کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
453050 694704 2011 25 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
Can encrypted traffic be identified without port numbers, IP addresses and payload inspection?
موضوعات مرتبط
مهندسی و علوم پایه مهندسی کامپیوتر شبکه های کامپیوتری و ارتباطات
پیش نمایش صفحه اول مقاله
Can encrypted traffic be identified without port numbers, IP addresses and payload inspection?
چکیده انگلیسی

Identifying encrypted application traffic represents an important issue for many network tasks including quality of service, firewall enforcement and security. Solutions should ideally be both simple – therefore efficient to deploy – and accurate. This paper presents a machine learning based approach employing simple packet header feature sets and statistical flow feature sets without using the IP addresses, source/destination ports and payload information to unveil encrypted application tunnels in network traffic. We demonstrate the effectiveness of our approach as a forensic analysis tool on two encrypted applications, Secure SHell (SSH) and Skype, using traces captured from entirely different networks. Results indicate that it is possible to identify encrypted traffic tunnels with high accuracy without inspecting payload, IP addresses and port numbers. Moreover, it is also possible to identify which services run in encrypted tunnels.

ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Computer Networks - Volume 55, Issue 6, 25 April 2011, Pages 1326–1350
نویسندگان
, ,