Statistical Identification of Encrypted Web Browsing Traffic
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
HMM profiles for network traffic classification
Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security
Simulation of large scale networks I: simulation of large-scale networks using SSF
Proceedings of the 35th conference on Winter simulation: driving innovation
Timing analysis of keystrokes and timing attacks on SSH
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Analysis of the SSL 3.0 protocol
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
The traffic analysis of continuous-time mixes
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
Privacy vulnerabilities in encrypted HTTP streams
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
BotGrep: finding P2P bots with structured graph analysis
USENIX Security'10 Proceedings of the 19th USENIX conference on Security
Hi-index | 0.00 |
Encrypted protocols, such as SSL, are becoming more prevalent because of the growing use of e-commerce, anonymity services, and secure authentication. Likewise, traffic analysis is becoming more common because it is often the only way to analyze these protocols. Though there are many valid uses for traffic analysis (such as network policy enforcement and intrusion detection), it can also be used to maliciously compromise the secrecy or privacy of a user. While the payload can be strongly protected by encryption, analysis of traffic patterns can yield information about the type and nature of traffic. In this paper we use simulation and an analytic model to examine the impact on user experience of a scheme that masks the behavior of real traffic by embedding it in synthetic, encrypted, cover traffic. This point provides a novel context where we observe the synergy of simulation and analytic modeling. We show that a detailed simulation model of network traffic characteristics can be used to estimate the parameters of an analytic model of tunneling.