Network forensics of SSL/TLS encrypted channels

被引:0
作者
Wu, Meng-Da [1 ]
Wolthusen, Stephen [1 ]
机构
[1] Univ London, Royal Holloway, Informat Secur Grp, London WC1E 7HU, England
来源
ECIW 2007: PROCEEDINGS OF THE 6TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY | 2007年
关键词
SSL/TLS; network forensics; traffic classification; sequence alignment;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Network forensics is increasingly hampered by the ubiquitous use of encrypted channels by legitimate and illegitimate network traffic. Both types of traffic are frequently tunneled over application-layer encryption mechanisms, generally using the ubiquitous TLS (SSL) protocol. This results in traditional network forensics tools being largely limited to recording external characteristics (source and origin addresses and ports, time and traffic patterns), but with little insight into content and purpose of the traffic. We propose that a precise characterization of encrypted traffic not only in the form of the external characteristics but also through the analysis of the exact mechanisms, variants and options used for the encrypted channel but visible without access to key material along with a fine-grained analysis of the traffic patterns itself incorporating domain knowledge of the SSL/TLS protocol can yield valuable insights and help to classify traffic into legitimate traffic, illegitimate immediate traffic (e.g. as caused by a Trojan). It can also characterize traffic that is added to an existing data stream by an illegitimate source. In this paper, we therefore present and characterize different traffic types and subsequently analyze this traffic, including the SSL/TLS protocol data units using selected sequence mining techniques.
引用
收藏
页码:303 / 312
页数:10
相关论文
共 16 条
[1]  
[Anonymous], 2000, SSL TLS DESIGNING BU
[2]  
[Anonymous], SIGMETRICS 05
[3]  
BERNAILLE L, 2006, SIGCOMM COMPUT COMMU, P23
[4]  
COULL C, 2003, COMPUTER SECURITY AP, P24
[5]  
EARLY JP, 2003, COMPUTER SECURITY AP, P46
[6]  
HAY B, 2001, INTELLIGENT TECHNIQU
[7]   BLINC: Multilevel traffic classification in the dark [J].
Karagiannis, T ;
Papagiannaki, K ;
Faloutsos, M .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2005, 35 (04) :229-240
[8]   Remote physical device fingerprinting [J].
Kohno, T ;
Broido, A ;
Claffy, KC .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2005, 2 (02) :93-108
[9]  
McGregor A, 2004, LECT NOTES COMPUT SC, V3015, P205
[10]   Toward the accurate identification of network applications [J].
Moore, AW ;
Papagiannaki, K .
PASSIVE AND ACTIVE NETWORK MEASUREMENT, PROCEEDINGS, 2005, 3431 :41-54