2015 IEEE 16th International Symposium on High Assurance Systems Engineering 2015
DOI: 10.1109/hase.2015.26
|View full text |Cite
|
Sign up to set email alerts
|

A Proxy Identifier Based on Patterns in Traffic Flows

Abstract: Proxies are used commonly on today's Internet. On one hand, end users can choose to use proxies for hiding their identities for privacy reasons. On the other hand, ubiquitous systems can use it for intercepting the traffic for purposes such as caching. In addition, attackers can use such technologies to anonymize their malicious behaviours and hide their identities. Identification of such behaviours is important for defense applications since it can facilitate the assessment of security threats. The objective … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(5 citation statements)
references
References 11 publications
(14 reference statements)
0
5
0
Order By: Relevance
“…The research observes the traffic characteristics for individual SHIoT devices covered by the research (41 devices) at the traffic flow level. The traffic flow is defined by a sequence of packets with equal values of source IP address, destination IP address, source communication port, destination communication port and the protocol used, TCP (Transmission Control Protocol) or UDP (User Datagram Protocol) [35]. The reason for choosing the traffic flow as the level of observation and analysis of traffic characteristics is that it represents the aggregated (statistical) data of the packet header for communication between the source and the destination.…”
Section: Extraction Of Identified Traffic Featuresmentioning
confidence: 99%
“…The research observes the traffic characteristics for individual SHIoT devices covered by the research (41 devices) at the traffic flow level. The traffic flow is defined by a sequence of packets with equal values of source IP address, destination IP address, source communication port, destination communication port and the protocol used, TCP (Transmission Control Protocol) or UDP (User Datagram Protocol) [35]. The reason for choosing the traffic flow as the level of observation and analysis of traffic characteristics is that it represents the aggregated (statistical) data of the packet header for communication between the source and the destination.…”
Section: Extraction Of Identified Traffic Featuresmentioning
confidence: 99%
“…Application classification using machine learning has long been researched. The most frequently utilized features were flow features, such as flow duration and flow bytes per second, packet features, such as packet size and inter-packet duration, or combinations of flow and packet features [ 16 , 17 , 18 , 19 , 20 ]. Recently, deep learning methodologies have been used for application classification [ 14 , 15 , 21 , 22 , 23 ].…”
Section: Background and Related Workmentioning
confidence: 99%
“…Defining the class of SHIoT devices in this research is based on the statistical characteristics of a particular device's traffic flows. The traffic flow is defined by a packet with equal source of source IP address, destination IP address, source communication port, destination communication port, and protocol used (TCP or UDP) (Aghaei-Foroushani & Zincir-Heywood, 2015). The reason for choosing a traffic flow as the level of observation and analysis of the feature is that it represents the packet header's aggregated (statistical) data for communication between the source and the destination.…”
Section: Extraction Of Traffic Flows Of Iot Devicesmentioning
confidence: 99%