DocumentCode :
2149042
Title :
User identification in encrypted network communications
Author :
Koch, Robert ; Rodosek, Gabi Dreo
Author_Institution :
Inst. fur Tech. Inf. (ITI), Univ. der Bundeswehr, München, Germany
fYear :
2010
fDate :
25-29 Oct. 2010
Firstpage :
246
Lastpage :
249
Abstract :
Encrypting network traffic is a normal procedure to protect information for exchange. This prevents tapping and manipulation but it also hampers intrusion as well as data leakage and misuse detection. Obtaining knowledge about users of encrypted communications is, however, beneficial in terms of monitoring access, security and accounting reasons. Thus, the objective is to provide evidence of the source of actions, especially to detect insiders and illegal connections, without the necessity of decrypting the network traffic. We propose a novel architecture to identify users of encrypted traffic in a network environment of a company. It is based on statistical evaluation of monitored network packets. The proposed approach utilizes and combines two main aspects, the mode of operation of remote sessions and the keystroke dynamics of users. Aspects such as capturing and clustering network traffic, generating user profiles and patterns, and statistical analysis are part of the architecture.
Keywords :
cryptography; statistical analysis; telecommunication traffic; encrypted network communication; encrypted traffic; keystroke dynamics; monitored network packet; network environment; network traffic clustering; network traffic encryption; statistical analysis; statistical evaluation; user identification; user profiles; Correlation; Cryptography; Delay; Intrusion detection; Protocols; Servers;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Network and Service Management (CNSM), 2010 International Conference on
Conference_Location :
Niagara Falls, ON
Print_ISBN :
978-1-4244-8910-7
Electronic_ISBN :
978-1-4244-8908-4
Type :
conf
DOI :
10.1109/CNSM.2010.5691292
Filename :
5691292
Link To Document :
بازگشت