Network traffic identification of several open source secure proxy protocols
Yidan Zhang,
Jiageng Chen,
Kaiming Chen,
Ruoyan Xu,
Jesen Teh and
Shuai Zhang
International Journal of Network Management, 2021, vol. 31, issue 2
Abstract:
Secure proxy technique has a wide range of applications especially in the area of VPN to protect the private communication from being surveilled. However, the adversaries may also take advantage of the VPN services for other purposes. Thus, knowing the characteristics of the corresponding security protocols will benefit the administration to narrow down the targets. Also, given the various VPN services on the market, we also want to know whether there exists some security flaws from the cryptographic protocol's point of view, so that can be used to improve analyzing the protocol. In this paper, we first target several widely used open source secure proxy protocols and provide their weaknesses through the static analysis. Then we apply the deep learning technique to train all the related network traffic, and our results showed that all the secure proxy traffics can be successfully distinguished with high accuracy.
Date: 2021
References: View complete reference list from CitEc
Citations:
Downloads: (external link)
https://doi.org/10.1002/nem.2090
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:wly:intnem:v:31:y:2021:i:2:n:e2090
Access Statistics for this article
More articles in International Journal of Network Management from John Wiley & Sons
Bibliographic data for series maintained by Wiley Content Delivery ().