DD2496/FDD3344HT211
    Reading: Traffic Analysis (SKIM before group presentation 15/9/21, 10-12h)
    Skip to content
    Dashboard
    • Login
    • Dashboard
    • Calendar
    • Inbox
    • Help
    Close
    • Min översikt
    • DD2496/FDD3344HT211
    • Assignments
    • Reading: Traffic Analysis (SKIM before group presentation 15/9/21, 10-12h)
    • Home
    • Syllabus
    • Modules
    • Assignments

    Reading: Traffic Analysis (SKIM before group presentation 15/9/21, 10-12h)

    • Due 15 Sep 2021 by 9:59
    • Points None
    • Available after 1 Sep 2021 at 8:00

    Traffic analysis

    Explanation by Sonja:

    Due to the short notice, your result of the corresponding quiz will not be taken into account for grading. Skim the papers (start with the first optional one if you haven't heard of traffic analysis, it's a very short summary, not a research paper) before the seminar, and read more thoroughly later. You'll get multiple attempts for the quiz, use it as feedback for yourself. 

    Explanation by the group:

    The first paper lifts how Traffic analysis can be used in a sinister way.
    The second paper shows how it can be used in a defensive manner.
    Both of them regard Android so they are in a comparable and similar area.

    The first optional paper is for those that have no footing in what Traffic Analysis is.
    The second option paper is very interesting in how Traffic Analysis can harm TOR users.

    Required Reading:

    First paper:
    Conti, Mauro, et al. "Analyzing android encrypted network traffic to identify user actions." IEEE Transactions on Information Forensics and Security 11.1 (2015): 114-125.
    (pdf, log in via KTH to access)

    Second paper:
    Wang, Shanshan, et al. "A mobile malware detection method using behavior features in network traffic." Journal of Network and Computer Applications 133 (2019): 15-25.
    (pdf, log in via KTH to access)

    Optional:

    First Optional:
    Awake Arista, Network traffic analysis
    (short web article)

    Second Optional:
    Basyoni, Lamiaa, et al. "Traffic analysis attacks on Tor: a survey." 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT). IEEE, 2020.
    (pdf via KTH library)

     

    1631692799 09/15/2021 09:59am
    Additional comments:
    Rating max score to > Pts

    Rubric

     
     
     
     
     
     
     
         
    Can't change a rubric once you've started using it.  
    Find a rubric
    Find rubric
    Title
    You've already rated students with this rubric. Any major changes could affect their assessment results.
    Title
    Criteria Ratings Pts
    Edit criterion description Delete criterion row
    This criterion is linked to a learning outcome Description of criterion
    threshold: 5 pts
    Edit rating Delete rating
    5 to >0 Pts
    Full marks
    blank
    Edit rating Delete rating
    0 to >0 Pts
    No marks
    blank_2
    This area will be used by the assessor to leave comments related to this criterion.
    pts
      / 5 pts
    --
    Additional comments
    Total points: 5 out of 5