Two-Phased Method for Identifying SSH Encrypted Application Flows

被引:0
|
作者
Hirvonen, Matti [1 ]
Sailio, Mirko [1 ]
机构
[1] VTT Tech Res Ctr Finland, Oulu, Finland
关键词
Traffic monitoring; K-means; SSH analysis;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The use of application-layer tunnels has become more popular nowadays. By using encrypted tunnels for prohibited application such as peer-to-peer file sharing it is easy to gain access to restricted networks. Application-layer tunnels provide a possibility to bypass network defenses which is even more useful for malicious users trying to avoid detection. The accurate identification of application flows in encrypted tunnels is important for the network security and management purposes. Traditional network traffic classification methods based on port numbers or pattern-matching mechanisms are practically useless in identifying application flows inside an encrypted tunnel, therefore another approach is needed. In this paper, we propose a two-phased method for classifying SSH tunneled application flows in real time. The classification is based on the statistical features of the network flows. The first classification phase identifies the SSH connection while the second classification phase detects the tunneled application. A simple K-Means clustering algorithm is utilized in classification. We evaluated our method using manually generated packet traces. The results were promising; over 94% of all flow samples were classified correctly, while untrained application flow samples were detected as unknown at high precision.
引用
收藏
页码:1033 / 1038
页数:6
相关论文
共 50 条
  • [41] Fulfilling SLA measurability via two-phased QoS metrics integration
    Xia, HT
    Wu, GH
    GLOBECOM '04: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6, 2004, : 2123 - 2127
  • [42] Modeling the neural substrates of learning through conditioning: A two-phased model
    Puigbo Llobet, J. -Y.
    Gonzalez-Ballester, M. A.
    Verschure, P. F. M. J.
    IBM JOURNAL OF RESEARCH AND DEVELOPMENT, 2017, 61 (2-3)
  • [43] MODELING OF ALKALI-SILICA REACTION IN A TWO-PHASED MATERIAL MODEL
    Itam, Zarina
    Husain, Hazran
    JURNAL TEKNOLOGI, 2015, 76 (09): : 13 - 17
  • [44] A two-phased semantic optimization modeling approach on supplier selection in eProcurement
    Choi, JH
    Chang, YS
    EXPERT SYSTEMS WITH APPLICATIONS, 2006, 31 (01) : 137 - 144
  • [45] TWO-PHASED VALIDATION OF THE PELVIC FLOOR AWARENESS AND KNOWLEDGE SURVEY (PFAKS)
    Markowitz, M. A.
    Burton, C. S.
    Stewart, C. A.
    Ackerman, A. L.
    Eilber, K. S.
    Rogers, R. G.
    Anger, J. T.
    INTERNATIONAL UROGYNECOLOGY JOURNAL, 2019, 30 : S304 - S305
  • [46] Two-Phased Protocol for Providing Data Confidentiality in Cloud Storage Environments
    Butoi, Alexandru
    Morar, Gabriela Andreea
    Ilea, Andreea
    BUSINESS INFORMATION SYSTEMS WORKSHOPS, BIS 2012, 2012, 127 : 220 - 230
  • [47] Nucleation field, reversal mechanism and coercivity paradox in two-phased magnetic nanosystem
    GuoPing Zhao
    HuaiWu Zhang
    ZhiYong Zhong
    Lang Chen
    Science China Physics, Mechanics and Astronomy, 2011, 54 : 1249 - 1253
  • [48] Silhouette - Identifying YouTube Video Flows from Encrypted Traffic
    Li, Feng
    Chung, Jae Won
    Claypool, Mark
    PROCEEDINGS OF THE 28TH ACM WORKSHOP ON NETWORK AND OPERATING SYSTEMS SUPPORT FOR DIGITAL AUDIO AND VIDEO (NOSSDAV'18), 2018, : 19 - 24
  • [49] Two-Phased Federated Learning with Clustering and Personalization for Natural Gas Load Forecasting
    Zhao, Shubao
    Liu, Jia
    Ma, Guoliang
    Yang, Jie
    Liu, Di
    Li, Zengxiang
    TRUSTWORTHY FEDERATED LEARNING, FL 2022, 2023, 13448 : 130 - 143
  • [50] Learning from nature: Insect tongues as model for two-phased viscose adhesives?
    Betz, Oliver
    Koerner, Lars
    Gorb, Stanislav
    Adhaesion Kleben und Dichten, 2008, (06): : 38 - 41