EvoSec 2025W Lecture 17: Difference between revisions

From Soma-notes
Created page with "==Readings== * [https://homeostasis.scs.carleton.ca/~soma/pubs/amatrawy-acns-05.pdf Matrawy, "Mitigating Network Denial-of-Service Through Diversity-Based Traffic Management." (ACNS 2005)] * [https://homeostasis.scs.carleton.ca/~soma/pubs/inoue-lisa2007.pdf Inoue, "NetADHICT: A Tool for Understanding Network Traffic." (LISA 2007)] ==Discussion Questions== ==Notes=="
 
Line 5: Line 5:


==Discussion Questions==
==Discussion Questions==
* What does it mean for an attacker to "defeat" (p,n)-gram based traffic clustering?
* What do high frequency (p,n)-grams reveal about network traffic? Does this include anything that might compromise user privacy?
* Is ADHIC an anomaly detection algorithm?
* How fast is ADHIC compared to other standard clustering algorithms?
* Is diversity-based traffic management feasible today given that so much traffic is encrypted?


==Notes==
==Notes==

Revision as of 14:57, 13 March 2025

Readings

Discussion Questions

  • What does it mean for an attacker to "defeat" (p,n)-gram based traffic clustering?
  • What do high frequency (p,n)-grams reveal about network traffic? Does this include anything that might compromise user privacy?
  • Is ADHIC an anomaly detection algorithm?
  • How fast is ADHIC compared to other standard clustering algorithms?
  • Is diversity-based traffic management feasible today given that so much traffic is encrypted?

Notes