Search
Protect Act
research
forensics

PUBLICATIONS

The following is a list of publications related to the research projects of the lab. Click on a paper's keywords to see other papers with matching keywords.

Click here to go back to seeing all lab publications.


  • @inproceedings{Liberatore:2006,
    Abstract = {We examine the effectiveness of two traffic analysis techniques for identifying encrypted HTTP streams. The techniques are based upon classification algorithms, identifying encrypted traffic on the basis of similarities to features in a library of known profiles. We show that these profiles need not be collected immediately before the encrypted stream; these methods can be used to identify traffic observed both well before and well after the library is created. We give evidence that these techniques will exhibit the scalability necessary to be effective on the Internet. We examine several methods of actively countering the techniques, and we find that such countermeasures are effective, but at a significant increase in the size of the traffic stream. Our claims are substantiated by experiments and simulation on over 400,000 traffic streams we collected from 2,000 distinct web sites during a two month period.},
    Author = {Liberatore, Marc and Levine, Brian Neil},
    Booktitle = {Proc. ACM conference on Computer and Communications Security (CCS)},
    Keywords = {security; privacy; anonymity; forensics},
    Month = {October},
    Pages = {255--263},
    Slides_Url = {http://forensics.umass.edu/pubs/slides/liberatore.ccs2006.slides.pdf},
    Sponsors = {NSF-0133055 and NSF-0325868},
    Title = {{Inferring the Source of Encrypted HTTP Connections}},
    Traces_Url = {http://traces.cs.umass.edu},
    Url = {http://forensics.umass.edu/pubs/liberatore.ccs2006.pdf},
    Year = {2006},
    Bdsk-Url-1 = {http://forensics.umass.edu/pubs/liberatore.ccs2006.pdf}}

    [link][PDF]

  • Top Back to top

    HOME | PUBLICATIONS | RESEARCH | SPONSORS | IN THE NEWS | CONTACT