2011
DOI: 10.1007/978-3-642-20305-3_14
|View full text |Cite
|
Sign up to set email alerts
|

Entropy Estimation for Real-Time Encrypted Traffic Identification (Short Paper)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
25
0
6

Year Published

2013
2013
2022
2022

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 36 publications
(31 citation statements)
references
References 8 publications
0
25
0
6
Order By: Relevance
“…Although encrypted traffic hides all content from a potential eavesdropper, the first steps (initial handshake, connection parameter negotiation, protocol version) are performed in plaintext and therefore have distinguishable features. Exploiting the latter, machine learning and other classification methods can infer the underlying application protocols from encrypted traffic [3,10,56,36], for example in SSH and web browsing traffic analysis [26,46]. Specifically, classification algorithms used to detect encrypted web traffic rely on static object lengths and the previous creation feature-based libraries (i.e.…”
Section: Related Workmentioning
confidence: 99%
“…Although encrypted traffic hides all content from a potential eavesdropper, the first steps (initial handshake, connection parameter negotiation, protocol version) are performed in plaintext and therefore have distinguishable features. Exploiting the latter, machine learning and other classification methods can infer the underlying application protocols from encrypted traffic [3,10,56,36], for example in SSH and web browsing traffic analysis [26,46]. Specifically, classification algorithms used to detect encrypted web traffic rely on static object lengths and the previous creation feature-based libraries (i.e.…”
Section: Related Workmentioning
confidence: 99%
“…Alternatively, flows can be fingerprinted based on some property of the content being carried. For example, a censor that does not allow encrypted content can block flows where content has high entropy [29].…”
Section: Fingerprintingmentioning
confidence: 99%
“…Note that b is the base of the logarithm, so b=2 in bits and b=26 in lower-case letters. In addition, entropy has been used in several ways to identify encrypted packet or detect the anomaly and worm [8,9]. Since the purpose of cryptographic algorithm is to protect the original data from prediction, the encrypted bit stream would have high entropy which indicates uniformly distributed random variables.…”
Section: Entropymentioning
confidence: 99%