Can encrypted traffic be identified without port numbers, IP addresses and payload inspection?

被引:88
作者
Alshammari, Riyad [1 ]
Zincir-Heywood, A. Nur [1 ]
机构
[1] Dalhousie Univ, Fac Comp Sci, Halifax, NS B3H 1W5, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Encrypted traffic identification; Packet; Flow; Security; Supervised learning; Efficiency; Performance measures; CLASSIFICATION;
D O I
10.1016/j.comnet.2010.12.002
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Identifying encrypted application traffic represents an important issue for many network tasks including quality of service, firewall enforcement and security. Solutions should ideally be both simple - therefore efficient to deploy - and accurate. This paper presents a machine learning based approach employing simple packet header feature sets and statistical flow feature sets without using the IP addresses, source/destination ports and payload information to unveil encrypted application tunnels in network traffic. We demonstrate the effectiveness of our approach as a forensic analysis tool on two encrypted applications, Secure SHell (SSH) and Skype, using traces captured from entirely different networks. Results indicate that it is possible to identify encrypted traffic tunnels with high accuracy without inspecting payload. IP addresses and port numbers. Moreover, it is also possible to identify which services run in encrypted tunnels. (C) 2010 Elsevier B.V. All rights reserved.
引用
收藏
页码:1326 / 1350
页数:25
相关论文
共 54 条
  • [31] Doucette J, 2008, LECT NOTES COMPUT SC, V4971, P266, DOI 10.1007/978-3-540-78671-9_23
  • [32] Behavioral authentication of server flows
    Early, JP
    Brodley, CE
    Rosenberg, C
    [J]. 19TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2003, : 46 - 55
  • [33] Erman Jeffrey., 2006, Proceedings of the 2006 SIGCOMM workshop on Mining Network Data, P281
  • [34] Freund Y., 1999, Journal of Japanese Society for Artificial Intelligence, V14, P771
  • [35] HAFFNER P., 2005, MINENET 05, P197
  • [36] Profiling and identification of P2P traffic
    Hu, Yan
    Chiu, Dah-Ming
    Lui, John C. S.
    [J]. COMPUTER NETWORKS, 2009, 53 (06) : 849 - 863
  • [37] BLINC: Multilevel traffic classification in the dark
    Karagiannis, T
    Papagiannaki, K
    Faloutsos, M
    [J]. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2005, 35 (04) : 229 - 240
  • [38] Efficient application identification and the temporal and spatial stability of classification schema
    Li, Wei
    Canini, Marco
    Moore, Andrew W.
    Bolla, Raffaele
    [J]. COMPUTER NETWORKS, 2009, 53 (06) : 790 - 809
  • [39] Lichodzijewski P., 2008, P GEN EV COMP C, P363
  • [40] Madhukar A., 2006, 14th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems, P179