Nothing Special   »   [go: up one dir, main page]

Khan, 2018 - Google Patents

A Study in Protocol Obfuscation Techniques and their Effectiveness

Khan, 2018

View PDF
Document ID
13117897442846338435
Author
Khan J
Publication year

External Links

Snippet

A Study in Protocol Obfuscation Techniques and their Effectiveness Page 1 A dissertation submitted for the MSc in Software and Systems Security A Study in Protocol Obfuscation Techniques and their Effectiveness James Khan 2017 Kellogg College University of Oxford …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/104Grouping of entities

Similar Documents

Publication Publication Date Title
CA2966408C (en) A system and method for network intrusion detection of covert channels based on off-line network traffic
Virvilis et al. Trusted Computing vs. Advanced Persistent Threats: Can a defender win this game?
Brubaker et al. Cloudtransport: Using cloud storage for censorship-resistant networking
Kartaltepe et al. Social network-based botnet command-and-control: emerging threats and countermeasures
Dixon et al. Network traffic obfuscation and automated internet censorship
Zimba Malware-free intrusion: a novel approach to ransomware infection vectors
Xue et al. OpenVPN is open to VPN fingerprinting
Yaacoub et al. Digital forensics vs. Anti-digital forensics: Techniques, limitations and recommendations
Lin et al. Traceback attacks in cloud--pebbletrace botnet
Riccardi et al. Titans’ revenge: Detecting Zeus via its own flaws
Al-Mohannadi et al. Analysis of adversary activities using cloud-based web services to enhance cyber threat intelligence
Dutta et al. Cyber security: Issues and current trends
Gardiner et al. Command & Control: Understanding, Denying and Detecting-A review of malware C2 techniques, detection and defences
Haughey et al. Adaptive traffic fingerprinting for darknet threat intelligence
Singh et al. A comparative review of malware analysis and detection in HTTPs traffic
Hegarty et al. Extrusion detection of illegal files in cloud-based systems
Girija Devi et al. Security breach and forensics in intelligent systems
Bijalwan Network Forensics: Privacy and Security
Khan A Study in Protocol Obfuscation Techniques and their Effectiveness
Evers et al. Thirteen years of Tor attacks
Abarca An analysis of network steganographic malware
Wagenaar Detecting botnets using file system indicators
Gokhale Network analysis of dark web traffic through the geo-location of South African IP address space
Chakraborty et al. Introduction to network security technologies
Merouane An approach for detecting anonymized traffic: Orbot as case study