(3.238.96.184) 您好!臺灣時間:2021/05/10 10:30
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

: 
twitterline
研究生:張百宗
研究生(外文):Pai-Tsung Chang
論文名稱:即時辨識網路加密串流之演算法設計與實作
論文名稱(外文):Design and Implementation of On-Line Identification Algorithms for Encrypted Network Streams
指導教授:黃俊穎黃俊穎引用關係
指導教授(外文):Chun-Ying Huang
學位類別:碩士
校院名稱:國立臺灣海洋大學
系所名稱:資訊工程學系
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2010
畢業學年度:98
語文別:中文
論文頁數:45
中文關鍵詞:加密流量
外文關鍵詞:encrypted traffic
相關次數:
  • 被引用被引用:0
  • 點閱點閱:179
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:35
  • 收藏至我的研究室書目清單書目收藏:0
隨著人們對安全和隱私權議題的認知,愈來愈多網路協定在進行資料交換時,都採用了密碼學的技術。如此一來,不知道密鑰的人們就沒辦法從這些經過加密的資料中,取出可讀的資訊。加密雖然帶來了不少好處,但它也相對的在網路的管理上帶來了新的困難。比如說,想要透過檢查封包內容對同儕式網路檔案分享流量進行限制的ISP業者,可能因為這類協定使用加密技術而失敗;而想要透過檢查Email內容防止資訊外流的企業網路管理人員,也可能因為信件內容加密而無法進行查核。有鑑於資料加密技術可能被使用為穿透安全和存取控管政策的工具,對於有加密的網路流量進行識別和分群,就顯得有其意義和價值。
在本論文中,我們研究、評估和設計可以用來辨別出加密網路資料流的通用演算法。我們先找出了幾種可以用來測試偽隨機亂數的演算法,基於這些方法,我們針對未加密資料、一般加密資料以及經過編碼過後的加密資料設計不同的機制加以識別。透過自行產生的流量以及搜集校園網路的流量,我們測試並評估本機制的效果。實驗結果顯示我們所提出的方法在進行加密的資料流的判定,不論是一般加密資料或是經過編碼的加密資料,皆能有高正確率以及低錯誤率的表現。

As the realization of security and privacy issues on data network access, modern network protocols tend to adopt cryptographic technologies on data exchanging. Therefore, people who do not know the secret keys are not able to extract readable information from encrypted data stream. However, in addition to benefit brought by data encryption, encrypted streams also introduce difficulties for network management. An ISP who controls peer-to-peer bandwidth usage based on payload identification may be failed due to E-mails based on context may be also failed due to encryption of mail message. Hence, identifying and clustering encrypted network streams is relatively important with which data encryption technologies may be used as tools to penetrate security and access control policies.
In this thesis, we research, evaluate, and design generic algorithms to identify encrypted network data streams. First, we pick proper algorithms that are able to measure the randomness of byte streams. Based on these algorithms, we design methods to identify unencrypted data, encrypted data, and encrypted and then encoded data. The proposed solution is evaluated by detecting encrypted data streams from both self-generated and campus network traces. The results show that the proposed solution achieves a high detection rate and low error rates for both regular encrypted data and encoded encrypted data.

摘要
Abstract
目錄
圖目錄
表目錄
第一章、 緒論
第一節、 研究背景
第二節、 研究動機與目的
第三節、 論文架構
第二章、 相關研究
第三章、 系統架構與設計方法
第一節、 系統架構
第二節、 SSH的介紹
第三節、 HTTPS的介紹
第四節、 描述測試亂數方法
第五節、 辨別加密的方法
第四章、 實驗方法與結果
第一節、 實驗方法
第二節、 實驗結果
第五章、 結論及未來發展方向
第六章、 參考文獻
附錄

