Fundamentals of Traffic Analysis: Methods for Traffic Surveillance and Concealment

Fundamentals of Traffic Analysis: Methods for Traffic Surveillance and Concealment

Chen, Thomas M.
Stupples, David

83,93 €(IVA inc.)

Network Traffic Recognition covers traffic analysis methods to collect and inspect network traffic and make inferences about its nature, such as: who is communicating; what application is being used; whether the communications are unusual or â normal?; and ultimately what is the significance of the communications. If traffic is unencrypted, the contents of packets can be decoded straightforwardly by deep packet inspection. On the other hand, traffic is often encrypted which conceals packet contents for privacy. However, traffic analysis can still make inferences based on traffic behavior and social network analysis. For more privacy, many users depend on TOR (acronym for The Onion Network, a communication concealment method) which obscures IP addresses as well as packet contents.

  • ISBN: 978-1-118-99926-4
  • Editorial: Wiley–Blackwell
  • Encuadernacion: Cartoné
  • Páginas: 350
  • Fecha Publicación: 22/11/2016
  • Nº Volúmenes: 1
  • Idioma: Inglés