all InfoSec news
ML-based tunnel detection and tunneled application classification. (arXiv:2201.10371v1 [cs.CR])
Jan. 26, 2022, 2:20 a.m. | Johan Mazel, Matthieu Saudrais, Antoine Hervieu
cs.CR updates on arXiv.org arxiv.org
Encrypted tunneling protocols are widely used. Beyond business and personal
uses, malicious actors also deploy tunneling to hinder the detection of Command
and Control and data exfiltration. A common approach to maintain visibility on
tunneling is to rely on network traffic metadata and machine learning to
analyze tunnel occurrence without actually decrypting data. Existing work that
address tunneling protocols however exhibit several weaknesses: their goal is
to detect application inside tunnels and not tunnel identification, they
exhibit limited protocol coverage …
More from arxiv.org / cs.CR updates on arXiv.org
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Information Security Engineers
@ D. E. Shaw Research | New York City
Ford Pro Tech and FCSD Tech – Product Manager, Cyber Security
@ Ford Motor Company | Chennai, Tamil Nadu, India
Cloud Data Encryption and Cryptography Automation Expert
@ Ford Motor Company | Chennai, Tamil Nadu, India
SecOps Analyst
@ Atheneum | Berlin, Berlin, Germany
Consulting Director, Cloud Security, Proactive Services (Unit 42)
@ Palo Alto Networks | Santa Clara, CA, United States