Find Behaviors of Network Evasion and Protocol Obfuscation Using Traffic Measurement

被引:0
作者
Bai, Quan [1 ,2 ]
Xiong, Gang [1 ]
Zhao, Yong [1 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
[2] Univ Chinese Acad Sci, Beijing, Peoples R China
来源
TRUSTWORTHY COMPUTING AND SERVICES (ISCTCS 2014) | 2015年 / 520卷
关键词
Network evasion; Protocol obfuscation; Traffic measurement; Statistics; Web crawler;
D O I
10.1007/978-3-662-47401-3_45
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of computer network, security has become more and more important. Intrusion Detection Systems (IDS) and firewalls have been used to detect and block malicious applications and specific protocols. As a result, some malicious applications begin to mimic common application protocol or obfuscate themselves to get rid of detection, which is called Network Evasion. Evasion hazards the Internet security seriously. So it is necessary to find a method to detect behavior of network evasion and protocol obfuscation. In this paper, we analyzed and listed some common network evasion techniques and protocol obfuscation examples. We proposed a method based on measurement and statistics to find protocol obfuscation behavior. We took web crawler as an example. We measured massive of traffic in the real high speed network, found the differences of statistical characteristics between Google web crawlers and the private web crawlers. A model was proposed to detect obfuscation of web crawlers. With this model, we found some web crawlers with the behavior of protocol obfuscation. And we think this method is useful to discover and verify other behaviors of network evasion and protocol obfuscation.
引用
收藏
页码:342 / 349
页数:8
相关论文
共 15 条
[1]  
Bar-Yanai R, 2010, LECT NOTES COMPUT SC, V6049, P373, DOI 10.1007/978-3-642-13193-6_32
[2]   Revealing Skype traffic: When randomness plays with you [J].
Bonfiglio, Dario ;
Mellia, Marco ;
Meo, Michela ;
Rossi, Dario ;
Tofanelli, Paolo .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2007, 37 (04) :37-48
[3]  
Cohen F., 1997, Network Security, P11, DOI 10.1016/S1353-4858(97)88551-0
[4]  
Dyer K.P., 2012, IACR Cryptology ePrint Archive, V2012, P494
[5]  
Hernacki B., 2005, Information Security Technical Report, V10, P140, DOI 10.1016/j.istr.2005.07.003
[6]  
Hjelmvik E., 2010, 123751 CHALM U TECHN
[7]  
Khan H., 2013, WIRESPEED PRIV UNPUB
[8]  
Maestre J. Vidal, 2013, ICIT 2013 6 INT C IN
[9]  
Mohajeri Moghaddam H., 2012, P 2012 ACM C COMPUTE, P97, DOI DOI 10.1145/2382196.2382210
[10]  
Ptacek T. H., 1998, INSERTION EVASION DE