Fundamentals of Traffic Analysis Methods for Traffic Surveillance and Concealment |
|
Author:
| Chen, Thomas M. Stupples, David |
ISBN: | 978-1-118-99928-8 |
Publication Date: | Dec 2023 |
Publisher: | John Wiley & Sons, Incorporated
|
Book Format: | Digital download |
List Price: | Contact Supplier contact
|
Book Description:
|
Network Traffic Recognition covers traffic analysis methods to collect and inspect network traffic and make inferences about its nature, such as: who is communicating; what application is being used; whether the communications are unusual or âe~normal'; and ultimately what is the significance of the communications. If traffic is unencrypted, the contents of packets can be decoded straightforwardly by deep packet inspection. On the other hand, traffic is often encrypted which...
More Description
Network Traffic Recognition covers traffic analysis methods to collect and inspect network traffic and make inferences about its nature, such as: who is communicating; what application is being used; whether the communications are unusual or âe~normal'; and ultimately what is the significance of the communications. If traffic is unencrypted, the contents of packets can be decoded straightforwardly by deep packet inspection. On the other hand, traffic is often encrypted which conceals packet contents for privacy. However, traffic analysis can still make inferences based on traffic behavior and social network analysis. For more privacy, many users depend on TOR (acronym for "The Onion Network", a communication concealment method) which obscures IP addresses as well as packet contents.