Real Time Identification of SSH Encrypted Application Flows by Using Cluster Analysis Techniques

  • Authors:
  • Gianluca Maiolini;Andrea Baiocchi;Alfonso Iacovazzi;Antonello Rizzi

  • Affiliations:
  • Elsag Datamat, Automation, security and transportation division, Rome, Italy 00143;INFOCOM Dept., University of Roma "Sapienza", Rome, Italy 00184;INFOCOM Dept., University of Roma "Sapienza", Rome, Italy 00184;INFOCOM Dept., University of Roma "Sapienza", Rome, Italy 00184

  • Venue:
  • NETWORKING '09 Proceedings of the 8th International IFIP-TC 6 Networking Conference
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

The identification of application flows is a critical task in order to manage bandwidth requirements of different kind of services (i.e. VOIP, Video, ERP). As network security functions spread, an increasing amount of traffic is natively encrypted due to privacy issues (e.g. VPN). This makes ineffective current traffic classification systems based on ports and payload inspection, e.g. even powerful Deep Packet Inspection is useless to classify application flow carried inside SSH sessions. We have developed a real time traffic classification method based on cluster analysis to identify SSH flows from statistical behavior of IP traffic parameters, such as length, arrival times and direction of packets. In this paper we describe our approach and relevant obtained results. We achieve detection rate up to 99.5 % in classifying SSH flows and accuracy up to 99.88 % for application flows carried within those flows, such as SCP, SFTP and HTTP over SSH.