{"id":3408,"date":"2022-02-03T22:55:00","date_gmt":"2022-02-03T21:55:00","guid":{"rendered":"https:\/\/webdev.atsec.us\/?p=3408"},"modified":"2024-08-19T21:34:08","modified_gmt":"2024-08-19T19:34:08","slug":"distinguishing-encrypted-from-non-encrypted-data","status":"publish","type":"post","link":"https:\/\/webdev.atsec.us\/distinguishing-encrypted-from-non-encrypted-data\/","title":{"rendered":"Distinguishing encrypted from non-encrypted data"},"content":{"rendered":"\n
\"\"<\/figure>\n\n\n\n

Our colleague Quentin Gouchet, together with Eric J\u00e4rpe, authored an article on distinguishing encrypted from non-encrypted data.<\/p>\n\n\n\n

We invite you to read the article here.<\/a><\/strong><\/p>\n\n\n\n

Introduction:<\/strong>
The discrimination of encrypted data from other kinds of data is of interest in many areas of application. For instance for making other applications work for the communication traffic in a network where the means for application may depend on whether the traffic data is plaintext\/cleartext, compressed, encrypted or encoded in some way. Also, there may be security reasons, e.g. the uncontrolled flow of encrypted data of which some may be transmitted for malicious purposes could be argued in need of supervision network abilities. To these ends, various methods, mainly of machine learning, have been suggested through the last decades.<\/p>\n","protected":false},"excerpt":{"rendered":"

Our colleague Quentin Gouchet, together with Eric J\u00e4rpe, authored an article on distinguishing encrypted from non-encrypted data. We invite you to read the article here. Introduction:The discrimination of encrypted data from other kinds of data is of interest in many areas of application. For instance for making other applications work for the communication traffic in […]<\/p>\n","protected":false},"author":9,"featured_media":3409,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[7,8,1],"tags":[],"_links":{"self":[{"href":"https:\/\/webdev.atsec.us\/wp-json\/wp\/v2\/posts\/3408"}],"collection":[{"href":"https:\/\/webdev.atsec.us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/webdev.atsec.us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/webdev.atsec.us\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/webdev.atsec.us\/wp-json\/wp\/v2\/comments?post=3408"}],"version-history":[{"count":1,"href":"https:\/\/webdev.atsec.us\/wp-json\/wp\/v2\/posts\/3408\/revisions"}],"predecessor-version":[{"id":3410,"href":"https:\/\/webdev.atsec.us\/wp-json\/wp\/v2\/posts\/3408\/revisions\/3410"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/webdev.atsec.us\/wp-json\/wp\/v2\/media\/3409"}],"wp:attachment":[{"href":"https:\/\/webdev.atsec.us\/wp-json\/wp\/v2\/media?parent=3408"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/webdev.atsec.us\/wp-json\/wp\/v2\/categories?post=3408"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/webdev.atsec.us\/wp-json\/wp\/v2\/tags?post=3408"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}