What is it about?
This paper looks into another more passive yet covert, less-studied format, termed as traffic shadowing: during transmission, packets (as a whole or data in selected fields) are sniffed and recorded by on-path observers; subsequently, they re-appear as additional, unsolicited requests when no clients are waiting for responses.
Featured Image
Photo by charlesdeluvio on Unsplash
Why is it important?
We uncover the broad landscape of traffic shadowing against DNS, HTTP, and TLS messages. Alarmingly, data can be retained long, leveraged for multiple times, and triggers unsolicited requests from potentially abusive networks.
Perspectives
Read the Original
This page is a summary of: Yesterday Once More: Global Measurement of Internet Traffic Shadowing Behaviors, November 2024, ACM (Association for Computing Machinery),
DOI: 10.1145/3646547.3689023.
You can read the full text:
Contributors
The following have contributed to this page