Network traffic identification of several open source secure proxy protocols

被引:5
|
作者
Zhang, Yidan [1 ]
Chen, Jiageng [1 ,2 ]
Chen, Kaiming [2 ]
Xu, Ruoyan [2 ]
Teh, Jesen [3 ]
Zhang, Shuai [2 ]
机构
[1] Cent China Normal Univ, Sch Comp, Wuhan, Hubei, Peoples R China
[2] Cent China Normal Univ, Wollongong Joint Inst, Wuhan, Hubei, Peoples R China
[3] Univ Sains Malaysia, Sch Comp Sci, George Town, Malaysia
基金
中国国家自然科学基金;
关键词
CLASSIFICATION;
D O I
10.1002/nem.2090
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secure proxy technique has a wide range of applications especially in the area of VPN to protect the private communication from being surveilled. However, the adversaries may also take advantage of the VPN services for other purposes. Thus, knowing the characteristics of the corresponding security protocols will benefit the administration to narrow down the targets. Also, given the various VPN services on the market, we also want to know whether there exists some security flaws from the cryptographic protocol's point of view, so that can be used to improve analyzing the protocol. In this paper, we first target several widely used open source secure proxy protocols and provide their weaknesses through the static analysis. Then we apply the deep learning technique to train all the related network traffic, and our results showed that all the secure proxy traffics can be successfully distinguished with high accuracy.
引用
收藏
页数:17
相关论文
共 50 条
  • [21] An open source satellite network simulator for quality based multimedia broadband traffic management
    Puddu, Roberto
    Popescu, Vlad
    Murroni, Maurizio
    2022 IEEE INTERNATIONAL SYMPOSIUM ON BROADBAND MULTIMEDIA SYSTEMS AND BROADCASTING (BMSB), 2022,
  • [22] Detection of botnet by analyzing network traffic flow characteristics using open source tools
    Shanthi, K.
    Seenivasan, D.
    PROCEEDINGS OF 2015 IEEE 9TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO), 2015,
  • [23] Profiling the ST 2110 Network Traffic for Load Testing with Open-Source Tools
    Kostiukevych I.
    Kernen T.
    Vermost W.
    Kondratenko P.
    SMPTE Motion Imaging Journal, 2024, 133 (01): : 52 - 65
  • [24] Traffic Identification Engine: An Open Platform for Traffic Classification
    de Donato, Walter
    Pescape, Antonio
    Dainotti, Alberto
    IEEE NETWORK, 2014, 28 (02): : 56 - 64
  • [25] A network attack traffic identification method for power sensor network based on open-set recognition
    Liu, Wei
    Zhu, Qigang
    Wei, Xingshen
    He, Junjiang
    Zhang, Qiang
    Jiang, Tian
    Sun, Zeji
    INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2025, 47 (03) : 173 - 185
  • [26] App traffic identification under ShadowSocksR proxy with machine learning
    Guo G.
    Yang C.
    Chen M.
    Ma J.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2023, 50 (02): : 138 - 146
  • [27] Identification of Private ICS Protocols Based on Raw Traffic
    Zhai, Liang
    Zheng, Qiuhua
    Zhang, Xu
    Hu, Haizhong
    Yin, Weihao
    Zeng, Yingpei
    Wu, Ting
    SYMMETRY-BASEL, 2021, 13 (09):
  • [28] Impact of cache coherence protocols on the processing of network traffic
    Kumar, Amit
    Huggahalli, Ram
    MICRO-40: PROCEEDINGS OF THE 40TH ANNUAL IEEE/ACM INTERNATIONAL SYMPOSIUM ON MICROARCHITECTURE, 2007, : 161 - +
  • [29] MANET Routing Protocols Comparison for Composite Traffic Network
    An Ran
    Qu Jinxin
    Sha Xuejun
    2013 THIRD INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC), 2013, : 1363 - 1366
  • [30] Estimating the Runtime and Global Network Traffic of SMPC Protocols
    Klinger, Andreas
    Ehrmanntraut, Vincent
    Meyer, Ulrike
    PROCEEDINGS OF THE FOURTEENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, CODASPY 2024, 2024, : 7 - 18