Design and Implementation of On-Line Identification Algorithms for Encrypted Network Streams
碩士 === 國立臺灣海洋大學 === 資訊工程學系 === 98 === As the realization of security and privacy issues on data network access, modern network protocols tend to adopt cryptographic technologies on data exchanging. Therefore, people who do not know the secret keys are not able to extract readable information from en...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2010
|
Online Access: | http://ndltd.ncl.edu.tw/handle/04048135192249980058 |
id |
ndltd-TW-098NTOU5394035 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-098NTOU53940352015-10-13T19:35:33Z http://ndltd.ncl.edu.tw/handle/04048135192249980058 Design and Implementation of On-Line Identification Algorithms for Encrypted Network Streams 即時辨識網路加密串流之演算法設計與實作 Pai-Tsung Chang 張百宗 碩士 國立臺灣海洋大學 資訊工程學系 98 As the realization of security and privacy issues on data network access, modern network protocols tend to adopt cryptographic technologies on data exchanging. Therefore, people who do not know the secret keys are not able to extract readable information from encrypted data stream. However, in addition to benefit brought by data encryption, encrypted streams also introduce difficulties for network management. An ISP who controls peer-to-peer bandwidth usage based on payload identification may be failed due to E-mails based on context may be also failed due to encryption of mail message. Hence, identifying and clustering encrypted network streams is relatively important with which data encryption technologies may be used as tools to penetrate security and access control policies. In this thesis, we research, evaluate, and design generic algorithms to identify encrypted network data streams. First, we pick proper algorithms that are able to measure the randomness of byte streams. Based on these algorithms, we design methods to identify unencrypted data, encrypted data, and encrypted and then encoded data. The proposed solution is evaluated by detecting encrypted data streams from both self-generated and campus network traces. The results show that the proposed solution achieves a high detection rate and low error rates for both regular encrypted data and encoded encrypted data. Chun-Ying Huang 黃俊穎 2010 學位論文 ; thesis 45 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立臺灣海洋大學 === 資訊工程學系 === 98 === As the realization of security and privacy issues on data network access, modern network protocols tend to adopt cryptographic technologies on data exchanging. Therefore, people who do not know the secret keys are not able to extract readable information from encrypted data stream. However, in addition to benefit brought by data encryption, encrypted streams also introduce difficulties for network management. An ISP who controls peer-to-peer bandwidth usage based on payload identification may be failed due to E-mails based on context may be also failed due to encryption of mail message. Hence, identifying and clustering encrypted network streams is relatively important with which data encryption technologies may be used as tools to penetrate security and access control policies.
In this thesis, we research, evaluate, and design generic algorithms to identify encrypted network data streams. First, we pick proper algorithms that are able to measure the randomness of byte streams. Based on these algorithms, we design methods to identify unencrypted data, encrypted data, and encrypted and then encoded data. The proposed solution is evaluated by detecting encrypted data streams from both self-generated and campus network traces. The results show that the proposed solution achieves a high detection rate and low error rates for both regular encrypted data and encoded encrypted data.
|
author2 |
Chun-Ying Huang |
author_facet |
Chun-Ying Huang Pai-Tsung Chang 張百宗 |
author |
Pai-Tsung Chang 張百宗 |
spellingShingle |
Pai-Tsung Chang 張百宗 Design and Implementation of On-Line Identification Algorithms for Encrypted Network Streams |
author_sort |
Pai-Tsung Chang |
title |
Design and Implementation of On-Line Identification Algorithms for Encrypted Network Streams |
title_short |
Design and Implementation of On-Line Identification Algorithms for Encrypted Network Streams |
title_full |
Design and Implementation of On-Line Identification Algorithms for Encrypted Network Streams |
title_fullStr |
Design and Implementation of On-Line Identification Algorithms for Encrypted Network Streams |
title_full_unstemmed |
Design and Implementation of On-Line Identification Algorithms for Encrypted Network Streams |
title_sort |
design and implementation of on-line identification algorithms for encrypted network streams |
publishDate |
2010 |
url |
http://ndltd.ncl.edu.tw/handle/04048135192249980058 |
work_keys_str_mv |
AT paitsungchang designandimplementationofonlineidentificationalgorithmsforencryptednetworkstreams AT zhāngbǎizōng designandimplementationofonlineidentificationalgorithmsforencryptednetworkstreams AT paitsungchang jíshíbiànshíwǎnglùjiāmìchuànliúzhīyǎnsuànfǎshèjìyǔshízuò AT zhāngbǎizōng jíshíbiànshíwǎnglùjiāmìchuànliúzhīyǎnsuànfǎshèjìyǔshízuò |
_version_ |
1718042808495898624 |