153,909 research outputs found

    Passive Monitoring of HTTPS Service Use

    Get PDF
    International audienceHTTPS is used today to secure the majority of web communications and so enhance user privacy. Therefore, traffic monitoring techniques must evolve to remain useful, especially to support security considerations, as for example detecting and filtering the forbidden uses of a web service.However, privacy should be kept as intact as most as possible. This paper describes a new passive and transparent method to infer the use of a HTTPS service by extracting and interpreting only meaningful metadata derived from the encrypted traffic without deeply profile individual users. We propose a model using the sizes of objects loaded in the HTTPS service as a signature, by leveraging kernel density estimation, supportingthen a classification function. We assess this approach extensively on the Google Images Service but we show that our approach remains valid for other services. We succeed to achieve an accuracy of 99.18% when detecting particular keywords to be searched over a large dataset of 115,500 distinct keywords

    Testing the Feasibility of a Passive and Active Case Ascertainment System for Multiple Rare Conditions Simultaneously: The Experience in Three US States

    Get PDF
    Background: Owing to their low prevalence, single rare conditions are difficult to monitor through current state passive and active case ascertainment systems. However, such monitoring is important because, as a group, rare conditions have great impact on the health of affected individuals and the well-being of their caregivers. A viable approach could be to conduct passive and active case ascertainment of several rare conditions simultaneously. This is a report about the feasibility of such an approach. Objective: To test the feasibility of a case ascertainment system with passive and active components aimed at monitoring 3 rare conditions simultaneously in 3 states of the United States (Colorado, Kansas, and South Carolina). The 3 conditions are spina bifida, muscular dystrophy, and fragile X syndrome. Methods: Teams from each state evaluated the possibility of using current or modified versions of their local passive and active case ascertainment systems and datasets to monitor the 3 conditions. Together, these teams established the case definitions and selected the variables and the abstraction tools for the active case ascertainment approach. After testing the ability of their local passive and active case ascertainment system to capture all 3 conditions, the next steps were to report the number of cases detected actively and passively for each condition, to list the local barriers against the combined passive and active case ascertainment system, and to describe the experiences in trying to overcome these barriers. Results: During the test period, the team from South Carolina was able to collect data on all 3 conditions simultaneously for all ages. The Colorado team was also able to collect data on all 3 conditions but, because of age restrictions in its passive and active case ascertainment system, it was able to report few cases of fragile X syndrome. The team from Kansas was able to collect data only on spina bifida. For all states, the implementation of an active component of the ascertainment system was problematic. The passive component appears viable with minor modifications. Conclusions: Despite evident barriers, the joint passive and active case ascertainment of rare disorders using modified existing surveillance systems and datasets seems feasible, especially for systems that rely on passive case ascertainment

    Revealing the unseen: how to expose cloud usage while protecting user privacy

    Full text link
    Cloud users have little visibility into the performance characteristics and utilization of the physical machines underpinning the virtualized cloud resources they use. This uncertainty forces users and researchers to reverse engineer the inner workings of cloud systems in order to understand and optimize the conditions their applications operate. At Massachusetts Open Cloud (MOC), as a public cloud operator, we'd like to expose the utilization of our physical infrastructure to stop this wasteful effort. Mindful that such exposure can be used maliciously for gaining insight into other user's workloads, in this position paper we argue for the need for an approach that balances openness of the cloud overall with privacy for each tenant inside of it. We believe that this approach can be instantiated via a novel combination of several security and privacy technologies. We discuss the potential benefits, implications of transparency for cloud systems and users, and technical challenges/possibilities.Accepted manuscrip

    Survey of End-to-End Mobile Network Measurement Testbeds, Tools, and Services

    Full text link
    Mobile (cellular) networks enable innovation, but can also stifle it and lead to user frustration when network performance falls below expectations. As mobile networks become the predominant method of Internet access, developer, research, network operator, and regulatory communities have taken an increased interest in measuring end-to-end mobile network performance to, among other goals, minimize negative impact on application responsiveness. In this survey we examine current approaches to end-to-end mobile network performance measurement, diagnosis, and application prototyping. We compare available tools and their shortcomings with respect to the needs of researchers, developers, regulators, and the public. We intend for this survey to provide a comprehensive view of currently active efforts and some auspicious directions for future work in mobile network measurement and mobile application performance evaluation.Comment: Submitted to IEEE Communications Surveys and Tutorials. arXiv does not format the URL references correctly. For a correctly formatted version of this paper go to http://www.cs.montana.edu/mwittie/publications/Goel14Survey.pd
    corecore