首页    期刊浏览 2024年05月07日 星期二
登录注册

文章基本信息

  • 标题:Side-Channel Analysis for Detecting Protocol Tunneling
  • 本地全文:下载
  • 作者:Harakrishnan Bhanu ; Jason Schwier ; Ryan Craven
  • 期刊名称:Advances in Internet of Things
  • 印刷版ISSN:2161-6817
  • 电子版ISSN:2161-6825
  • 出版年度:2011
  • 卷号:1
  • 期号:2
  • 页码:13-26
  • DOI:10.4236/ait.2011.12003
  • 出版社:Scientific Research Publishing
  • 摘要:Protocol tunneling is widely used to add security and/or privacy to Internet applications. Recent research has exposed side channel vulnerabilities that leak information about tunneled protocols. We first discuss the timing side channels that have been found in protocol tunneling tools. We then show how to infer Hidden Markov models (HMMs) of network protocols from timing data and use the HMMs to detect when protocols are active. Unlike previous work, the HMM approach we present requires no a priori knowledge of the protocol. To illustrate the utility of this approach, we detect the use of English or Italian in interactive SSH sessions. For this example application, keystroke-timing data associates inter-packet delays with keystrokes. We first use clustering to extract discrete information from continuous timing data. We use discrete symbols to infer a HMM model, and finally use statistical tests to determine if the observed timing is consistent with the language typing statistics. In our tests, if the correct window size is used, fewer than 2% of data windows are incorrectly identified. Experimental verification shows that on-line detection of language use in interactive encrypted protocol tunnels is reliable. We compare maximum likelihood and statistical hypothesis testing for detecting protocol tunneling. We also discuss how this approach is useful in monitoring mix networks like The Onion Router (Tor).
  • 关键词:Hidden Markov Models; Timing Side-Channel Attack; VPN Vulnerability
国家哲学社会科学文献中心版权所有