Detecting TCP Flows Inside EcryptedVPN Tunnels
2019 (Engelska) Självständigt arbete på avancerad nivå (masterexamen), 300 hp
Studentuppsats (Examensarbete)
Abstract [en]
Encrypted tunnels have made analyzing Internet traffic harder, when a virtual private network is used the flows become intertwined and thus lose their unique characteristics. These characteristics which are analyzed by network middleboxes for, among other things security and quality-of-service purposes. Using a real-world dataset, this project investigates if packet size and inter-arrival time for the three-way handshake packets can be used to detect the beginning of TCP flows inside encrypted tunnels. Three classification methods were tested, the first using packet size values for detection, the second used correlation data between packet sizes for each three-way handshake packet and the last method used correlation data between packet sizes and inter-arrival times for each three-way handshake packet. The best results were obtained when with the first and last of these methods, with a specific set of parameters.
Ort, förlag, år, upplaga, sidor 2019. , s. 99
Nyckelord [en]
Encrypted Tunnels, Flow start, TCP, VPN, Flow separation
Nationell ämneskategori
Datavetenskap (datalogi)
Identifikatorer URN: urn:nbn:se:kau:diva-71415 OAI: oai:DiVA.org:kau-71415 DiVA, id: diva2:1293112
Externt samarbete
Sandvine Sweden AB
Utbildningsprogram Civilingenjör: Datateknik (300 hp)
Presentation
2019-01-18, 10:00 (Engelska)
Handledare
Examinatorer
Projekt HITS, 4707 2019-03-122019-03-032019-11-12 Bibliografiskt granskad