EvoSec 2025W Lecture 17

From Soma-notes

Readings

Discussion Questions

  • What does it mean for an attacker to "defeat" (p,n)-gram based traffic clustering?
  • What do high frequency (p,n)-grams reveal about network traffic? Does this include anything that might compromise user privacy?
  • Is ADHIC an anomaly detection algorithm?
  • How fast is ADHIC compared to other standard clustering algorithms?
  • Is diversity-based traffic management feasible today given that so much traffic is encrypted?

Notes