DocumentCode :
514353
Title :
A framework for tunneled traffic analysis
Author :
Yildirim, Taner ; Radcliffe, P.J.
Author_Institution :
Sch. of Electr. & Comput. Eng., RMIT Univ., Melbourne, VIC, Australia
Volume :
2
fYear :
2010
fDate :
7-10 Feb. 2010
Firstpage :
1029
Lastpage :
1034
Abstract :
Research in traffic classification is reaching into ever more difficult areas. Traditional techniques such as header and payload inspection are not providing sufficient information due to usage of non-standard ports and encryption. Promising alternative methods have been proposed based on the statistical behaviour of traffic flows. Although these methods can achieve quite high accuracies in non-encrypted traffic flows, traffic identification of encrypted traffic flows is still in its early stages. We argue that the results to date for encrypted traffic cannot help a network device such as a firewall make any useful decision, nor are there any indications that this may be achieved in the future. We propose a novel approach to cope with encrypted peer to peer network layer tunnels which are a particular problem in schools, universities, and larger corporate networks. First statistical techniques are used to identify the protocols present, a process that may take in the order of seconds. Next, based on the protocols discovered, and enterprise policies, a network device is advised to block, band-limit, or allow the whole tunnel, or a range of packet sizes within that tunnel. Preliminary research has concluded that VoIP traffic can be successfully handled by this approach and that advise to a network device can be practically useful. Work continues to apply these techniques to other protocols and mixes of protocols within a peer to peer tunnels.
Keywords :
Internet telephony; cryptography; peer-to-peer computing; protocols; statistical analysis; telecommunication traffic; VoIP traffic; encrypted peer to peer network layer tunnels; encrypted traffic flows; statistical techniques; traffic classification; tunneled traffic analysis; Cryptography; Inspection; Internet telephony; Machine learning algorithms; Payloads; Peer to peer computing; Protocols; Telecommunication traffic; Videoconference; Virtual private networks; Encrypted Traffic; IPSec; Traffic Classification; VPN; VoIP;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Advanced Communication Technology (ICACT), 2010 The 12th International Conference on
Conference_Location :
Phoenix Park
ISSN :
1738-9445
Print_ISBN :
978-1-4244-5427-3
Type :
conf
Filename :
5440217
Link To Document :
بازگشت