Design and Implementation of On-Line Identification Algorithms for Encrypted Network Streams

碩士 === 國立臺灣海洋大學 === 資訊工程學系 === 98 === As the realization of security and privacy issues on data network access, modern network protocols tend to adopt cryptographic technologies on data exchanging. Therefore, people who do not know the secret keys are not able to extract readable information from en...

Full description

Bibliographic Details
Main Authors: Pai-Tsung Chang, 張百宗
Other Authors: Chun-Ying Huang
Format: Others
Language:zh-TW
Published: 2010
Online Access:http://ndltd.ncl.edu.tw/handle/04048135192249980058
id ndltd-TW-098NTOU5394035
record_format oai_dc
spelling ndltd-TW-098NTOU53940352015-10-13T19:35:33Z http://ndltd.ncl.edu.tw/handle/04048135192249980058 Design and Implementation of On-Line Identification Algorithms for Encrypted Network Streams 即時辨識網路加密串流之演算法設計與實作 Pai-Tsung Chang 張百宗 碩士 國立臺灣海洋大學 資訊工程學系 98 As the realization of security and privacy issues on data network access, modern network protocols tend to adopt cryptographic technologies on data exchanging. Therefore, people who do not know the secret keys are not able to extract readable information from encrypted data stream. However, in addition to benefit brought by data encryption, encrypted streams also introduce difficulties for network management. An ISP who controls peer-to-peer bandwidth usage based on payload identification may be failed due to E-mails based on context may be also failed due to encryption of mail message. Hence, identifying and clustering encrypted network streams is relatively important with which data encryption technologies may be used as tools to penetrate security and access control policies. In this thesis, we research, evaluate, and design generic algorithms to identify encrypted network data streams. First, we pick proper algorithms that are able to measure the randomness of byte streams. Based on these algorithms, we design methods to identify unencrypted data, encrypted data, and encrypted and then encoded data. The proposed solution is evaluated by detecting encrypted data streams from both self-generated and campus network traces. The results show that the proposed solution achieves a high detection rate and low error rates for both regular encrypted data and encoded encrypted data. Chun-Ying Huang 黃俊穎 2010 學位論文 ; thesis 45 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立臺灣海洋大學 === 資訊工程學系 === 98 === As the realization of security and privacy issues on data network access, modern network protocols tend to adopt cryptographic technologies on data exchanging. Therefore, people who do not know the secret keys are not able to extract readable information from encrypted data stream. However, in addition to benefit brought by data encryption, encrypted streams also introduce difficulties for network management. An ISP who controls peer-to-peer bandwidth usage based on payload identification may be failed due to E-mails based on context may be also failed due to encryption of mail message. Hence, identifying and clustering encrypted network streams is relatively important with which data encryption technologies may be used as tools to penetrate security and access control policies. In this thesis, we research, evaluate, and design generic algorithms to identify encrypted network data streams. First, we pick proper algorithms that are able to measure the randomness of byte streams. Based on these algorithms, we design methods to identify unencrypted data, encrypted data, and encrypted and then encoded data. The proposed solution is evaluated by detecting encrypted data streams from both self-generated and campus network traces. The results show that the proposed solution achieves a high detection rate and low error rates for both regular encrypted data and encoded encrypted data.
author2 Chun-Ying Huang
author_facet Chun-Ying Huang
Pai-Tsung Chang
張百宗
author Pai-Tsung Chang
張百宗
spellingShingle Pai-Tsung Chang
張百宗
Design and Implementation of On-Line Identification Algorithms for Encrypted Network Streams
author_sort Pai-Tsung Chang
title Design and Implementation of On-Line Identification Algorithms for Encrypted Network Streams
title_short Design and Implementation of On-Line Identification Algorithms for Encrypted Network Streams
title_full Design and Implementation of On-Line Identification Algorithms for Encrypted Network Streams
title_fullStr Design and Implementation of On-Line Identification Algorithms for Encrypted Network Streams
title_full_unstemmed Design and Implementation of On-Line Identification Algorithms for Encrypted Network Streams
title_sort design and implementation of on-line identification algorithms for encrypted network streams
publishDate 2010
url http://ndltd.ncl.edu.tw/handle/04048135192249980058
work_keys_str_mv AT paitsungchang designandimplementationofonlineidentificationalgorithmsforencryptednetworkstreams
AT zhāngbǎizōng designandimplementationofonlineidentificationalgorithmsforencryptednetworkstreams
AT paitsungchang jíshíbiànshíwǎnglùjiāmìchuànliúzhīyǎnsuànfǎshèjìyǔshízuò
AT zhāngbǎizōng jíshíbiànshíwǎnglùjiāmìchuànliúzhīyǎnsuànfǎshèjìyǔshízuò
_version_ 1718042808495898624