Search Results for author: Nick Feamster

Found 12 papers, 2 papers with code

ServeFlow: A Fast-Slow Model Architecture for Network Traffic Analysis

no code implementations6 Feb 2024 Shinan Liu, Ted Shaowang, Gerry Wan, Jeewon Chae, Jonatas Marques, Sanjay Krishnan, Nick Feamster

We identify that on the same task, inference time across models can differ by 2. 7x-136. 3x, while the median inter-packet waiting time is often 6-8 orders of magnitude higher than the inference time!

GRACE: Loss-Resilient Real-Time Video through Neural Codecs

no code implementations21 May 2023 Yihua Cheng, Ziyi Zhang, Hanchen Li, Anton Arapin, Yue Zhang, Qizheng Zhang, YuHan Liu, Xu Zhang, Francis Y. Yan, Amrita Mazumdar, Nick Feamster, Junchen Jiang

In real-time video communication, retransmitting lost packets over high-latency networks is not viable due to strict latency requirements.

Augmenting Rule-based DNS Censorship Detection at Scale with Machine Learning

1 code implementation3 Feb 2023 Jacob Brown, Xi Jiang, Van Tran, Arjun Nitin Bhagoji, Nguyen Phong Hoang, Nick Feamster, Prateek Mittal, Vinod Yegneswaran

In this paper, we explore how machine learning (ML) models can (1) help streamline the detection process, (2) improve the potential of using large-scale datasets for censorship detection, and (3) discover new censorship instances and blocking signatures missed by existing heuristic methods.

Blocking

LEAF: Navigating Concept Drift in Cellular Networks

no code implementations7 Sep 2021 Shinan Liu, Francesco Bronzino, Paul Schmitt, Arjun Nitin Bhagoji, Nick Feamster, Hector Garcia Crespo, Timothy Coyle, Brian Ward

We then show that frequent model retraining with newly available data is not sufficient to mitigate concept drift, and can even degrade model accuracy further.

BIG-bench Machine Learning Management

An Efficient One-Class SVM for Anomaly Detection in the Internet of Things

no code implementations22 Apr 2021 Kun Yang, Samory Kpotufe, Nick Feamster

Insecure Internet of things (IoT) devices pose significant threats to critical infrastructure and the Internet at large; detecting anomalous behavior from these devices remains of critical importance, but fast, efficient, accurate anomaly detection (also called "novelty detection") for these classes of devices remains elusive.

Anomaly Detection Novelty Detection

Traffic Refinery: Cost-Aware Data Representation for Machine Learning on Network Traffic

no code implementations27 Oct 2020 Francesco Bronzino, Paul Schmitt, Sara Ayoubi, Hyojoon Kim, Renata Teixeira, Nick Feamster

We demonstrate the benefit of exploring a range of representations of network traffic and present Traffic Refinery, a proof-of-concept implementation that both monitors network traffic at 10 Gbps and transforms traffic in real time to produce a variety of feature representations for machine learning.

BIG-bench Machine Learning Malware Detection +1

Feature Extraction for Novelty Detection in Network Traffic

no code implementations30 Jun 2020 Kun Yang, Samory Kpotufe, Nick Feamster

To facilitate such exploration, we develop a systematic framework, open-source toolkit, and public Python library that makes it both possible and easy to extract and generate features from network traffic and perform and end-to-end evaluation of these representations across most prevalent modern novelty detection models.

Anomaly Detection BIG-bench Machine Learning +2

A Developer-Friendly Library for Smart Home IoT Privacy-Preserving Traffic Obfuscation

1 code implementation22 Aug 2018 Trisha Datta, Noah Apthorpe, Nick Feamster

The number and variety of Internet-connected devices have grown enormously in the past few years, presenting new challenges to security and privacy.

Cryptography and Security

Detecting Compressed Cleartext Traffic from Consumer Internet of Things Devices

no code implementations7 May 2018 Daniel Hahn, Noah Apthorpe, Nick Feamster

Data encryption is the primary method of protecting the privacy of consumer device Internet communications from network observers.

BIG-bench Machine Learning

Machine Learning DDoS Detection for Consumer Internet of Things Devices

no code implementations11 Apr 2018 Rohan Doshi, Noah Apthorpe, Nick Feamster

An increasing number of Internet of Things (IoT) devices are connecting to the Internet, yet many of these devices are fundamentally insecure, exposing the Internet to a variety of attacks.

BIG-bench Machine Learning feature selection

Spying on the Smart Home: Privacy Attacks and Defenses on Encrypted IoT Traffic

no code implementations16 Aug 2017 Noah Apthorpe, Dillon Reisman, Srikanth Sundaresan, Arvind Narayanan, Nick Feamster

The growing market for smart home IoT devices promises new conveniences for consumers while presenting new challenges for preserving privacy within the home.

Cryptography and Security

Closing the Blinds: Four Strategies for Protecting Smart Home Privacy from Network Observers

no code implementations18 May 2017 Noah Apthorpe, Dillon Reisman, Nick Feamster

The growing market for smart home IoT devices promises new conveniences for consumers while presenting novel challenges for preserving privacy within the home.

Cryptography and Security

Cannot find the paper you are looking for? You can Submit a new open access paper.