“…Previous studies into keyword extraction can give an indication to the protocols and fields that are likely to be unencrypted, and how they can be used. The main traffic used in these studies includes broadcast traffic such as mDNS and SSDP [12], [22 -24], DHCP [12], [22][23][24], HTTP (User Agents & URI) [14], [24 -26], DNS [24,26] and packet content [27]. These protocols are all shown to give unencrypted information that is useful for analysis.…”