Proceedings of the 6th International Wireless Communications and Mobile Computing Conference 2010
DOI: 10.1145/1815396.1815568
|View full text |Cite
|
Sign up to set email alerts
|

Entropy-based traffic filtering to support real-time Skype detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(6 citation statements)
references
References 6 publications
0
6
0
Order By: Relevance
“…where H U (l) is the entropy of a packet with uniform distribution of 1 in the payload and length l and σ is the standard deviation. Figure 9 shows M 1 and M 2 to the simple case of HTTP (unencrypted flow) and SSL (encrypted flow) traffic, and as in [14] justify the condition expressed above. This use case shows how a stateful firewall application can be easily implemented with StreaMon.…”
Section: Hw Accelerated Detection Of Non Standard Encrypted Trafficmentioning
confidence: 57%
See 1 more Smart Citation
“…where H U (l) is the entropy of a packet with uniform distribution of 1 in the payload and length l and σ is the standard deviation. Figure 9 shows M 1 and M 2 to the simple case of HTTP (unencrypted flow) and SSL (encrypted flow) traffic, and as in [14] justify the condition expressed above. This use case shows how a stateful firewall application can be easily implemented with StreaMon.…”
Section: Hw Accelerated Detection Of Non Standard Encrypted Trafficmentioning
confidence: 57%
“…This example shows how HW metrics can be integrated in StreaMon. Since one of the task performed during deep packet inspection is the collection of statistics on byte frequencies, offsets for common byte-values, packet information entropy, we illustrate an use case that is a simplified version of the approach described in [14], in which encrypted flows are detected by combining two traffic features: (i) the bit information entropy of a packet; (ii) the percentage of printable characters, i.e. ASCII characters in the range [32 .…”
Section: Hw Accelerated Detection Of Non Standard Encrypted Trafficmentioning
confidence: 99%
“…Although the detection and forensic methods of encrypted data have not been fully studied, as a kind of encrypted data detection, the identification of encrypted network traffic has attracted a lot of attention, and many works in this aspect have been proposed recently. Dorfinger et al [15] propose a real-time detection method of Skype encrypted traffic based on the entropy estimation method, but the performance of this method is poor when the encrypted data traffic is small. Moreover, the detection performance of encrypted and unencrypted compressed traffic is not discussed.…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, high entropy blocks may indicate the presence of encrypted data. Similarly, the authors in [37] and [11] first computed the entropy of packet payloads and then compared it with the entropy of uniformly randomly distributed sequences of the same length. However, the entropy estimation approach is not effective when the number of samples is small [38,39].…”
Section: Related Workmentioning
confidence: 99%