2018
DOI: 10.1007/978-3-030-00470-5_15
|View full text |Cite
|
Sign up to set email alerts
|

OTTer: A Scalable High-Resolution Encrypted Traffic Identification Engine

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 24 publications
(15 citation statements)
references
References 34 publications
0
13
0
Order By: Relevance
“…It works by constructing an automaton that executes transitions for each 8-bit ASCII character of the input text. Since we aim to adapt the algorithm to match signatures that describe sequences of packet payload sizes, we replace the 8-bit characters with 16-bit values that represent packet sizes, similar to [ 6 ]. The algorithm builds a finite state machine, resembling a trie with added “failure” links between the trie nodes.…”
Section: Intrusion Detection Enginementioning
confidence: 99%
See 2 more Smart Citations
“…It works by constructing an automaton that executes transitions for each 8-bit ASCII character of the input text. Since we aim to adapt the algorithm to match signatures that describe sequences of packet payload sizes, we replace the 8-bit characters with 16-bit values that represent packet sizes, similar to [ 6 ]. The algorithm builds a finite state machine, resembling a trie with added “failure” links between the trie nodes.…”
Section: Intrusion Detection Enginementioning
confidence: 99%
“…Conti et al [ 5 , 54 ] and Taylor et al [ 24 , 55 ] propose systems that aim to identify user actions and smartphone apps by analyzing Android encrypted network traffic. OTTer [ 6 ] is a scalable engine that identifies fine-grained user actions in OTT mobile applications even in encrypted network traffic. Moreover, Rosner et al [ 7 ] present a black-box approach for detecting and quantifying side-channel information leaks in TLS-encrypted network traffic.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…A study conducted by viewing sequence of packet size without payload (Papadogiannaki et al, 2018) showed that the sequence of packets could reflect the unique characteristics of service/protocol.…”
Section: Related Workmentioning
confidence: 99%
“…Conti et al proposed a method for identifying user actions in Android applications based on information from TCP/IP packet metadata in encrypted traffic [64,65]. Papadogiannaki et al proposed a pattern language for describing IP packet sequences and use it for fine-grained identification of application events, also in encrypted traffic [66]. Traffic classification was also performed using first 5 packets of a TCP connection [67], or counting received packets and bytes [68].…”
Section: Related Workmentioning
confidence: 99%