首页> 外文学位 >Practical analysis of encrypted network traffic.
【24h】

Practical analysis of encrypted network traffic.

机译:加密网络流量的实用分析。

获取原文
获取原文并翻译 | 示例

摘要

The growing use of encryption in network communications is an undoubted boon for user privacy. However, the limitations of real-world encryption schemes are still not well understood, and new side-channel attacks against encrypted communications are disclosed every year. Furthermore, encrypted network communications, by preventing inspection of packet contents, represent a significant challenge from a network security perspective: our existing infrastructure relies on such inspection for threat detection. Both problems are exacerbated by the increasing prevalence of encrypted traffic: recent estimates suggest that 65% or more of downstream Internet traffic will be encrypted by the end of 2016. This work addresses these problems by expanding our understanding of the properties and characteristics of encrypted network traffic and exploring new, specialized techniques for the handling of encrypted traffic by network monitoring systems.;We first demonstrate that opaque traffic, of which encrypted traffic is a subset, can be identified in real-time and how this ability can be leveraged to improve the capabilities of existing IDS systems. To do so, we evaluate and compare multiple methods for rapid identification of opaque packets, ultimately pinpointing a simple hypothesis test (which can be implemented on an FPGA) as an efficient and effective detector of such traffic. In our experiments, using this technique to "winnow", or filter, opaque packets from the traffic load presented to an IDS system significantly increased the throughput of the system, allowing the identification of many more potential threats than the same system without winnowing.;Second, we show that side channels in encrypted VoIP traffic enable the reconstruction of approximate transcripts of conversations. Our approach leverages techniques from linguistics, machine learning, natural language processing, and machine translation to accomplish this task despite the limited information leaked by such side channels. Our ability to do so underscores both the potential threat to user privacy which such side channels represent and the degree to which this threat has been underestimated.;Finally, we propose and demonstrate the effectiveness of a new paradigm for identifying HTTP resources retrieved over encrypted connections. Our experiments demonstrate how the predominant paradigm from prior work fails to accurately represent real-world situations and how our proposed approach offers significant advantages, including the ability to infer partial information, in comparison. We believe these results represent both an enhanced threat to user privacy and an opportunity for network monitors and analysts to improve their own capabilities with respect to encrypted traffic.
机译:网络通信中加密技术的日益普及无疑为用户隐私带来了福音。但是,仍然没有很好地了解现实世界中加密方案的局限性,并且每年都会公开针对加密通信的新的侧信道攻击。此外,从网络安全的角度来看,通过防止对数据包内容的检查,加密的网络通信构成了重大挑战:我们现有的基础架构依靠这种检查来进行威胁检测。加密流量的日益普及加剧了这两个问题:最近的估计表明,到2016年底,将加密65%或更多的下行Internet流量。这项工作通过扩大我们对加密网络的特性和特征的理解来解决这些问题。流量,并探索通过网络监视系统处理加密流量的新的专门技术。;我们首先证明,可以实时识别不透明流量(其中加密流量是子集),以及如何利用此功能来提高现有IDS系统的功能。为此,我们评估并比较了用于快速识别不透明数据包的多种方法,最终确定了一种简单的假设检验(可以在FPGA上实现)作为这种流量的有效检测器。在我们的实验中,使用该技术“吹送”或过滤来自IDS系统的流量负载中的不透明数据包,可以显着提高系统的吞吐量,从而比不吹气的情况下识别同一系统要多得多的潜在威胁。其次,我们证明了加密的VoIP流量中的辅助信道可以重建会话的近似记录。我们的方法利用了语言学,机器学习,自然语言处理和机器翻译等技术来完成此任务,尽管这些辅助渠道泄漏的信息有限。我们这样做的能力既凸显了此类副渠道对用户隐私的潜在威胁,也凸显了这种威胁的严重程度。最后,我们提出并证明了一种新范式的有效性,该范式可用于识别通过加密连接获取的HTTP资源。我们的实验表明,以前的工作中的主要范式如何无法准确地表示现实世界的情况,以及相比之下,我们提出的方法如何提供显着的优势,包括推断部分信息的能力。我们认为,这些结果既代表着对用户隐私的更大威胁,也代表了网络监控人员和分析人员有机会改善自身在加密流量方面的能力。

著录项

  • 作者

    White, Andrew M.;

  • 作者单位

    The University of North Carolina at Chapel Hill.;

  • 授予单位 The University of North Carolina at Chapel Hill.;
  • 学科 Computer science.
  • 学位 Ph.D.
  • 年度 2015
  • 页码 159 p.
  • 总页数 159
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号