Statistical identification of encrypted web browsing traffic

被引:166
|
作者
Sun, QX [1 ]
Simon, DR [1 ]
Wang, YM [1 ]
Russell, W [1 ]
Padmanabhan, VN [1 ]
Qiu, L [1 ]
机构
[1] Stanford Univ, Dept Comp Sci, Stanford, CA 94305 USA
关键词
D O I
10.1109/SECPRI.2002.1004359
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Encryption is often Proposed as a tool for protecting the privacy of World Wide Web browsing. However, encryption-particularly as typically implemented in, or in concert with popular Web browsers-does not hide all information about the encrypted plaintext. Specifically, HTTP object count and sizes are often revealed (or at least incompletely concealed). We investigate the identifiability of World Wide Web traffic based on this unconcealed information in a large sample of Web pages, and show that it suffices to identify a significant fraction of them quite reliably. We also suggest some possible countermeasures against the exposure of this kind of information and experimentally evaluate their effectiveness.
引用
收藏
页码:19 / 30
页数:12
相关论文
共 50 条
  • [31] Device Behavior Identification in Encrypted Home Security Camera Traffic
    Liu, Shuhe
    Xu, Xiaolin
    Nan, Zhefeng
    [J]. 2022 IEEE 34TH INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE, ICTAI, 2022, : 881 - 885
  • [32] Mobile app identification for encrypted network flows by traffic correlation
    He, Gaofeng
    Xu, Bingfeng
    Zhang, Lu
    Zhu, Haiting
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2018, 14 (12):
  • [33] Identification of VoIP encrypted traffic using a machine learning approach
    Alshammari, Riyad
    Zincir-Heywood, A. Nur
    [J]. JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2015, 27 (01) : 77 - 92
  • [34] FlowPic: A Generic Representation for Encrypted Traffic Classification and Applications Identification
    Shapira, Tal
    Shavitt, Yuval
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2021, 18 (02): : 1218 - 1232
  • [35] Learning from Imbalanced Data for Encrypted Traffic Identification Problem
    Ly Vu
    Dong Van Tra
    Quang Uy Nguyen
    [J]. PROCEEDINGS OF THE SEVENTH SYMPOSIUM ON INFORMATION AND COMMUNICATION TECHNOLOGY (SOICT 2016), 2016, : 147 - 152
  • [36] Identification method of encrypted traffic based on support vector machine
    Cheng, Guang
    Chen, Yuxiang
    [J]. Dongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Southeast University (Natural Science Edition), 2017, 47 (04): : 655 - 659
  • [37] A Hybrid Method for Service Identification of SSL/TLS Encrypted Traffic
    Ding, Rusheng
    Li, Wenmin
    [J]. 2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2016, : 250 - 253
  • [38] Protocol-independent Identification of Encrypted Video Traffic Sources Using Traffic Analysis
    Shi, Yan
    Biswas, Subir
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016,
  • [39] On managing uplink videophone and web browsing traffic in UTRA W-CDMA
    Pérez-Romero, J
    Sallent, O
    García, N
    Agustí, R
    [J]. PIMRC 2003: 14TH IEEE 2003 INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS PROCEEDINGS, VOLS 1-3 2003, 2003, : 1166 - 1170
  • [40] Predicted Packet Padding for Anonymous Web Browsing Against Traffic Analysis Attacks
    Yu, Shui
    Zhao, Guofeng
    Dou, Wanchun
    James, Simon
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (04) : 1381 - 1393