Network traffic identification of several open source secure proxy protocols

被引:5
|
作者
Zhang, Yidan [1 ]
Chen, Jiageng [1 ,2 ]
Chen, Kaiming [2 ]
Xu, Ruoyan [2 ]
Teh, Jesen [3 ]
Zhang, Shuai [2 ]
机构
[1] Cent China Normal Univ, Sch Comp, Wuhan, Hubei, Peoples R China
[2] Cent China Normal Univ, Wollongong Joint Inst, Wuhan, Hubei, Peoples R China
[3] Univ Sains Malaysia, Sch Comp Sci, George Town, Malaysia
基金
中国国家自然科学基金;
关键词
CLASSIFICATION;
D O I
10.1002/nem.2090
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secure proxy technique has a wide range of applications especially in the area of VPN to protect the private communication from being surveilled. However, the adversaries may also take advantage of the VPN services for other purposes. Thus, knowing the characteristics of the corresponding security protocols will benefit the administration to narrow down the targets. Also, given the various VPN services on the market, we also want to know whether there exists some security flaws from the cryptographic protocol's point of view, so that can be used to improve analyzing the protocol. In this paper, we first target several widely used open source secure proxy protocols and provide their weaknesses through the static analysis. Then we apply the deep learning technique to train all the related network traffic, and our results showed that all the secure proxy traffics can be successfully distinguished with high accuracy.
引用
收藏
页数:17
相关论文
共 50 条
  • [31] A survey for UAV open-source telemetry protocols
    Chalkiadaki, A.
    Mourgelas, C.
    Psilias, D.
    Milidonis, A.
    Voyiatzis, I
    25TH PAN-HELLENIC CONFERENCE ON INFORMATICS WITH INTERNATIONAL PARTICIPATION (PCI2021), 2021, : 346 - 351
  • [32] Protocols for traffic safety using wireless sensor network
    Lai, Yi
    Zheng, Yuan
    Cao, Jiannong
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, PROCEEDINGS, 2007, 4494 : 37 - +
  • [33] Using network protocols' fingerprints to efficiently determine the penetration level of open source software in online businesses
    Appavoo, Paramasiven
    Meetoo-Appavoo, Anuja
    Chutoo, Anwar
    Durgahee, Begum
    2012 IEEE CONFERENCE ON OPEN SYSTEMS (ICOS 2012), 2012, : 1 - 6
  • [34] Open Source Mobile Network
    Sajeev, U.
    Muralitharan, R.
    Ramsan, M. M. M.
    Zamrath, M. N. M.
    Dias, Dileeka
    2ND INTERNATIONAL MERCON 2016 MORATUWA ENGINEERING RESEARCH CONFERENCE, 2016, : 102 - 107
  • [35] An Open-Source Microscopic Traffic Simulator
    Treiber, Martin
    Kesting, Arne
    IEEE INTELLIGENT TRANSPORTATION SYSTEMS MAGAZINE, 2010, 2 (03) : 6 - 13
  • [36] Source models of network game traffic
    Borella, MS
    COMPUTER COMMUNICATIONS, 2000, 23 (04) : 403 - 410
  • [37] Using OpenSSH to secure mobile LAN network traffic
    Luu, BB
    Gopaul, RD
    BATTLESPACE DIGITIZATION AND NETWORK-CENTRIC WARFARE II, 2002, 4741 : 54 - 61
  • [38] Open Source Application for Secure Transmission of Medical Images
    Rodrigues Martinez, F. B.
    Amate, F. C.
    5TH LATIN AMERICAN CONGRESS ON BIOMEDICAL ENGINEERING (CLAIB 2011): SUSTAINABLE TECHNOLOGIES FOR THE HEALTH OF ALL, PTS 1 AND 2, 2013, 33 (1-2): : 280 - 283
  • [39] Analysis and Research of Several Network Traffic Prediction Models
    Lan, Xu
    2013 CHINESE AUTOMATION CONGRESS (CAC), 2013, : 894 - 899
  • [40] Several essential laws required by modern network traffic
    Chen, Yun-Long
    Ye, Wu
    Feng, Sui-Li
    Huanan Ligong Daxue Xuebao/Journal of South China University of Technology (Natural Science), 2007, 35 (05): : 54 - 59