학술논문
Design of Methods for Encrypted Traffic Visualization
Document Type
Conference
Author
Source
2024 2nd International Conference on Intelligent Data Communication Technologies and Internet of Things (IDCIoT) Intelligent Data Communication Technologies and Internet of Things (IDCIoT), 2024 2nd International Conference on. :827-834 Jan, 2024
Subject
Language
Abstract
As the prevalence of encrypted communication continues to rise, understanding and visualizing encrypted traffic have become paramount for network administrators, cybersecurity analysts, and researchers. This research study presents innovative methods for visualizing encrypted traffic patterns, leveraging diverse data sets representing various encrypted protocols. The goal of this research work is to enhance the comprehension of network behavior, identify anomalies, and strengthen cybersecurity measures without compromising the confidentiality of sensitive information. The goal is to develop techniques that can provide insights into encrypted traffic without requiring decryption. This research study discusses about different datasets of encrypted protocols and how they can be used to design new methods for visualizing the encrypted traffic. The main aim of this research work is to propose visualization methods that could help to reveal any interesting things detectable from encrypted traffic flows, especially HTTPS, SSH (Secure Shell), SMTP secured with TLS (Simple Mail Transfer Protocol) and DNS over HTTPS.