DocumentCode :
632565
Title :
Investigating application behavior in network traffic traces
Author :
Foroushani, Vahid Aghaei ; Zincir-Heywood, A. Nur
Author_Institution :
Fac. of Comput. Sci., Dalhousie Univ., Halifax, NS, Canada
fYear :
2013
fDate :
16-19 April 2013
Firstpage :
72
Lastpage :
79
Abstract :
Identifying encrypted application traffic is an important issue for many network tasks including quality of service, firewall enforcement and security. This paper presents a machine learning based approach to identify high level application behavior in a given traffic trace using a holistic approach without looking into the content or without checking a static attribute. We demonstrate the effectiveness of our approach as a forensic analysis tool on five encrypted applications namely SSH, Skype, Gtalk, SSL (No Web) and HTTPS (Web Browsing), using traces captured from different networks. Results indicate that it is possible to identify high level application behavior such as unencrypted versus encrypted as well as identifying services running in encrypted tunnels.
Keywords :
cryptography; digital forensics; firewalls; learning (artificial intelligence); quality of service; social networking (online); telecommunication traffic; Gtalk; HTTPS; SSH; SSL; Skype; Web browsing; computer network security; encrypted application traffic identification; encrypted tunnels; firewall enforcement; forensic analysis tool; high level application behavior identification; holistic approach; machine learning based approach; network traffic traces; quality of service; Classification algorithms; Clustering algorithms; Cryptography; Decision trees; Feature extraction; Ports (Computers); Training; Encrypted traffic identification; Performance measures; Security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computational Intelligence for Security and Defense Applications (CISDA), 2013 IEEE Symposium on
Conference_Location :
Singapore
Type :
conf
DOI :
10.1109/CISDA.2013.6595430
Filename :
6595430
Link To Document :
بازگشت