• kth.se
  • Student web
  • Intranet
  • kth.se
  • Student web
  • Intranet
Login
DD2496/FDD3344HT211
Reading: Traffic Analysis (SKIM before group presentation 15/9/21, 10-12h)
Skip to content
Dashboard
  • Login
  • Dashboard
  • Calendar
  • Inbox
  • History
  • Help
Close
  • Min översikt
  • DD2496/FDD3344HT211
  • Assignments
  • Reading: Traffic Analysis (SKIM before group presentation 15/9/21, 10-12h)
  • Home
  • Syllabus
  • Modules
  • Assignments
  • Course Evaluation

Reading: Traffic Analysis (SKIM before group presentation 15/9/21, 10-12h)

  • Due 15 Sep 2021 by 9:59
  • Points None
  • Available after 1 Sep 2021 at 8:00

Traffic analysis

Explanation by Sonja:

Due to the short notice, your result of the corresponding quiz will not be taken into account for grading. Skim the papers (start with the first optional one if you haven't heard of traffic analysis, it's a very short summary, not a research paper) before the seminar, and read more thoroughly later. You'll get multiple attempts for the quiz, use it as feedback for yourself. 

Explanation by the group:

The first paper lifts how Traffic analysis can be used in a sinister way.
The second paper shows how it can be used in a defensive manner.
Both of them regard Android so they are in a comparable and similar area.

The first optional paper is for those that have no footing in what Traffic Analysis is.
The second option paper is very interesting in how Traffic Analysis can harm TOR users.

Required Reading:

First paper:
Conti, Mauro, et al. "Analyzing android encrypted network traffic to identify user actions." IEEE Transactions on Information Forensics and Security 11.1 (2015): 114-125.
(pdf, log in via KTH to access) Links to an external site.

Second paper:
Wang, Shanshan, et al. "A mobile malware detection method using behavior features in network traffic." Journal of Network and Computer Applications 133 (2019): 15-25.
(pdf, log in via KTH to access)

Optional:

First Optional:
Awake Arista, Network traffic analysis
(short web article) Links to an external site.

Second Optional:
Basyoni, Lamiaa, et al. "Traffic analysis attacks on Tor: a survey." 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT). IEEE, 2020.
(pdf via KTH library)

 

1631692799 09/15/2021 09:59am
Please include a description
Additional comments:
Rating max score to > Pts
Please include a rating title

Rubric

Find rubric
Please include a title
Find a rubric
Title
You've already rated students with this rubric. Any major changes could affect their assessment results.
 
 
 
 
 
 
 
     
Can't change a rubric once you've started using it.  
Title
Criteria Ratings Pts
This criterion is linked to a learning outcome Description of criterion
threshold: 5 pts
Edit criterion description Delete criterion row
5 to >0 Pts Full marks blank
0 to >0 Pts No marks blank_2
This area will be used by the assessor to leave comments related to this criterion.
pts
  / 5 pts
--
Additional comments
This criterion is linked to a learning outcome Description of criterion
threshold: 5 pts
Edit criterion description Delete criterion row
5 to >0 Pts Full marks blank
0 to >0 Pts No marks blank_2
This area will be used by the assessor to leave comments related to this criterion.
pts
  / 5 pts
--
Additional comments
Total points: 5 out of 5