Network traffic identification of several open source secure proxy protocols

被引:5
|
作者
Zhang, Yidan [1 ]
Chen, Jiageng [1 ,2 ]
Chen, Kaiming [2 ]
Xu, Ruoyan [2 ]
Teh, Jesen [3 ]
Zhang, Shuai [2 ]
机构
[1] Cent China Normal Univ, Sch Comp, Wuhan, Hubei, Peoples R China
[2] Cent China Normal Univ, Wollongong Joint Inst, Wuhan, Hubei, Peoples R China
[3] Univ Sains Malaysia, Sch Comp Sci, George Town, Malaysia
基金
中国国家自然科学基金;
关键词
CLASSIFICATION;
D O I
10.1002/nem.2090
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secure proxy technique has a wide range of applications especially in the area of VPN to protect the private communication from being surveilled. However, the adversaries may also take advantage of the VPN services for other purposes. Thus, knowing the characteristics of the corresponding security protocols will benefit the administration to narrow down the targets. Also, given the various VPN services on the market, we also want to know whether there exists some security flaws from the cryptographic protocol's point of view, so that can be used to improve analyzing the protocol. In this paper, we first target several widely used open source secure proxy protocols and provide their weaknesses through the static analysis. Then we apply the deep learning technique to train all the related network traffic, and our results showed that all the secure proxy traffics can be successfully distinguished with high accuracy.
引用
收藏
页数:17
相关论文
共 50 条
  • [1] The Biometric System Models with Secure Network Protocols in Open Network Environment
    Shin, Woochang
    Shin, Yong-Nyuo
    SECTECH: 2008 INTERNATIONAL CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2008, : 155 - 158
  • [2] Source identification of encrypted video traffic in the presence of heterogeneous network traffic
    Shi, Yan
    Ross, Arun
    Biswas, Subir
    COMPUTER COMMUNICATIONS, 2018, 129 : 101 - 110
  • [3] Analysis of Network Protocols for Secure Communication
    Caballero, David
    Gonzalez, Francisco
    Islam, Sheikh Ariful
    9TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSICS AND SECURITY (ISDFS'21), 2021,
  • [4] A Secure Architecture for Traffic Control Systems with SDLC Protocols
    Yu, Ming
    Cai, Ziyuan
    Tung, Leonard
    PROCEEDINGS 2012 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2012, : 2161 - 2166
  • [5] Secure network management within an open-source mobile agent framework
    Pashalidis A.
    Fleury M.
    Journal of Network and Systems Management, 2004, 12 (1) : 9 - 31
  • [6] Identification protocols secure against reset attacks
    Bellare, M
    Fischlin, M
    Goldwasser, S
    Micali, S
    ADVANCES IN CRYPTOLOGY-EUROCRYPT 2001, PROCEEDINGS, 2001, 2045 : 495 - 511
  • [7] Secure and Efficient Protocols for Iris and Fingerprint Identification
    Blanton, Marina
    Gasti, Paolo
    COMPUTER SECURITY - ESORICS 2011, 2011, 6879 : 190 - +
  • [8] Comparison Between Several Open Source Network Configuration Protocol Server Implementations
    Stancu, Alexandru
    Vulpe, Alexandru
    Suciu, George
    Popovici, Eduard
    2016 INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM 2016), 2016, : 173 - 176
  • [9] Verification of Secure Network Protocols in Uncertain Environments
    Damiani, Sarah
    Griffin, Christopher
    Phoha, Shashi
    Racunas, Stephan
    Rogan, Christopher
    INTERNATIONAL JOURNAL OF WIRELESS INFORMATION NETWORKS, 2006, 13 (03) : 221 - 228
  • [10] A survey on secure routing protocols for satellite network
    Yan, Yanjun
    Han, Guangjie
    Xu, Huihui
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 145