EconPapers    
Economics at your fingertips  
 

Network traffic identification of several open source secure proxy protocols

Yidan Zhang, Jiageng Chen, Kaiming Chen, Ruoyan Xu, Jesen Teh and Shuai Zhang

International Journal of Network Management, 2021, vol. 31, issue 2

Abstract: Secure proxy technique has a wide range of applications especially in the area of VPN to protect the private communication from being surveilled. However, the adversaries may also take advantage of the VPN services for other purposes. Thus, knowing the characteristics of the corresponding security protocols will benefit the administration to narrow down the targets. Also, given the various VPN services on the market, we also want to know whether there exists some security flaws from the cryptographic protocol's point of view, so that can be used to improve analyzing the protocol. In this paper, we first target several widely used open source secure proxy protocols and provide their weaknesses through the static analysis. Then we apply the deep learning technique to train all the related network traffic, and our results showed that all the secure proxy traffics can be successfully distinguished with high accuracy.

Date: 2021
References: View complete reference list from CitEc
Citations:

Downloads: (external link)
https://doi.org/10.1002/nem.2090

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:wly:intnem:v:31:y:2021:i:2:n:e2090

Access Statistics for this article

More articles in International Journal of Network Management from John Wiley & Sons
Bibliographic data for series maintained by Wiley Content Delivery ().

 
Page updated 2025-03-20
Handle: RePEc:wly:intnem:v:31:y:2021:i:2:n:e2090