2020 3rd International Conference on Advanced Communication Technologies and Networking (CommNet) 2020
DOI: 10.1109/commnet49926.2020.9199617
|View full text |Cite
|
Sign up to set email alerts
|

Man-in-the-Middle Attacks to Detect and Identify Services in Encrypted Network Flows using Machine Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 16 publications
0
2
0
Order By: Relevance
“…But it is possible to infer the utility of nodes and the location of patients and data sources in hospitals. This can be done because packet metadata are not handled by this protocol [9]. To protect this metadata, some presented Sphinx [10].…”
Section: Related Workmentioning
confidence: 99%
“…But it is possible to infer the utility of nodes and the location of patients and data sources in hospitals. This can be done because packet metadata are not handled by this protocol [9]. To protect this metadata, some presented Sphinx [10].…”
Section: Related Workmentioning
confidence: 99%
“…Man-in-the-middle (MITM) attack: MITM attack happened whenever the attacker intercepts the user's network, or the user traffic intercepted a network controlled by the attacker, and the attacker can decrypt the network cipher without alert the user [54].…”
Section: Man-made Hazardsmentioning
confidence: 99%