Adaptive Encrypted Traffic Fingerprinting With Si-Directional Dependence

被引:67
作者
Al-Naami, Khaled [1 ]
Chandra, Swarup [1 ]
Mustafa, Ahmad [1 ]
Khan, Latifur [1 ]
Lin, Zhiqiang [1 ]
Hamlen, Kevin [1 ]
Thuraisingham, Bhavani [1 ]
机构
[1] Univ Texas Dallas, Comp Sci Dept, Richardson, TX 75080 USA
来源
32ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2016) | 2016年
基金
美国国家科学基金会;
关键词
D O I
10.1145/2991079.2991123
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, network traffic analysis has been increasingly used in various applications including security, targeted advertisements, and network management. However, data encryption performed on network traffic poses a challenge to these analysis techniques, In this paper, we present a novel method to extract characteristics from encrypted traffic by utilizing data dependencies that occur over sequential transmissions of network packets. Furthermore, we explore the temporal nature of encrypted traffic and introduce an adaptive model that considers changes in data content over time. We evaluate our analysis on two packet encrypted applications: website fingerprinting and mobile application (app) fingerprinting, Our evaluation shows how the proposed approach outperforms previous works especially in the open-world scenario and when defense mechanisms are considered.
引用
收藏
页码:177 / 188
页数:12
相关论文
共 39 条
[1]  
AlSabah M., 2012, Proceedings of the 2012 ACM conference on Computer and communications security, P73, DOI [10.1145/2382196.2382208, DOI 10.1145/2382196.2382208]
[2]  
[Anonymous], 2011, P USENIX WORKSH OFF
[3]  
[Anonymous], 2001, J. Clin. Microbiol
[4]  
[Anonymous], 2011, Acm T. Intel. Syst. Tec., DOI DOI 10.1145/1961189.1961199
[5]  
Ateniese G., 2015, Network and System Security, P46
[6]  
Bhoraskar R, 2014, PROCEEDINGS OF THE 23RD USENIX SECURITY SYMPOSIUM, P1021
[7]  
Cai X., 2012, P ACM C COMP COMM SE, P605, DOI 10.1145/2382196.2382260
[8]   A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses [J].
Cai, Xiang ;
Nithyanand, Rishab ;
Wang, Tao ;
Johnson, Rob ;
Goldberg, Ian .
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, :227-238
[9]  
Conti M., 2015, P ACM CODASPY, P297, DOI 10.1145/2699026.2699119
[10]   Analyzing Android Encrypted Network Traffic to Identify User Actions [J].
Conti, Mauro ;
Mancini, Luigi Vincenzo ;
Spolaor, Riccardo ;
Verde, Nino Vincenzo .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (01) :114-125