2009
DOI: 10.1007/978-3-642-01399-7_15
|View full text |Cite
|
Sign up to set email alerts
|

Real Time Identification of SSH Encrypted Application Flows by Using Cluster Analysis Techniques

Abstract: Abstract. The identification of application flows is a critical task in order to manage bandwidth requirements of different kind of services (i.e. VOIP, Video, ERP). As network security functions spread, an increasing amount of traffic is natively encrypted due to privacy issues (e.g. VPN). This makes ineffective current traffic classification systems based on ports and payload inspection, e.g. even powerful Deep Packet Inspection is useless to classify application flow carried inside SSH sessions. We have dev… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
18
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 25 publications
(18 citation statements)
references
References 7 publications
0
18
0
Order By: Relevance
“…These two classes represented the predominant traffic but with different percentages in training and testing sets, so they are the most difficult to recognize correctly. [13] or encrypted connections that carry a single TCP flow on top of it [14], [15], [16], [17], [18]. However, the informativeness of such features is not clear when considering protocols such as IPSec that multiplex the flows into the same encrypted connection, given that there is no way to reassembly the flows being routed through the IPSec channel without knowing the encryption keys.…”
Section: Discussion: Using a Large Datasetmentioning
confidence: 98%
“…These two classes represented the predominant traffic but with different percentages in training and testing sets, so they are the most difficult to recognize correctly. [13] or encrypted connections that carry a single TCP flow on top of it [14], [15], [16], [17], [18]. However, the informativeness of such features is not clear when considering protocols such as IPSec that multiplex the flows into the same encrypted connection, given that there is no way to reassembly the flows being routed through the IPSec channel without knowing the encryption keys.…”
Section: Discussion: Using a Large Datasetmentioning
confidence: 98%
“…They also detected a decrease in accuracy when adding additional applications for detection. The present paper also utilizes K-means clustering algorithm, but the number of target applications is greater than in [8], including widely used BitTorrent protocol. It is noticeable that, with a greater number of tunneled application, the classification accuracy remains high.…”
Section: Related Workmentioning
confidence: 98%
“…al. [8] describe a real time K-means based identification algorithm for SSH encrypted application flows. They utilized arrival times, sizes and directions of packets in the classification.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…A support vector machine was used in [13] to identify protocols other than HTTP and SSH tunneled over HTTP or SSH by looking at the message size, the block cipher size (involved in the message encryption), and the MTU size. Application-layer protocols sent through an encrypted tunnel that carries traffic from many TCP connections simultaneously were classified in [14], [15] using a k-NearestNeighbor classifier based on Hidden Markov Models with the message size, the message direction, and message inter-arrival times as features. In [16], the authors compared Bayesian Networks, Decision Trees and Multilayer Perceptrons for the flow-based classification of six different types of Internet traffic, including peer-to-peer and content delivery traffic, and showed the importance of correctly classifying training instances.…”
Section: Related Workmentioning
confidence: 99%