, Machine learning based encrypted traffic classification: Identifying SSH and Skype, Proceedings of the IEEE Symposium on Computational Intelligence in Security and Defense Applications, 2009.
Can encrypted traffic be identified without port numbers, IP addresses and payload inspection? Computer Networks, vol.55, pp.1326-1350, 2011. ,
Early recognition of encrypted applications, Proceedings of the Eighth International Conference on Passive and Active Network Measurement, pp.165-175, 2007. ,
URL : https://hal.archives-ouvertes.fr/hal-01097556
, Revealing Skype traffic: When randomness plays with you, vol.37, pp.37-48, 2007.
PSUDP: A passive approach to network-wide covert communications, presented at Black Hat USA, 2010. ,
Detecting DNS tunnels using character frequency analysis, Proceedings of the Ninth Annual Security Conference, 2010. ,
Detecting HTTP tunnels with statistical mechanisms, Proceedings of the IEEE International Conference on Communications, pp.6162-6168, 2007. ,
Network Forensics: Tracking Hackers through Cyberspace, Pearson Education, 2012. ,
On botnets that use DNS for command and control, Proceedings of the Seventh European Conference on Computer Network Defense, pp.9-16, 2011. ,
Detection of encrypted tunnels across network boundaries, Proceedings of the IEEE International Conference on Communications, pp.1738-1744, 2008. ,
Tunnel Hunter: Detecting application-layer tunnels with statistical fingerprinting, Computer Networks, vol.53, issue.1, pp.81-97, 2009. ,
Iodine Tunneling Protocol Documentation v502 (github.com/yarrick/iodine), 2014. ,
Detecting DNS Tunneling, 2013. ,
, A study on botnets utilizing DNS, Proceedings of the Fourth Annual ACM Conference on Research in Information Technology, pp.23-28, 2015.
Breaking and Improving Protocol Obfuscation, 2010. ,
, TunnelStatsTests (github.com/irvinhomem/Tunnel StatsTests), 2016.
, Annual Threat Report: Beyond the Breach, 2014.
, The Role of DNS in Botnet Command and Control, 2011.
, Network Security with NetFlow and IPFIX: Big Data Analytics for Information Security, 2016.
Timing analysis of keystrokes and timing attacks on SSH, Proceedings of the Tenth USENIX Security Symposium, 2001. ,
On the ground truth problem of malicious DNS traffic analysis, Computers and Security, vol.55, pp.142-158, 2015. ,
Game Changer: Identifying and defending against data exfiltration attempts, presented at the SANS Cyber Defense Summit, 2015. ,
DNS for massive-scale command and control, IEEE Transactions on Dependable and Secure Computing, vol.10, issue.3, pp.143-153, 2013. ,