Real-Time Detection of Encrypted Traffic based on Entropy Estimation

نویسندگان

  • Peter Kritzer
  • Elbert G. Hubbard
چکیده

This thesis investigates the topic of using entropy estimation for traffic classification. A real-time encrypted traffic detector (RT-ETD) which is able to classify traffic in encrypted and unencrypted traffic is proposed. The performance of the RT-ETD is evaluated on ground truth and real network traces. This thesis is opened by some introductory chapters on entropy, pattern recognition, user privacy and traffic classification. A real-time encrypted traffic detector which is targeted to operate in a privacy preserving environment is presented. The RT-ETD consists of several modules that can be used to customize the approach for specific needs. A customization for two different tasks is performed, where unencrypted traffic is dropped and only encrypted traffic is forwarded. The classification of the RT-ETD is solely based on information gathered from the first packet of a flow. Header fields as well as the payload are taken into account. The core concept of the RT-ETD is based on the estimation of the entropy of the payload, and a comparison of the retrieved value to the entropy of a uniform distributed payload. Based on ground truth traces with encrypted traffic and real network traces it is shown that the RT-ETD is able to filter out a large fraction of unencrypted traffic, whereas a large fraction of encrypted flows is forwarded. The optimal parameterisation of the RTETD depends on the trade-off between detection performance and privacy preservation.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Entropy Estimation for Real-Time Encrypted Traffic Identification (Short Paper)

This paper describes a novel approach to classify network traffic into encrypted and unencrypted traffic. The classifier is able to operate in real-time as only the first packet of each flow is processed. The main metric used for classification is an estimation of the entropy of the first packet payload. The approach is evaluated based on encrypted ground truth traces and on real network traces...

متن کامل

Classification of encrypted traffic for applications based on statistical features

Traffic classification plays an important role in many aspects of network management such as identifying type of the transferred data, detection of malware applications, applying policies to restrict network accesses and so on. Basic methods in this field were using some obvious traffic features like port number and protocol type to classify the traffic type. However, recent changes in applicat...

متن کامل

A Real Time Traffic Sign Detection and Recognition Algorithm based on Super Fuzzy Set

Advanced Driver Assistance Systems (ADAS) benefit from current infrastructure to discern environmental information. Traffic signs are global guidelines which inform drivers from near characteristics of paths ahead. Traffic Sign Recognition (TSR) system is an ADAS that recognize traffic signs in images captured from road and show information as an adviser or transmit them to other ADASs. In this...

متن کامل

Detecting Bot Networks Based On HTTP And TLS Traffic Analysis

Abstract— Bot networks are a serious threat to cyber security, whose destructive behavior affects network performance directly. Detecting of infected HTTP communications is a big challenge because infected HTTP connections are clearly merged with other types of HTTP traffic. Cybercriminals prefer to use the web as a communication environment to launch application layer attacks and secretly enga...

متن کامل

F-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management

Distributed Denial of Service (DDoS) is a common attack in recent years that can deplete the bandwidth of victim nodes by flooding packets. Based on the type and quantity of traffic used for the attack and the exploited vulnerability of the target, DDoS attacks are grouped into three categories as Volumetric attacks, Protocol attacks and Application attacks. The volumetric attack, which the pro...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010