Are Encypted Protocols Really a Guarantee of Privacy?
Identifikátory výsledku
Kód výsledku v IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F68407700%3A21240%2F21%3A00357613" target="_blank" >RIV/68407700:21240/21:00357613 - isvavai.cz</a>
Výsledek na webu
<a href="https://www.academic-conferences.org/wp-content/uploads/2022/03/000_ECCWS-21-Abstract-Booklet-.pdf" target="_blank" >https://www.academic-conferences.org/wp-content/uploads/2022/03/000_ECCWS-21-Abstract-Booklet-.pdf</a>
DOI - Digital Object Identifier
—
Alternativní jazyky
Jazyk výsledku
angličtina
Název v původním jazyce
Are Encypted Protocols Really a Guarantee of Privacy?
Popis výsledku v původním jazyce
Most internet traffic is being encrypted by application protocols that should guarantee users' privacy and anonymity of data during the transmission. Our team has developed a unique system that can create a specific pattern of traffic and further analyze it by using machine learning methods. We investigated the possibility of identifying the network video streams encrypted within the HTTPS protocol and explored that it is possible to identify a particular content with a certain probability. Our paper provides a methodology and results retrieved from the real measurements. As the testing data set, we used the streams coming from the popular platform Youtube. Our results confirm that it is possible to identify encrypted video streams via their specific traffic imprints, although it should not be possible due to the used encryption.
Název v anglickém jazyce
Are Encypted Protocols Really a Guarantee of Privacy?
Popis výsledku anglicky
Most internet traffic is being encrypted by application protocols that should guarantee users' privacy and anonymity of data during the transmission. Our team has developed a unique system that can create a specific pattern of traffic and further analyze it by using machine learning methods. We investigated the possibility of identifying the network video streams encrypted within the HTTPS protocol and explored that it is possible to identify a particular content with a certain probability. Our paper provides a methodology and results retrieved from the real measurements. As the testing data set, we used the streams coming from the popular platform Youtube. Our results confirm that it is possible to identify encrypted video streams via their specific traffic imprints, although it should not be possible due to the used encryption.
Klasifikace
Druh
D - Stať ve sborníku
CEP obor
—
OECD FORD obor
10201 - Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8)
Návaznosti výsledku
Projekt
—
Návaznosti
V - Vyzkumna aktivita podporovana z jinych verejnych zdroju
Ostatní
Rok uplatnění
2021
Kód důvěrnosti údajů
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Údaje specifické pro druh výsledku
Název statě ve sborníku
Proceedings of 20th European Conference on Cyber Warfare and Security ECCWS 2021
ISBN
978-1-912764-99-0
ISSN
—
e-ISSN
—
Počet stran výsledku
9
Strana od-do
130-138
Název nakladatele
Academic Conferences International Limited Reading
Místo vydání
—
Místo konání akce
University of Chester
Datum konání akce
24. 6. 2021
Typ akce podle státní příslušnosti
WRD - Celosvětová akce
Kód UT WoS článku
—