DocumentCode
1619062
Title
Detection of Encrypted Tunnels Across Network Boundaries
Author
Dusi, Maurizio ; Crotti, Manuel ; Gringoli, Francesco ; Salgarelli, Luca
Author_Institution
DEA, Univ. degli Studi di Brescia, Brescia
fYear
2008
Firstpage
1738
Lastpage
1744
Abstract
The use of covert application-layer tunnels to bypass security gateways has become quite popular in recent years. By encapsulating blocked or controlled protocols such as peer- to-peer, chat and e-mail into others allowed by the security policies, such as HTTP, SSH or even DNS, both legitimate and malicious users can effectively neutralize many security restrictions enforced at the network edge. Traditional firewalling techniques, based on Application Layer Gateways and even pattern-matching mechanisms are becoming practically useless as tunneling tools grow more sophisticated. In this paper we propose an effective solution to this problem based on a statistical traffic classification technique. Our mechanism relies on the creation of a statistical fingerprint of legitimate usage of a given protocol, such as regular remote interactive logins or secure copying activities. Such fingerprint can then be used to detect with high accuracy non-legitimate sessions, i.e., sessions that tunnel other protocols. Results from experiments conducted on a live network suggest that the technique can be very effective, even when the application layer protocol used as a tunnel is encrypted, such as in the case of SSH.
Keywords
cryptography; protocols; telecommunication traffic; encrypted tunnels; fingerprint; network boundaries; statistical fingerprint; statistical traffic classification technique; Communication system traffic control; Cryptography; Electronic mail; Fingerprint recognition; Information security; Local area networks; Protection; Protocols; Telecommunication traffic; Tunneling;
fLanguage
English
Publisher
ieee
Conference_Titel
Communications, 2008. ICC '08. IEEE International Conference on
Conference_Location
Beijing
Print_ISBN
978-1-4244-2075-9
Electronic_ISBN
978-1-4244-2075-9
Type
conf
DOI
10.1109/ICC.2008.334
Filename
4533370
Link To Document