Network traffic identification of several open source secure proxy protocols

被引:5
|
作者
Zhang, Yidan [1 ]
Chen, Jiageng [1 ,2 ]
Chen, Kaiming [2 ]
Xu, Ruoyan [2 ]
Teh, Jesen [3 ]
Zhang, Shuai [2 ]
机构
[1] Cent China Normal Univ, Sch Comp, Wuhan, Hubei, Peoples R China
[2] Cent China Normal Univ, Wollongong Joint Inst, Wuhan, Hubei, Peoples R China
[3] Univ Sains Malaysia, Sch Comp Sci, George Town, Malaysia
基金
中国国家自然科学基金;
关键词
CLASSIFICATION;
D O I
10.1002/nem.2090
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secure proxy technique has a wide range of applications especially in the area of VPN to protect the private communication from being surveilled. However, the adversaries may also take advantage of the VPN services for other purposes. Thus, knowing the characteristics of the corresponding security protocols will benefit the administration to narrow down the targets. Also, given the various VPN services on the market, we also want to know whether there exists some security flaws from the cryptographic protocol's point of view, so that can be used to improve analyzing the protocol. In this paper, we first target several widely used open source secure proxy protocols and provide their weaknesses through the static analysis. Then we apply the deep learning technique to train all the related network traffic, and our results showed that all the secure proxy traffics can be successfully distinguished with high accuracy.
引用
收藏
页数:17
相关论文
共 50 条
  • [41] Developing Secure Agent Infrastructures with Open Standards and Open-Source Technologies
    Bellver, Joan
    Such, Jose M.
    Espinosa, Agustin
    Garcia-Fornes, Ana
    HIGHLIGHTS IN PRACTICAL APPLICATIONS OF AGENTS AND MULTIAGENT SYSTEMS, 2011, 89 : 37 - 44
  • [42] Open source software research activities in AIST towards secure open systems
    Ohmaki, K
    7TH IEEE INTERNATIONAL SYMPOSIUM ON HIGH ASSURANCE SYSTEMS ENGINEERING, PROCEEDINGS, 2002, : 37 - 41
  • [43] Design and analysis of key exchange protocols via secure channel identification
    Boyd, C
    Ma, WB
    ADVANCES IN CRYPTOLOGY - ASIACRYPT '94, 1995, 917 : 171 - 181
  • [44] On Defining an Hierarchical Secure Proxy Agent Architecture for Embedded Communication Network Applications
    Karras, Dimitrios A.
    2012 20TH TELECOMMUNICATIONS FORUM (TELFOR), 2012, : 131 - 134
  • [45] Secure Proxy-Reencryption-based Inter-network Key Exchange
    Greenwald, Lloyd
    Rohloff, Kurt
    Stott, David
    2018 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2018), 2018, : 773 - 778
  • [46] A Secure and Efficient Identity based Proxy Signcryption Scheme for Smart Grid Network
    Patil R.
    Patil Y.H.
    Journal of Engineering Science and Technology Review, 2022, 15 (04) : 82 - 89
  • [47] Snowflake Anonymous Network Traffic Identification
    Wang, Yuying
    Yang, Guilong
    Xu, Dawei
    Dai, Cheng
    Chen, Tianxin
    Yang, Yunfan
    PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND NETWORKS, VOL III, CENET 2023, 2024, 1127 : 402 - 412
  • [48] Protocol identification of encrypted network traffic
    Gebski, Matthew
    Penev, Alex
    Wong, Raymond K.
    2006 IEEE/WIC/ACM International Conference on Web Intelligence, (WI 2006 Main Conference Proceedings), 2006, : 957 - 960
  • [49] Monitoring Network Traffic of Different OSes in Different IP Protocols
    Liu, Chenhuan
    Su, Chen
    Li, Xing
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON VISION, IMAGE AND SIGNAL PROCESSING (ICVISP 2018), 2018,
  • [50] Analysis and Exploration of Open Source Data in Traffic Network Based on Scheduling Model of Bike-Sharing
    Zhang, Yajie
    Wan, Xucheng
    Zhang, Suyu
    INTERNATIONAL JOURNAL OF PATTERN RECOGNITION AND ARTIFICIAL INTELLIGENCE, 2021, 35 (06)