Network forensics of SSL/TLS encrypted channels

被引:0
|
作者
Wu, Meng-Da [1 ]
Wolthusen, Stephen [1 ]
机构
[1] Univ London, Royal Holloway, Informat Secur Grp, London WC1E 7HU, England
关键词
SSL/TLS; network forensics; traffic classification; sequence alignment;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Network forensics is increasingly hampered by the ubiquitous use of encrypted channels by legitimate and illegitimate network traffic. Both types of traffic are frequently tunneled over application-layer encryption mechanisms, generally using the ubiquitous TLS (SSL) protocol. This results in traditional network forensics tools being largely limited to recording external characteristics (source and origin addresses and ports, time and traffic patterns), but with little insight into content and purpose of the traffic. We propose that a precise characterization of encrypted traffic not only in the form of the external characteristics but also through the analysis of the exact mechanisms, variants and options used for the encrypted channel but visible without access to key material along with a fine-grained analysis of the traffic patterns itself incorporating domain knowledge of the SSL/TLS protocol can yield valuable insights and help to classify traffic into legitimate traffic, illegitimate immediate traffic (e.g. as caused by a Trojan). It can also characterize traffic that is added to an existing data stream by an illegitimate source. In this paper, we therefore present and characterize different traffic types and subsequently analyze this traffic, including the SSL/TLS protocol data units using selected sequence mining techniques.
引用
收藏
页码:303 / 312
页数:10
相关论文
共 50 条
  • [21] MitM Tool Analysis for TLS Forensics
    Kim, Minju
    Shin, Yeonghun
    Shon, Taeshik
    [J]. 2021 INTERNATIONAL CONFERENCE ON PLATFORM TECHNOLOGY AND SERVICE (PLATCON), 2021, : 39 - 42
  • [22] TLS/SSL漏洞分析与检测
    张博
    [J]. 河南科技, 2020, 39 (26) : 23 - 25
  • [23] Authentication Binding between SSL/TLS and HTTP
    Saito, Takamichi
    Sekiguchi, Kiyomi
    Hatsugai, Ryosuke
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2012, E95D (03) : 797 - 803
  • [24] New key management protocol for SSL/TLS
    Hajjeh, I
    Serhrouchni, A
    Tastet, F
    [J]. NETWORK CONTROL AND ENGINEERING FOR QOS, SECURITY AND MOBILITY II, 2003, 133 : 251 - 262
  • [25] The Threat of SSL/TLS Stripping to Online Voting
    Cardillo, Anthony
    Essex, Aleksander
    [J]. ELECTRONIC VOTING, 2018, 11143 : 35 - 50
  • [26] 用OpenSSL进行TLS/SSL编程
    范恒英
    何大可
    [J]. 通信技术, 2002, (06) : 82 - 85
  • [27] Implementation of a Security Layer for the SSL/TLS Protocol
    Ordean, Mihai
    Giurgiu, Mircea
    [J]. 2010 9TH INTERNATIONAL SYMPOSIUM ON ELECTRONICS AND TELECOMMUNICATIONS (ISETC), 2010, : 209 - 212
  • [28] SSL/TLS protocol enablement for key recovery
    Shoriak, TG
    [J]. COMPUTERS & SECURITY, 2000, 19 (01) : 100 - 104
  • [29] 针对SSL/TLS的典型攻击
    张明
    许博义
    郭艳来
    [J]. 计算机科学, 2015, 42(S1) (S1) : 408 - 412
  • [30] Safe and Secure Communication Using SSL/TLS
    Kumar, Darapureddy Devendra
    Mukharzee, Jerripothula Desai
    Reddy, Chirla Vijay Durga
    Rajagopal, Shinu M.
    [J]. 2024 International Conference on Emerging Smart Computing and Informatics, ESCI 2024, 2024,