基本信息来源于合作网站,原文需代理用户跳转至来源网站获取       
摘要:
Protocol tunneling is widely used to add security and/or privacy to Internet applications. Recent research has exposed side channel vulnerabilities that leak information about tunneled protocols. We first discuss the timing side channels that have been found in protocol tunneling tools. We then show how to infer Hidden Markov models (HMMs) of network protocols from timing data and use the HMMs to detect when protocols are active. Unlike previous work, the HMM approach we present requires no a priori knowledge of the protocol. To illustrate the utility of this approach, we detect the use of English or Italian in interactive SSH sessions. For this example application, keystroke-timing data associates inter-packet delays with keystrokes. We first use clustering to extract discrete information from continuous timing data. We use discrete symbols to infer a HMM model, and finally use statistical tests to determine if the observed timing is consistent with the language typing statistics. In our tests, if the correct window size is used, fewer than 2% of data windows are incorrectly identified. Experimental verification shows that on-line detection of language use in interactive encrypted protocol tunnels is reliable. We compare maximum likelihood and statistical hypothesis testing for detecting protocol tunneling. We also discuss how this approach is useful in monitoring mix networks like The Onion Router (Tor).
推荐文章
Fiber Channel协议中CRC编码的硬件实现
光缆通道
循环冗余校验
协议
仿真
基于Fibre Channel的存储局域网络设计与研究
存储局域网络
Fibre Channel
Fibre Channel-Arbitrate Loop
ITER Side 校正场线圈端部大圆弧模压成形及回弹分析
ITER Side校正场线圈
模压成形
回弹
有限元分析
Protocol Buffers在即时通讯系统中的应用研究
Protocol Buffers
即时通讯
数据序列化
消息
内容分析
关键词云
关键词热度
相关文献总数  
(/次)
(/年)
文献信息
篇名 Side-Channel Analysis for Detecting Protocol Tunneling
来源期刊 物联网(英文) 学科 医学
关键词 Hidden MARKOV Models TIMING Side-Channel ATTACK VPN VULNERABILITY
年,卷(期) wlwyw,(2) 所属期刊栏目
研究方向 页码范围 13-26
页数 14页 分类号 R73
字数 语种
DOI
五维指标
传播情况
(/次)
(/年)
引文网络
引文网络
二级参考文献  (0)
共引文献  (0)
参考文献  (0)
节点文献
引证文献  (0)
同被引文献  (0)
二级引证文献  (0)
2011(0)
  • 参考文献(0)
  • 二级参考文献(0)
  • 引证文献(0)
  • 二级引证文献(0)
研究主题发展历程
节点文献
Hidden
MARKOV
Models
TIMING
Side-Channel
ATTACK
VPN
VULNERABILITY
研究起点
研究来源
研究分支
研究去脉
引文网络交叉学科
相关学者/机构
期刊影响力
物联网(英文)
季刊
2161-6817
武汉市江夏区汤逊湖北路38号光谷总部空间
出版文献量(篇)
78
总下载数(次)
0
论文1v1指导