DOI: 10.31274/rtd-180813-15816
|View full text |Cite
|
Sign up to set email alerts
|

Detection of encrypted streams for egress monitoring

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 9 publications
(19 citation statements)
references
References 7 publications
0
19
0
Order By: Relevance
“…Dorfinger's Master thesis [20] proposes a system for discriminating encrypted and non-encrypted traffic, to ensure that all communications from a target network are encrypted. Similar approaches were also proposed by Mamun et al [31] and Malhotra [30]. Zhang et al proposed an entropy-based classifier for the identification of botnet traffic [42].…”
Section: Entropy-based Encryption Detectionmentioning
confidence: 82%
See 2 more Smart Citations
“…Dorfinger's Master thesis [20] proposes a system for discriminating encrypted and non-encrypted traffic, to ensure that all communications from a target network are encrypted. Similar approaches were also proposed by Mamun et al [31] and Malhotra [30]. Zhang et al proposed an entropy-based classifier for the identification of botnet traffic [42].…”
Section: Entropy-based Encryption Detectionmentioning
confidence: 82%
“…The χ 2 test is a simple statistical test to measure goodness of fit. It has been widely applied to distinguish compressed and encrypted content [12,30,34]. Given a set of samples, it measures how well the distribution of such samples follows a given distribution.…”
Section: χ 2 Testmentioning
confidence: 99%
See 1 more Smart Citation
“…Encrypted data is known to be more uniformly distributed than unencrypted data [31,44]. Therefore, a number of approaches rely on this characteristic to locate cryptographic keys stored in memory and file system dumps [43].…”
Section: Related Workmentioning
confidence: 99%
“…al. [31], most traffic analysis tools analyse the contents of the data packets but they are not capable of determining whether data are encrypted. According to their research findings, Shannon entropy can be used to accurately classify low entropy streams.…”
Section: Related Workmentioning
confidence: 99%