Sumit Shekhar Reviewer
27 Aug 2024 10:18 AM

Positive Comments:
This paper addresses a critical issue in network security, particularly the need for improved accuracy in assessment decisions. The proposed method for endpoint monitoring using hash fingerprints from network traffic is innovative and relevant, especially given the increased emphasis on network security due to remote work surges. The approach's applicability across various network configurations, including NGFWs, IPSs, SaaS, and SASE, demonstrates its versatility. The proof-of-concept context-oriented analysis showing 100% identification accuracy provides strong evidence of the method's potential effectiveness.
Negative Comments:
Despite its innovative approach, the paper lacks a detailed evaluation of the method's limitations and potential challenges. For instance, it does not address the scalability of the approach or its performance under different network conditions. Additionally, the description of the methodology is somewhat technical and may benefit from clearer explanations and examples to enhance accessibility. The paper could also improve by including a comparative analysis with existing methods to better contextualize its contributions and highlight any advantages or trade-offs.
Sumit Shekhar Reviewer
27 Aug 2024 10:17 AM