Adaptive Encrypted Traffic Fingerprinting With Si-Directional Dependence

被引:67
作者
Al-Naami, Khaled [1 ]
Chandra, Swarup [1 ]
Mustafa, Ahmad [1 ]
Khan, Latifur [1 ]
Lin, Zhiqiang [1 ]
Hamlen, Kevin [1 ]
Thuraisingham, Bhavani [1 ]
机构
[1] Univ Texas Dallas, Comp Sci Dept, Richardson, TX 75080 USA
来源
32ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2016) | 2016年
基金
美国国家科学基金会;
关键词
D O I
10.1145/2991079.2991123
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, network traffic analysis has been increasingly used in various applications including security, targeted advertisements, and network management. However, data encryption performed on network traffic poses a challenge to these analysis techniques, In this paper, we present a novel method to extract characteristics from encrypted traffic by utilizing data dependencies that occur over sequential transmissions of network packets. Furthermore, we explore the temporal nature of encrypted traffic and introduce an adaptive model that considers changes in data content over time. We evaluate our analysis on two packet encrypted applications: website fingerprinting and mobile application (app) fingerprinting, Our evaluation shows how the proposed approach outperforms previous works especially in the open-world scenario and when defense mechanisms are considered.
引用
收藏
页码:177 / 188
页数:12
相关论文
共 39 条
[11]   SUPPORT-VECTOR NETWORKS [J].
CORTES, C ;
VAPNIK, V .
MACHINE LEARNING, 1995, 20 (03) :273-297
[12]  
Dai SF, 2013, IEEE INFOCOM SER, P809
[13]  
Davi L, 2011, LECT NOTES COMPUT SC, V6531, P346
[14]  
DINGLEDINE R., 2004, TECH REP DTIC DOCUME
[15]  
Dougherty J., 1995, Machine Learning. Proceedings of the Twelfth International Conference on Machine Learning, P194
[16]  
Dudorov Dmitry, 2013, 2013 European Intelligence and Security Informatics Conference (EISIC), P38, DOI 10.1109/EISIC.2013.13
[17]   Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail [J].
Dyer, Kevin P. ;
Coull, Scott E. ;
Ristenpart, Thomas ;
Shrimpton, Thomas .
2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2012, :332-346
[18]  
Gu XD, 2015, INT C COMP SUPP COOP, P234, DOI 10.1109/CSCWD.2015.7230964
[19]  
Haque A, 2016, AAAI CONF ARTIF INTE, P1652
[20]  
Haque A, 2016, PROC INT CONF DATA, P481, DOI 10.1109/ICDE.2016.7498264