2021
DOI: 10.1145/3457904
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Encrypted Network Traffic Analysis Applications, Techniques, and Countermeasures

Abstract: The adoption of network traffic encryption is continually growing. Popular applications use encryption protocols to secure communications and protect the privacy of users. In addition, a large portion of malware is spread through the network traffic taking advantage of encryption protocols to hide its presence and activity. Entering into the era of completely encrypted communications over the Internet, we must rapidly start reviewing the state-of-the-art in the wide domain of network traffic analysis and inspe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
35
0
5

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 105 publications
(40 citation statements)
references
References 150 publications
0
35
0
5
Order By: Relevance
“…To overcome the limitations of port-and payload-based classification models, researchers have focused on traffic classification models that use features from observable encrypted traffic metadata [21], [34].…”
Section: B Encrypted Traffic Classificationmentioning
confidence: 99%
See 1 more Smart Citation
“…To overcome the limitations of port-and payload-based classification models, researchers have focused on traffic classification models that use features from observable encrypted traffic metadata [21], [34].…”
Section: B Encrypted Traffic Classificationmentioning
confidence: 99%
“…We consider this unfortunate and believe that in a dynamic environment such as a computer network, it is critically important to quantify model uncertainty. A recent review highlighted the need to reduce errors (false positives) when moving from a closed training set to real-world data for encrypted network traffic analysis [21].…”
Section: Introductionmentioning
confidence: 99%
“…Network traffic classification is extremely crucial in modern networks as it allows network operators to know the original application which generated any particular traffic. Due to its crucial importance, there have been numerous research efforts to produce network traffic classifiers using various innovative techniques [3,4].…”
Section: Introductionmentioning
confidence: 99%
“…Although these techniques have succeeded in the past, their effectiveness is Malaysian Journal of Computer Science, Vol. 35 (3), 2022 continuously diminishing in modern networks. For example, dynamic port allocation leads to non-standard port assignment, making the port-based technique obsolete on its own [6].…”
Section: Introductionmentioning
confidence: 99%
“…In this survey article, we present existing research on NTA and related areas primarily focusing on TLS-encrypted malware traffic, which can be utilized by security experts in SOCs. While there are multiple related surveys [18][19][20][21][22][23][24][25][26][27] available on NTA and traffic classification areas, our approach has the following distinguished contributions:…”
Section: Introductionmentioning
confidence: 99%