[1] http://www.iana.org/assignments/port-numbers
[2] K. Gummadi, R. Dunn, S. Saroiu, S. Gribble, H. Levy, and J. Zahorjan. Measurement, modeling, and analysis of a peer-to-peer file-sharing workload. ACM SIGOPS Operating Systems Review, 37(5):314–329, 2003.
[3] Zhang Y., Paxson V., Detecting back doors, Proceedings of the 9th USENIX Security Symposium, pp. 157-170, 2000.
[4] S. Sen and J. Wang. Analyzing peer-to-peer traffic across large networks. In Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment, pages 137–150, 2002.
[5] Moore A. W., Zuev D., Internet Traffic Classification Using Bayesian Analysis Techniques, Proceedings of the ACM SIGMETRICS, pp 50-60, 2005.
[6] S. Sen, O. Spatscheck, and D. Wang. Accurate, scalable innetwork identification of p2p traffic using application signatures. In Proceedings of the 13th international conference on World Wide Web, pages 512–521, 2004.
[7] L. Bernaille, R. Teixeira, and K. Salamatian. Early application identification. In Proceedings of the 2006 ACM Conference on Emerging Network Experiment and Technology (CoNEXT’06), 2006.
[8] Moore A., Papagiannaki K., Toward the Accurate Identification of Network Applications, Proceedings of the Passive & Active Measurement Workshop, 2005.
[9] L. Bernaille and R. Teixeira. Early recognition of encrypted applications. In Proceedings of the 8th Internatinoal Conference on Passive and Active Network Measurement, pages 165–175, 2007.
[10] M. Crotti and F. Gringoli. Traffic classification through simple statistical fingerprinting. ACM SIGCOMM Computer Communication Review, 37(1):5–16, 2007.
[11] Haffner P., Sen S., Spatscheck O., Wang D., ACAS: Automated Construction of Application Signatures, Proceedings of the ACM SIGCOMM, pp.197-202, 2005.
[12] Karagiannis, T., Papagiannaki, K., and Faloutsos, M, BLINC: Multilevel Traffic Classification in the Dark, Proceedings of Applications, Technologies, Architectures, and Protocols For Computer Communications pp 229-240, 2005.
[13] Wright C., Monrose F., Masson G. M., HMM Profiles for Network Traffic Classification, Proceedings of the ACM DMSEC, pp 9-15, 2004.
[14] Wright C. V., Monrose F., Masson G. M., On Inferring Application Protocol Behaviors in Encrypted Network Traffic, Journal of Machine Learning Research, (7), pp. 2745-2769, 2006.
[15] Williams N., Zander S., Armitage G., A Prelimenary Performance Comparison of Five Machine Learning Algorithms for Practical IP Traffic Flow Comparison, ACM SIGCOMM Computer Communication Review, Vol. 36, No. 5, pp. 5-16, 2006.
[16] Alshammari, Riyad; Nur Zincir-Heywood, A., A flow based approach for SSH traffic detection, Systems, Man and Cybernetics, 2007. ISIC. IEEE International Conference on , pp.296-301, 7-10 Oct, 2007.
[17] Montigny-Leboeuf A., Flow Attributes For Use In Traffic Characterization, Journal of CRC Technical Note No. CRCTN-2005-003, Ottawa, ON, Canada, 2005.
[18] L. Bernaille, I. Akodkenou, A. Soule, and K. Salamatian. Traffic classification on the fly. ACM SIGCOMM Computer Communication Review, 36(2):23–26, 2006.
[19] http://www.statsoft.com/textbook/distribution-tables/
[20] http://oak.cats.ohiou.edu/~shambora/Tables.pdf
[21] Simulation Modeling and Analysis, 3/e, Averill M. Law W. David Kelton
[22] http://www.wireshark.org/
[23] http://www.tcpdump.org/
[24] http://faculty.vassar.edu/lowry/ch8pt1.html
[25] http://www.fourmilab.ch/random/

連結至畢業學校之論文網頁點我開啟連結
註: 此連結為研究生畢業學校所提供,不一定有電子全文可供下載,若連結有誤,請點選上方之〝勘誤回報〞功能,我們會盡快修正,謝謝!
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
系統版面圖檔 系統版面圖檔