Institutional Repository
Technical University of Crete
EN  |  EL

Search

Browse

My Space

A survey on encrypted network traffic analysis applications, techniques, and countermeasures

Papadogiannaki Eva, Ioannidis Sotirios

Simple record


URIhttp://purl.tuc.gr/dl/dias/06521326-03BA-4BC2-91B0-105D0D907FC9-
Identifierhttps://doi.org/10.1145/3457904-
Identifierhttps://dl.acm.org/doi/10.1145/3457904-
Languageen-
Extent35 pagesen
TitleA survey on encrypted network traffic analysis applications, techniques, and countermeasuresen
CreatorPapadogiannaki Evaen
CreatorIoannidis Sotiriosen
CreatorΙωαννιδης Σωτηριοςel
PublisherAssociation for Computing Machinery (ACM)en
Content SummaryThe adoption of network traffic encryption is continually growing. Popular applications use encryption protocols to secure communications and protect the privacy of users. In addition, a large portion of malware is spread through the network traffic taking advantage of encryption protocols to hide its presence and activity. Entering into the era of completely encrypted communications over the Internet, we must rapidly start reviewing the state-of-the-art in the wide domain of network traffic analysis and inspection, to conclude if traditional traffic processing systems will be able to seamlessly adapt to the upcoming full adoption of network encryption. In this survey, we examine the literature that deals with network traffic analysis and inspection after the ascent of encryption in communication channels. We notice that the research community has already started proposing solutions on how to perform inspection even when the network traffic is encrypted and we demonstrate and review these works. In addition, we present the techniques and methods that these works use and their limitations. Finally, we examine the countermeasures that have been proposed in the literature in order to circumvent traffic analysis techniques that aim to harm user privacy.en
Type of ItemPeer-Reviewed Journal Publicationen
Type of ItemΔημοσίευση σε Περιοδικό με Κριτέςel
Licensehttp://creativecommons.org/licenses/by/4.0/en
Date of Item2022-10-31-
Date of Publication2022-
SubjectEncrypted network trafficen
SubjectEncrypted network traffic analysisen
SubjectNetwork traffic inspectionen
SubjectNetwork traffic processingen
SubjectNetwork analyticsen
SubjectApplication analyticsen
SubjectApplication usage analyticsen
SubjectQoSs analyticsen
SubjectQoE analyticsen
SubjectNetwork securityen
SubjectNetwork intrusion detectionen
SubjectMobile malwareen
SubjectUser privacyen
SubjectWebsite fingerprintingen
SubjectPii leakageen
SubjectDevice fingerprintingen
SubjectLocation estimationen
SubjectNetwork middleboxen
SubjectNetwork functionen
SubjectMachine learningen
SubjectDeep learningen
SubjectNeural networksen
SubjectSearchable encryptionen
SubjectNetwork traffic interceptionen
SubjectNetwork packet metadataen
Bibliographic CitationE. Papadogiannaki and S. Ioannidis, “A survey on encrypted network traffic analysis applications, techniques, and countermeasures,” ACM Comput. Surv., vol. 54, no. 6, July 2022, doi: 10.1145/3457904.en

Services

Statistics