当前位置: X-MOL 学术Int. J. Netw. Manag. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Network traffic identification of several open source secure proxy protocols
International Journal of Network Management ( IF 1.5 ) Pub Date : 2019-12-27 , DOI: 10.1002/nem.2090
Yidan Zhang 1 , Jiageng Chen 1, 2 , Kaiming Chen 2 , Ruoyan Xu 2 , Jesen Teh 3 , Shuai Zhang 2
Affiliation  

Secure proxy technique has a wide range of applications especially in the area of VPN to protect the private communication from being surveilled. However, the adversaries may also take advantage of the VPN services for other purposes. Thus, knowing the characteristics of the corresponding security protocols will benefit the administration to narrow down the targets. Also, given the various VPN services on the market, we also want to know whether there exists some security flaws from the cryptographic protocol's point of view, so that can be used to improve analyzing the protocol. In this paper, we first target several widely used open source secure proxy protocols and provide their weaknesses through the static analysis. Then we apply the deep learning technique to train all the related network traffic, and our results showed that all the secure proxy traffics can be successfully distinguished with high accuracy.

中文翻译:

几种开源安全代理协议的网络流量识别

安全代理技术具有广泛的应用,尤其是在VPN领域中,可以保护私人通信免遭监视。但是,对手也可能将VPN服务用于其他目的。因此,了解相应安全协议的特征将有利于管理部门缩小目标范围。另外,考虑到市场上的各种VPN服务,我们还想从加密协议的角度了解是否存在一些安全缺陷,以便可以用来改进对协议的分析。在本文中,我们首先针对几种广泛使用的开源安全代理协议,并通过静态分析来提供它们的弱点。然后我们应用深度学习技术来训练所有相关的网络流量,
更新日期:2019-12-27
down
wechat
bug