HeadPrint: detecting anomalous communications through header-based application fingerprinting
暂无分享,去创建一个
Pieter H. Hartel | Willem Jonker | Maarten H. Everts | Riccardo Bortolameotti | Thijs van Ede | Andrea Continella | Andreas Peter | Thomas Hupperich | Reza Rafati | Andreas Peter | P. Hartel | W. Jonker | Andrea Continella | Riccardo Bortolameotti | M. Everts | Thomas Hupperich | T. V. Ede | Reza Rafati
[1] Kevin Borders,et al. Web tap: detecting covert web traffic , 2004, CCS '04.
[2] Konrad Rieck,et al. Adaptive Detection of Covert Communication in HTTP Requests , 2011, 2011 Seventh European Conference on Computer Network Defense.
[3] Sebastian Zander,et al. A survey of covert channels and countermeasures in computer network protocols , 2007, IEEE Communications Surveys & Tutorials.
[4] A. Azzouz. 2011 , 2020, City.
[5] Nick Sullivan,et al. The Security Impact of HTTPS Interception , 2017, NDSS.
[6] Gaël Varoquaux,et al. Scikit-learn: Machine Learning in Python , 2011, J. Mach. Learn. Res..
[7] Christopher Krügel,et al. Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis , 2017, NDSS.
[8] Song Li,et al. (Cross-)Browser Fingerprinting via OS and Hardware Level Features , 2017, NDSS.
[9] Yong Liao,et al. AppPrint: Automatic Fingerprinting of Mobile Applications in Network Traffic , 2015, PAM.
[10] Yong Liao,et al. SAMPLES: Self Adaptive Mining of Persistent LExical Snippets for Classifying Mobile Application Traffic , 2015, MobiCom.
[11] Peter Eckersley,et al. How Unique Is Your Web Browser? , 2010, Privacy Enhancing Technologies.
[12] Nick Feamster,et al. Behavioral Clustering of HTTP-Based Malware and Signature Generation Using Malicious Network Traces , 2010, NSDI.
[13] Vipin Kumar,et al. Similarity Measures for Categorical Data: A Comparative Evaluation , 2008, SDM.
[14] Romain Rouvoy,et al. FP-STALKER: Tracking Browser Fingerprint Evolutions , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[15] Mauro Conti,et al. AppScanner: Automatic Fingerprinting of Smartphone Apps from Encrypted Network Traffic , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[16] Roberto Perdisci,et al. ExecScent: Mining for New C&C Domains in Live Networks with Adaptive Control Protocol Templates , 2013, USENIX Security Symposium.
[17] Qiang Xu,et al. Automatic generation of mobile app signatures from traffic observations , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).
[18] Juan Caballero,et al. FIRMA: Malware Clustering and Network Signature Generation with Mixed Network Behaviors , 2013, RAID.
[19] Sherali Zeadally,et al. An Empirical Study of HTTP-based Financial Botnets , 2016, IEEE Transactions on Dependable and Secure Computing.
[20] Andreas Peter,et al. DECANTeR: DEteCtion of Anomalous outbouNd HTTP TRaffic by Passive Application Fingerprinting , 2017, ACSAC.
[21] Thorsten Holz,et al. As the net churns: Fast-flux botnet observations , 2008, 2008 3rd International Conference on Malicious and Unwanted Software (MALWARE).
[22] Sándor Imre,et al. User Tracking on the Web via Cross-Browser Fingerprinting , 2011, NordSec.
[23] Maurizio Dusi,et al. Traffic classification through simple statistical fingerprinting , 2007, CCRV.
[24] Vern Paxson,et al. Bro: a system for detecting network intruders in real-time , 1998, Comput. Networks.
[25] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[26] Dawn Xiaodong Song,et al. NetworkProfiler: Towards automatic fingerprinting of Android apps , 2013, 2013 Proceedings IEEE INFOCOM.
[27] Vern Paxson,et al. Outside the Closed World: On Using Machine Learning for Network Intrusion Detection , 2010, 2010 IEEE Symposium on Security and Privacy.
[28] Daniel Bakkelund. An LCS-based string metric , 2009 .
[29] Willem Jonker,et al. Victim-Aware Adaptive Covert Channels , 2019, SecureComm.
[30] Apostolis Zarras,et al. Automated generation of models for fast and precise detection of HTTP-based malware , 2014, 2014 Twelfth Annual International Conference on Privacy, Security and Trust.
[31] Serge Egelman,et al. Fingerprinting Web Users Through Font Metrics , 2015, Financial Cryptography.
[32] Arvind Narayanan,et al. Online Tracking: A 1-million-site Measurement and Analysis , 2016, CCS.
[33] Christopher Krügel,et al. Extracting probable command and control signatures for detecting botnets , 2014, SAC.