Back to Results
First PageMeta Content
Computer security / Middlebox / Snort / Deep packet inspection / ANts P2P / Intrusion detection system / HTTP Secure / Computer network security / Computing / Software


BlindBox: Deep Packet Inspection over Encrypted Traffic Justine Sherry Chang Lan Raluca Ada Popa Sylvia Ratnasamy
Add to Reading List

Document Date: 2015-03-23 09:24:18


Open Document

File Size: 513,38 KB

Share Result on Facebook

City

Delimiter / Click / /

Company

SecurityCorp / Facebook / ABC Co. / Symantec / XYZ Co. / the AES / /

Country

United States / /

Currency

Rs / /

Event

Diplomatic Relations / FDA Phase / /

Facility

Encrypted Traffic Justine Sherry Chang Lan Raluca Ada Popa Sylvia Ratnasamy University of California / University Network / University of SIGCOMM / OT Extension library / BlindBox library / /

IndustryTerm

naïve algorithm / clever tokenization algorithm / client software / probable cause protocol / middlebox systems / botnet software / target applications / naïve tokenization protocol / rule preparation algorithm / intrusion detection protocol / client software uses / using either protocol / on this protocol / tokenization algorithm / probable cause privacy protocol / search tree / computing / detection algorithm / criminal law / from_server / encryption algorithm / detection protocol / supported using protocol / /

NaturalFeature

SSL channel / /

OperatingSystem

DoS / /

Organization

Encrypted Traffic Justine Sherry Chang Lan Raluca Ada Popa Sylvia Ratnasamy University / Co. IDS / ISP Service / University of California / Berkeley / U.S. Securities and Exchange Commission / University of SIGCOMM / Electronic Filtering Foundation / /

Person

HTTP IDS / Bob / Alice / /

Position

model for traffic privacy called probable cause privacy / system administrator / General / administrator / /

Product

BlindBox Detect / DPIEnc / Sec. / /

ProvinceOrState

Manitoba / California / /

Technology

LAN / three algorithms / 3.4 Protocol / php / probable cause privacy protocol / rule encryption / encryption algorithm / naïve tokenization protocol / API / block cipher / 2.1 Protocol / obfuscated rule encryption / detection protocol / two protocols / secret key / html / SSL / obfuscated algorithm / clever tokenization algorithm / intrusion detection protocol / IDS Security guarantee Our protocols / probable cause protocol / encryption / BlindBox HTTPS protocol / cryptography / same encryption / tokenization algorithm / public key / three protocols / client software uses Protocol / previous two protocols / naïve algorithm / SSL protocol / HTTP / 8 6 Protocol / ISP / completely supported using protocol / third protocol / digital signature / client/server / traffic Protocol / detection algorithm / DPIEnc Match algorithm / rule preparation algorithm / 2 Protocol / /

SocialTag