Presentation is loading. Please wait.

Presentation is loading. Please wait.

Determining applications and characteristics of encrypted wireless traffic. Chris Hanks CMPE 257 3/17/2011.

Similar presentations


Presentation on theme: "Determining applications and characteristics of encrypted wireless traffic. Chris Hanks CMPE 257 3/17/2011."— Presentation transcript:

1 Determining applications and characteristics of encrypted wireless traffic. Chris Hanks CMPE 257 3/17/2011

2  Several fundamental security mechanisms for restricting access to network resources rely on the ability of a reference monitor to inspect the contents of traffic as it traverses the network.  As an administrator you want to know the type of traffic to determine if it is acceptable or not.  As a user you may need to know that someone can figure out what you are doing even if encrypted.

3  Traditional packet inspection does not work if the contents are encrypted.  No port numbers or TCP flags to check.  Also valuable if not encrypted but is being disguised as another type of traffic.  You can still view packet size, timing, and direction.

4  Gathered traffic from capturing packets from Skype with voice only (voip), Skype with voice and video (video), not actively doing anything (nothing), ‘standard’ work web browsing/email/etc (work), and a torrent download (torrent).  While the entire packets were captured, the only things useable were the inter-packet timing, size, and direction of the packets.

5  For each trace (5 minutes) split into several smaller epochs of constant length s (10 seconds)  Attempt 1: for each epoch calculate the average number of packets and average size and standard deviation for each. If traffic is within 2 standard deviations for both measurements consider it a match.  Attempt 2: Count the number of packets of each type during each epoch. Normalize and use k- NN with Kullback-Leibler distance.  4 types: small or not; inbound or outbound

6  Construct a k-Nearest Neighbor (k-NN) classifier to assign a label to each epoch based on number of packets of each type.  To build the k-NN classifier a random sample from the data set was used as a training set based on the earlier defined classification.  To classify each new epoch use Kullback-Leibler distance to determine which vectors in the training set are “nearest” to the vector of counts for the given epoch.

7

8

9

10


Download ppt "Determining applications and characteristics of encrypted wireless traffic. Chris Hanks CMPE 257 3/17/2011."

Similar presentations


Ads by Google