission over an untrusted network. Although the encryption ...
Cryptographic protocols secure data transmission over an untrusted network. Although the encryption ...
Abstract—The use of covert application-layer tunnels to bypass security gateways has become quite po...
Application-layer tunnels nowadays represent a significant security threat for any network protected...
Application-layer tunnels nowadays represent a significant security threat for any network protected...
Encryption of network traffic should guarantee anonymity and prevent potential interception of infor...
Encryption of network traffic should guarantee anonymity and prevent potential interception of infor...
Research in traffic classification is reaching into ever more difficult areas. Traditional technique...
Tunnels, a key technology of traffic obfuscation, are increasingly being used to evade censorship. W...
This dissertation proposes multiple network defense mechanisms. In a typical virtualized network, th...
The persistent emergence of new network applications, along with encrypted network communication, ha...
Different techniques for traffic classification are utilized in various fields of application. In th...