Khan, 2018 - Google Patents
A Study in Protocol Obfuscation Techniques and their EffectivenessKhan, 2018
View PDF- Document ID
- 13117897442846338435
- Author
- Khan J
- Publication year
External Links
Snippet
A Study in Protocol Obfuscation Techniques and their Effectiveness Page 1 A dissertation
submitted for the MSc in Software and Systems Security A Study in Protocol Obfuscation
Techniques and their Effectiveness James Khan 2017 Kellogg College University of Oxford …
- 238000000034 method 0 title description 32
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/104—Grouping of entities
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2966408C (en) | A system and method for network intrusion detection of covert channels based on off-line network traffic | |
Virvilis et al. | Trusted Computing vs. Advanced Persistent Threats: Can a defender win this game? | |
Brubaker et al. | Cloudtransport: Using cloud storage for censorship-resistant networking | |
Kartaltepe et al. | Social network-based botnet command-and-control: emerging threats and countermeasures | |
Dixon et al. | Network traffic obfuscation and automated internet censorship | |
Zimba | Malware-free intrusion: a novel approach to ransomware infection vectors | |
Xue et al. | OpenVPN is open to VPN fingerprinting | |
Yaacoub et al. | Digital forensics vs. Anti-digital forensics: Techniques, limitations and recommendations | |
Lin et al. | Traceback attacks in cloud--pebbletrace botnet | |
Riccardi et al. | Titans’ revenge: Detecting Zeus via its own flaws | |
Al-Mohannadi et al. | Analysis of adversary activities using cloud-based web services to enhance cyber threat intelligence | |
Dutta et al. | Cyber security: Issues and current trends | |
Gardiner et al. | Command & Control: Understanding, Denying and Detecting-A review of malware C2 techniques, detection and defences | |
Haughey et al. | Adaptive traffic fingerprinting for darknet threat intelligence | |
Singh et al. | A comparative review of malware analysis and detection in HTTPs traffic | |
Hegarty et al. | Extrusion detection of illegal files in cloud-based systems | |
Girija Devi et al. | Security breach and forensics in intelligent systems | |
Bijalwan | Network Forensics: Privacy and Security | |
Khan | A Study in Protocol Obfuscation Techniques and their Effectiveness | |
Evers et al. | Thirteen years of Tor attacks | |
Abarca | An analysis of network steganographic malware | |
Wagenaar | Detecting botnets using file system indicators | |
Gokhale | Network analysis of dark web traffic through the geo-location of South African IP address space | |
Chakraborty et al. | Introduction to network security technologies | |
Merouane | An approach for detecting anonymized traffic: Orbot as case study |