Detecting policy violations through traffic analysis

被引:1
|
作者
Horton, Jeffrey [1 ]
Safavi-Naini, Rei [1 ]
机构
[1] Univ Wollongong, Ctr Informat Secur, Northfields Ave, Wollongong, NSW 2500, Australia
关键词
D O I
10.1109/ACSAC.2006.24
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Restrictions are commonly placed on the permitted uses of network protocols in the interests of security. These restrictions can sometimes be difficult to enforce. As an example, a permitted protocol can be used as a carrier for another protocol not otherwise permitted However if the observable behaviour of the protocol exhibits differences between permitted and non-permitted uses, it is possible to detect inappropriate use. We consider SSH, the Secure Shell protocol. This is an encrypted protocol with several uses. We attempt firstly to classify SSH sessions according to some different types of traffic for which the sessions have been used, and secondly, given a policy that permits SSH use for interactive traffic, to identify when a session appears to have been used for some other purpose.
引用
收藏
页码:109 / +
页数:3
相关论文
共 50 条
  • [1] Traffic violations analysis: Identifying risky areas and common violations
    Laoula, El Mehdi Ben
    Elfahim, Omar
    El Midaoui, Marouane
    Youssfi, Mohamed
    Bouattane, Omar
    [J]. HELIYON, 2023, 9 (09)
  • [2] Detecting, Tracking and Counting Motorcycle Rider Traffic Violations on Unconstrained Roads
    Goyal, Aman
    Agarwal, Dev
    Subramanian, Anbumani
    Jawahar, C., V
    Sarvadevabhatla, Ravi Kiran
    Saluja, Rohit
    [J]. 2022 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS, CVPRW 2022, 2022, : 4302 - 4311
  • [3] Algorithm for detecting violations of traffic rules based on computer vision approaches
    Ibadov, Samir
    Ibadov, Ragim
    Kalmukov, Boris
    Krutov, Vladimir
    [J]. XIII INTERNATIONAL SCIENTIFIC-TECHNICAL CONFERENCE DYNAMIC OF TECHNICAL SYSTEMS (DTS-2017), 2017, 132
  • [4] 'TRAFFIC VIOLATIONS'
    PIETRI, PJ
    [J]. AMERICAN POETRY REVIEW, 1978, 7 (04): : 21 - 21
  • [5] Toward a Framework for Detecting Privacy Policy Violations in Android Application Code
    Slavin, Rocky
    Wang, Xiaoyin
    Hosseini, Mitra Bokaei
    Hester, James
    Krishnan, Ram
    Bhatia, Jaspreet
    Breaux, Travis D.
    Niu, Jianwei
    [J]. 2016 IEEE/ACM 38TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), 2016, : 25 - 36
  • [6] Detecting Network Neutrality Violations through Packet Loss Statistics
    Ramneek
    Hosein, Patrick
    Choi, Wonjun
    Seok, Woojin
    [J]. 2015 17TH ASIA-PACIFIC NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM APNOMS, 2015, : 404 - 407
  • [7] Detecting traffic anomalies through aggregate analysis of packet header data
    Kim, SS
    Reddy, ALN
    Vannucci, M
    [J]. NETWORKING 2004: NETWORKING TECHNOLOGIES, SERVICES, AND PROTOCOLS; PERFORMANCE OF COMPUTER AND COMMUNICATION NETWORKS; MOBILE AND WIRELESS COMMUNICATIONS, 2004, 3042 : 1047 - 1059
  • [8] Detecting Privacy Leakage of Smart Home Devices through Traffic Analysis
    Yang, Ting
    Zhang, Guanghua
    Li, Yin
    Yang, Yiyu
    Wang, He
    Zhang, Yuqing
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [9] Analysis of the demand for an electronic advise of traffic code violations
    Carrese, Stefano
    Nigro, Marialisa
    Patella, Sergio Maria
    [J]. 2015 INTERNATIONAL CONFERENCE ON MODELS AND TECHNOLOGIES FOR INTELLIGENT TRANSPORTATION SYSTEMS (MT-ITS), 2015, : 402 - 407
  • [10] Policy implications of technology for detecting P2P and copyright violations
    Peha, Jon M.
    Mateus, Alexandre M.
    [J]. TELECOMMUNICATIONS POLICY, 2014, 38 (01) : 66 - 85