Jan. 26, 2022, 2:20 a.m. | Johan Mazel, Matthieu Saudrais, Antoine Hervieu

cs.CR updates on arXiv.org arxiv.org

Encrypted tunneling protocols are widely used. Beyond business and personal
uses, malicious actors also deploy tunneling to hinder the detection of Command
and Control and data exfiltration. A common approach to maintain visibility on
tunneling is to rely on network traffic metadata and machine learning to
analyze tunnel occurrence without actually decrypting data. Existing work that
address tunneling protocols however exhibit several weaknesses: their goal is
to detect application inside tunnels and not tunnel identification, they
exhibit limited protocol coverage …

application classification detection tunnel

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Engineers

@ D. E. Shaw Research | New York City

Ford Pro Tech and FCSD Tech – Product Manager, Cyber Security

@ Ford Motor Company | Chennai, Tamil Nadu, India

Cloud Data Encryption and Cryptography Automation Expert

@ Ford Motor Company | Chennai, Tamil Nadu, India

SecOps Analyst

@ Atheneum | Berlin, Berlin, Germany

Consulting Director, Cloud Security, Proactive Services (Unit 42)

@ Palo Alto Networks | Santa Clara, CA, United States