2020 3rd International Conference on Advanced Communication Technologies and Networking (CommNet) 2020
DOI: 10.1109/commnet49926.2020.9199617
|View full text |Cite
|
Sign up to set email alerts
|

Man-in-the-Middle Attacks to Detect and Identify Services in Encrypted Network Flows using Machine Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 16 publications
0
3
0
Order By: Relevance
“…Nonetheless, a MITM attack can be useful even with encrypted data. Al-Hababi and Tokgoz [2] demonstrated how MLsec models can be trained to classify encrypted network traffic and determine which applications or services are being used. The attackers can use this technique for example to establish standard network behavior, or to prospect possible C2 solutions (see Section 2.6).…”
Section: Installationmentioning
confidence: 99%
“…Nonetheless, a MITM attack can be useful even with encrypted data. Al-Hababi and Tokgoz [2] demonstrated how MLsec models can be trained to classify encrypted network traffic and determine which applications or services are being used. The attackers can use this technique for example to establish standard network behavior, or to prospect possible C2 solutions (see Section 2.6).…”
Section: Installationmentioning
confidence: 99%
“…But it is possible to infer the utility of nodes and the location of patients and data sources in hospitals. This can be done because packet metadata are not handled by this protocol [9]. To protect this metadata, some presented Sphinx [10].…”
Section: Related Workmentioning
confidence: 99%
“…Man-in-the-middle (MITM) attack: MITM attack happened whenever the attacker intercepts the user's network, or the user traffic intercepted a network controlled by the attacker, and the attacker can decrypt the network cipher without alert the user [54].…”
Section: Man-made Hazardsmentioning
confidence: 99%