• DocumentCode
    1619062
  • Title

    Detection of Encrypted Tunnels Across Network Boundaries

  • Author

    Dusi, Maurizio ; Crotti, Manuel ; Gringoli, Francesco ; Salgarelli, Luca

  • Author_Institution
    DEA, Univ. degli Studi di Brescia, Brescia
  • fYear
    2008
  • Firstpage
    1738
  • Lastpage
    1744
  • Abstract
    The use of covert application-layer tunnels to bypass security gateways has become quite popular in recent years. By encapsulating blocked or controlled protocols such as peer- to-peer, chat and e-mail into others allowed by the security policies, such as HTTP, SSH or even DNS, both legitimate and malicious users can effectively neutralize many security restrictions enforced at the network edge. Traditional firewalling techniques, based on Application Layer Gateways and even pattern-matching mechanisms are becoming practically useless as tunneling tools grow more sophisticated. In this paper we propose an effective solution to this problem based on a statistical traffic classification technique. Our mechanism relies on the creation of a statistical fingerprint of legitimate usage of a given protocol, such as regular remote interactive logins or secure copying activities. Such fingerprint can then be used to detect with high accuracy non-legitimate sessions, i.e., sessions that tunnel other protocols. Results from experiments conducted on a live network suggest that the technique can be very effective, even when the application layer protocol used as a tunnel is encrypted, such as in the case of SSH.
  • Keywords
    cryptography; protocols; telecommunication traffic; encrypted tunnels; fingerprint; network boundaries; statistical fingerprint; statistical traffic classification technique; Communication system traffic control; Cryptography; Electronic mail; Fingerprint recognition; Information security; Local area networks; Protection; Protocols; Telecommunication traffic; Tunneling;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Communications, 2008. ICC '08. IEEE International Conference on
  • Conference_Location
    Beijing
  • Print_ISBN
    978-1-4244-2075-9
  • Electronic_ISBN
    978-1-4244-2075-9
  • Type

    conf

  • DOI
    10.1109/ICC.2008.334
  • Filename
    4533370