Two-Phased Method for Identifying SSH Encrypted Application Flows

被引:0
|
作者
Hirvonen, Matti [1 ]
Sailio, Mirko [1 ]
机构
[1] VTT Tech Res Ctr Finland, Oulu, Finland
关键词
Traffic monitoring; K-means; SSH analysis;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The use of application-layer tunnels has become more popular nowadays. By using encrypted tunnels for prohibited application such as peer-to-peer file sharing it is easy to gain access to restricted networks. Application-layer tunnels provide a possibility to bypass network defenses which is even more useful for malicious users trying to avoid detection. The accurate identification of application flows in encrypted tunnels is important for the network security and management purposes. Traditional network traffic classification methods based on port numbers or pattern-matching mechanisms are practically useless in identifying application flows inside an encrypted tunnel, therefore another approach is needed. In this paper, we propose a two-phased method for classifying SSH tunneled application flows in real time. The classification is based on the statistical features of the network flows. The first classification phase identifies the SSH connection while the second classification phase detects the tunneled application. A simple K-Means clustering algorithm is utilized in classification. We evaluated our method using manually generated packet traces. The results were promising; over 94% of all flow samples were classified correctly, while untrained application flow samples were detected as unknown at high precision.
引用
收藏
页码:1033 / 1038
页数:6
相关论文
共 50 条
  • [1] Two-Phased Method for Detecting Evasive Network Attack Channels
    Cao Zigang
    Xiong Gang
    Zhao Yong
    Guo Li
    Fang Binxing
    CHINA COMMUNICATIONS, 2014, 11 (08) : 47 - 58
  • [2] Particle behavior in two-phased lubrication
    Kumar, A
    Schmid, SR
    Wilson, WRD
    WEAR, 1997, 206 (1-2) : 130 - 135
  • [3] Hysteretic model and application of a metallic damper with two-phased energy dissipation
    Wang, Jiachen
    Men, Jinjie
    Cui, Ying
    STRUCTURES, 2024, 70
  • [4] Two-Phased Network Traffic Classification Method for Quality of Service Management
    Hirvonen, Matti
    Laulajainen, Jukka-Pekka
    ISCE: 2009 IEEE 13TH INTERNATIONAL SYMPOSIUM ON CONSUMER ELECTRONICS, VOLS 1 AND 2, 2009, : 799 - 803
  • [5] Real Time Identification of SSH Encrypted Application Flows by Using Cluster Analysis Techniques
    Maiolini, Gianluca
    Baiocchi, Andrea
    Lacovazzi, Alfonso
    Rizzi, Antonello
    NETWORKING 2009, 2009, 5550 : 182 - +
  • [6] Interleaving two-phased jobs on a single machine
    Sherali, Hanif D.
    Smith, J. Cole
    Discrete Optimization, 2005, 2 (04) : 348 - 361
  • [7] Laser diagnostics of two-phased jets in combustion
    Stepowski, D
    Bazile, R
    Cessou, A
    Colin, P
    Guerre, S
    BULLETIN DES SOCIETES CHIMIQUES BELGES, 1997, 106 (06): : 327 - 330
  • [8] A two-phased investigation of the determinants of EDI effectiveness
    Bergeron, F
    Raymond, L
    EFFECTIVE UTILIZATION AND MANAGEMENT OF EMERGING INFORMATION TECHNOLOGIES, 1998, : 201 - 211
  • [9] A two-phased approach to the evaluation of natural attenuation
    Blickle, FW
    Leone, G
    Macauley, DD
    FIRST INTERNATIONAL CONFERENCE ON REMEDIATION OF CHLORINATED AND RECALCITRANT COMPOUNDS, VOL 3: NATURAL ATTENUATION, 1998, : 139 - 145
  • [10] A two-phased approach to dynamic process planning
    Usher, JM
    Fernandes, KJ
    COMPUTERS & INDUSTRIAL ENGINEERING, 1996, 31 (1-2) : 173 - 176