2019
DOI: 10.1007/s11042-019-08088-w
|View full text |Cite
|
Sign up to set email alerts
|

An empirical approach towards characterization of encrypted and unencrypted VoIP traffic

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0
4

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(20 citation statements)
references
References 28 publications
0
16
0
4
Order By: Relevance
“…5). Also, this and other similar approaches based on statistical randomness tests (e.g., [14,34]) cannot distinguish between different types of compressed archives. Mbol et al [32] investigate the use of the Kullback-Leibler divergence (relative entropy) to differentiate encrypted files from JPEG images.…”
Section: Non-entropy-based Approachesmentioning
confidence: 94%
See 2 more Smart Citations
“…5). Also, this and other similar approaches based on statistical randomness tests (e.g., [14,34]) cannot distinguish between different types of compressed archives. Mbol et al [32] investigate the use of the Kullback-Leibler divergence (relative entropy) to differentiate encrypted files from JPEG images.…”
Section: Non-entropy-based Approachesmentioning
confidence: 94%
“…The suite consists of 15 distinct tests, which analyze various structural aspects of a byte sequence. These tests are commonly employed as a benchmark for distinguishing compressed and encrypted content (e.g., [12,14]). Each test analyzes a particular property of the sequence, and subsequently applies a test-specific decision rule to determine whether the result of the analysis suggests randomness or not.…”
Section: Nist Sp800-22mentioning
confidence: 99%
See 1 more Smart Citation
“…Estimating a random variable’s entropy is of great importance and with many applications, having received much attention in recent years [ 7 , 8 , 9 , 10 , 11 ]. Most of the known estimators are generally applied for the estimation of mutual information [ 12 ], but in this scenario entropy estimators will perform similarly, and thus the selection between different estimators is less of an issue.…”
Section: Introductionmentioning
confidence: 99%
“…Наличие сжатого или зашифрованного трафика в ситуации, для которой обычно используется только прозрачный трафик, может свидетельствовать, например, о работе сервера команд ботнета [1]. Сведения о шифровании данных внутри пакетов могут применяться для более точного определения протоколов и типов содержимого, что, в свою очередь, служит для повышения качества обслуживания, выделения приоритетного трафика [2] и анализа устройства и эффективности сети в целом. Эти данные могут использоваться как сами по себе, так и в качестве только одного из признаков в глобальной системе принятий решений.…”
Section: Introductionunclassified