期刊文献+

基于M-序列检验的加密流量识别 被引量:2

M-serial test based encrypted traffic identification
下载PDF
导出
摘要 为更好地进行网络管理和网络安全维护,通过研究加密流量的内容统计特征,提出基于M-序列检验的网络数据随机性评估算法(network data randomness estimation,NDRE)以识别加密流量。采用M-序列检验方法对序列随机性进行量化;根据负载序列长度,自适应训练得到最优化参数集;利用最小风险贝叶斯准则,对加密流量进行识别。实验结果表明,与基于熵的方法相比,在控制一定计算复杂度的情况下,NDRE精确度有较大提高。 To manage the network and maintain the network security, the study on identifying the network encrypted traffic was carried out and the M-serial test based network data randomness estimation algorithm (NDRE) was proposed by studying the content statistical characteristics. The M-serial test method was used to quantify the randomness of the sequence. The most optimized set of parameters was self-adaptively trained and obtained depending on the length of the payload sequence. The minimum risk Bayes was utilized to identify the encrypted traffic. Experimental results show that compared with the entropy-based me- thod, the precision of the NDRE is better when the computational complexity was controlled within a certain reasonable range.
作者 王炜 程东年
出处 《计算机工程与设计》 CSCD 北大核心 2014年第11期3712-3716,共5页 Computer Engineering and Design
基金 国家973重点基础研究发展计划基金项目(2012CB315901 2012CB315906) 国家863高技术研究发展计划基金项目(2011AA01A103)
关键词 加密流量 流量识别 M-序列检验 随机性 贝叶斯准则 encrypted traffic l traffic identificatiom M-serial test~ randomness l Bayes rule
  • 相关文献

参考文献11

  • 1范丽敏,冯登国,陈华.随机性检测参数选择研究[J].通信学报,2009,30(1):1-6. 被引量:7
  • 2Xue Y,Wang D,Zhang L.Traffic classification:Issues and challenges[J].Journal of Communications,2013,8(4):240-248.
  • 3Dainotti A,Pescape A,Claffy KC.Issues and future directions in traffic classification[J].Network,IEEE,2012,26(1):35-40.
  • 4Alshammari R,Zincir-Heywood AN.Can encrypted traffic be identified without port numbers,IP addresses and payload inspection?[J].Computer Networks,2011,55(6):1326-1350.
  • 5Bacquet C,Gumus K,Tizer D,et al.A comparison of unsupervised learning techniques for encrypted traffic identification[J].Journal of Information Assurance and Security,2010,5:464-472.
  • 6Bacquet C,Zincir-Heywood NA,Heywood MI.An analysis of clustering objectives for feature selection applied to encrypted traffic identification[C]//IEEE Congress on Evolutionary Computation.IEEE,2010:1-8.
  • 7Rossow C,Dietrich CJ.PROVEX:Detecting botnets with encrypted command and control channels[C]//DIMVA,2013.
  • 8Dorfinger P.Real-time detection of encrypted traffic based on entropy estimation[D].Austria:Salzburg University of Applied Sciences,2010.
  • 9Dorfinger P,Panholzer G,Trammell B,et al.Entropy-based traffic filtering to support real-time Skype detection[C]//Proceedings of the 6th International Wireless Communications and Mobile Computing Conference.ACM,2010:747-751.
  • 10Khakpour AR,Liu AX.High-speed flow nature identification[C]//29th IEEE International Conference on Distributed Computing Systems.IEEE,2009:510-517.

二级参考文献15

  • 1NEUMANN J. Various techniques used in connection with random digits[J]. National Bureau of Standards Applied Mathematics, 1951, (12): 36-38.
  • 2KNUYH D E. The Art of Computer Programming, Volume 2: Seminumerical Algorithms[M]. 3rd Ed, New Jersey : Addison- Wesley, 1981.59-73,
  • 3RUKHIN A, SOTO J, NECHVATAL J, et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications[R]. Technical Report, SP 800-22, 2001.
  • 4FILIOL E. A new statistical testing for symmetric ciphers and hash functions[A]. Information and Communications Security: 4th International Conference[C]. Berlin : Springer, 2002. 342-353.
  • 5TSANG W W, HUI L C K, CHOW K E Tuning the collision test for power[A]. Proceedings of the 27th Australasian conference on Computer Science - Volume 26 Dunedin[C]. New Zealand: Australian Computer Society, 2004.23-30.
  • 6HAMANO K, KANEKO T. Correction of overlapping template matching test included in nist randomness test suite[J]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2007,90(19): 1788-1792.
  • 7PARESCHI E ROVATTI R, SETTI G Second-level NIST randomness tests for improving test reliability[A]. International Symposium on Circuits and Systems (ISCAS 2007)[C]. New Orleans, Louisiana, USA, 2007.1437-1440.
  • 8Information Security Institute. CryptX statistical software package[EB/OL], http://www.isi.qut.edu.cu/resources/cryptx,1998
  • 9MARSAGLIA G . DIEHARD statistical tests[EB/OL], http://stat.fsu. edu/geo/diehard.html, 1995.
  • 10SOTO J. Statistical testing of random number generators[A]. The 22nd National Information Systems Security Conference[C]. Crystal City,Virginia, 1999.

共引文献8

同被引文献15

引证文献2

二级引证文献31

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部