Preventing SSL Traffic Analysis with Realistic Cover Traffic

نویسنده

  • Nikita Borisov
چکیده

As more sensitive information is transmitted over computer networks, there has been a steady increase in the deployment of encryption to protect data in-flight. Myriad encrypted network protocols have emerged [8, 2, 1] that enable various applications like encrypted browsing, VPNs, secure shells, and VoIP. Since the data payload of an encrypted protocol is protected by strong encryption, attackers can do traffic analysis attacks, which use the information leaked by side channels (e.g., packet size and timing) to try to recover the contents or intent of the plaintext traffic. Existing attacks can recover a wide range of information from encrypted communications, e.g., Web page visits [3, 6], typed passwords [7, 9], speech data [14, 13], and embedded protocols [15, 4]. Given this threat, a growing number of applications (e.g., low-latency anonymity systems and VPNs) and users (e.g., privacy advocates and whistle-blowers), need better protection from these attacks. Existing techniques for preventing traffic analysis center on sending data with fixed intervals and/or with fixed payload sizes. Though this type of constant rate defense is effective at reducing the information leakage that enables most traffic analysis attacks, it makes it clear that a user is employing countermeasures to evade traffic analysis. This may, in itself, result in unwanted attention and scrutiny. We call this related attack defense detection. To resist both traffic analysis and defense detection attacks, we propose using realistic cover traffic tunnels to mask the observable behavior of the real traffic to be transmitted. The user tunnels his or her real traffic via a proxy service, which embeds the traffic inside fake cover traffic. This tunneling approach incurs overhead in time and in the number of excess bytes transmitted. To trade off overhead and privacy, the user may vary his or her choice of cover traffic model. In this paper, we introduce the basic design and evaluation of a cover traffic tunneling system called TrafficMimic. We utilize methods for generating realistic cover traffic, borrowing from prior work on traffic generation from the simulation and modeling research community [10]. Using several protocol classification and anomaly detection attacks, we show that TrafficMimic is able to reproduce cover traffic reliably and securely. Lastly, we show that realistic cover traffic provides comparable performance to constant-rate techniques, and in some cases can be very efficient.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

HTTPS traffic analysis and client identification using passive SSL/TLS fingerprinting

The encryption of network traffic complicates legitimate network monitoring, traffic analysis, and network forensics. In this paper, we present real-time lightweight identification of HTTPS clients based on network monitoring and SSL/TLS fingerprinting. Our experiment shows that it is possible to estimate the User-Agent of a client in HTTPS communication via the analysis of the SSL/TLS handshak...

متن کامل

Network Forensics of SSL/TLS Encrypted Channels

Network forensics is increasingly hampered by the ubiquitous use of encrypted channels by legitimate and illegitimate network traffic. Both types of traffic are frequently tunneled over application-layer encryption mechanisms, generally using the ubiquitous TLS (SSL) protocol. This results in traditional network forensics tools being largely limited to recording external characteristics (source...

متن کامل

Power-Aware Traffic Cover Mode to Prevent Traffic Analysis in Wireless Ad Hoc Networks

Traffic analysis poses a serious threat to communication security, especially in wireless networks. Encryption may be used to hide message contents, whereas traffic padding may be used to hide the traffic pattern. This paper deals with the issue of preventing traffic analysis by inserting dummy (or padding) traffic to hide the real traffic pattern. The observable traffic pattern, after dummy tr...

متن کامل

An analysis of the statistical disclosure attack and receiver-bound cover

Anonymous communications provides an important privacy service by keeping passive eavesdroppers from linking communicating parties. However, an attacker can use long-term statistical analysis of traffic sent to and from such a system to link senders with their receivers. Cover traffic is an effective, but somewhat limited, counter strategy against this attack. Earlier work in this area proposes...

متن کامل

Experiences of Encountering Physical Trauma Caused by Traffic Accidents: A Qualitative Study

Background: Traffic accidents are the main cause of death and disability in the world and Iran. The Injuries caused by traffic accidents may result in severe limitations and worst outcomes in various aspects of lives of traffic accident injured people and their families. Therefore, understanding their experiences is very important to design better programs with regard to their treatment and ret...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009