Using GMM and SVM-based techniques for the classification of SSH-encrypted traffic

  • Authors:
  • Maurizio Dusi;Alice Este;Francesco Gringoli;Luca Salgarelli

  • Affiliations:
  • DEA, Università degli Studi di Brescia, Brescia, Italy;DEA, Università degli Studi di Brescia, Brescia, Italy;DEA, Università degli Studi di Brescia, Brescia, Italy;DEA, Università degli Studi di Brescia, Brescia, Italy

  • Venue:
  • ICC'09 Proceedings of the 2009 IEEE international conference on Communications
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

When employing cryptographic tunnels such as the ones provided by Secure Shell (SSH) to protect their privacy on the Internet, users expect two forms of protection. First, they aim at preserving the privacy of their data. Second, they expect that their behavior, e.g., the type of applications they use, also remains private. In this paper we report on two statistical traffic analysis techniques that can be used to break the second type of protection when applied to SSH tunnels, at least under some restricting hypothesis. Experimental results show how current implementations of SSH can be susceptible to this type of analysis, and illustrate the effectiveness of our two classifiers both in terms of their capabilities in analyzing encrypted traffic and in terms of their relative computational complexity.