Http over tls, RFC 2818, 2000. ,
Passive monitoring of https service use, 14th International Conference on Network and Service Management (CNSM), 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01943936
Analysis of the ssl 3.0 protocol, The Second USENIX Workshop on Electronic Commerce Proceedings, 1996. ,
Traffic analysis of ssl encrypted web browsing, 1998. ,
Statistical identification of encrypted web browsing traffic, Security and Privacy, 2002. ,
Fingerprinting websites using traffic analysis, International Workshop on Privacy Enhancing Technologies, 2002. ,
Website fingerprinting in onion routing based anonymization networks, Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011. ,
Touching from a distance: Website fingerprinting attacks and defenses, Proceedings of the 2012 ACM conference on Computer and communications security, 2012. ,
Effective attacks and provable defenses for website fingerprinting, USENIX Security Symposium, 2014. ,
k-fingerprinting: A robust scalable website fingerprinting technique, USENIX Security Symposium, 2016. ,
Inferring the source of encrypted http connections, Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006. ,
Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial naïve-bayes classifier, Proceedings of the 2009 ACM workshop on Cloud computing security, 2009. ,
Website fingerprinting and identification using ordered feature sequences, Computer Security -ESORICS 2010, 2010. ,
Blindbox: Deep packet inspection over encrypted traffic, ACM SIGCOMM Computer Communication Review, 2015. ,
Privacy-preserving deep packet filtering over encrypted traffic in software-defined networks, Communications, 2016. ,
A survey of methods for encrypted traffic classification and analysis, International Journal of Network Management, 2015. ,
A multilevel framework to identify https services, Network Operations and Management Symposium (NOMS), 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01273160
Anonymity services tor, i2p, jondonym: Classifying in the dark (web), IEEE Transactions on Dependable and Secure Computing, 2018. ,
Robust smartphone app identification via encrypted network traffic analysis, IEEE Transactions on Information Forensics and Security, 2018. ,
Analyzing android encrypted network traffic to identify user actions, IEEE Transactions on Information Forensics and Security, 2016. ,
Effective and real-time in-app activity analysis in encrypted internet traffic streams, Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2017. ,
Eavesdropping on fine-grained user activities within smartphone apps over encrypted network traffic, 10th USENIX Workshop on Offensive Technologies. USENIX Association, 2016. ,
Multi-classification approaches for classifying mobile app traffic, J. Netw. Comput. Appl, 2018. ,
Mobile encrypted traffic classification using deep learning: Experimental evaluation, lessons learned, and challenges, IEEE Transactions on Network and Service Management, 2019. ,
Know your big data trade-offs when classifying encrypted mobile traffic with deep learning, p.2019 ,
Service usage classification with encrypted internet traffic in mobile messaging apps, IEEE Transactions on Mobile Computing, 2016. ,
Identifying https-protected netflix videos in real-time, Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, 2017. ,
Spot me if you can: Uncovering spoken phrases in encrypted voip conversations, Security and Privacy, 2008. ,
Language identification of encrypted voip traffic: Alejandra y roberto or alice and bob?, in USENIX Security Symposium, 2007. ,
Traffic analysis of encrypted messaging services: Apple imessage and beyond, ACM SIGCOMM Computer Communication Review, 2014. ,
Timing analysis of keystrokes and timing attacks on ssh, USENIX Security Symposium, 2001. ,
, Traffic analysis on google maps with gmaps-trafficker," white paper, 2012.
The transport layer security (tls) protocol version 1.2, RFC, vol.5246, 2008. ,
, Remove h1 pipeline support, pp.2-2017
Hypertext transfer protocol version 2 (http/2), 2015. ,
Transport layer security (tls) application-layer protocol negotiation extension, RFC, vol.7301, 2014. ,
Hpack: Header compression for http/2, 2015. ,
High-speed flow-based classification on fpga, International journal of network management, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01058333
A real-time tcp stream reassembly mechanism in high-speed network, 2009. ,
Image-based recommendations on styles and substitutes, Proceedings of the 38th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2015. ,
Understanding the birthday problem, Selected Papers of Frederick Mosteller, 2006. ,
On estimation of a probability density function and mode, The annals of mathematical statistics, 1962. ,
, Hypertext transfer protocol -http/1.1, IETF, pp.7230-7237, 2014.
Optimizing tls record size & buffering latency, Blog, 2013. ,
Random forests, Machine learning, 2001. ,