期刊文献+

基于活跃节点库的以太坊加密流量识别方法 被引量:1

Recognition of ethereum encrypted traffic based on active node-base
下载PDF
导出
摘要 区块链的应用逐渐广泛,随着安全事件频发,对区块链网络的监管变得尤为重要,识别区块链流量是安全监管的第一步。作为具有代表性的区块链技术,以太坊采用私有RLPx协议对应用层内容进行了格式化和加密,导致传统的加密流量识别方法难以准确识别以太坊加密流量。在充分研究了RLPx协议后,文章设计了一种以以太坊节点活跃度为基础,结合以太坊流量高端口号、报文长度等特征的以太坊加密流量识别方法,在实验中达到了95%以上的以太坊加密TCP流量识别准确率。 With the application range of blockchain continues to expand,illegal incidents against the blockchain are becoming more frequent,the supervision of the blockchain becomes particularly important.And the recognition of blockchain traffic is the first step in blockchain supervision.As the representative of blockchain technology,ethereum uses private RLPx protocol to format and encrypt the application layer content,resulting in traditional encrypted traffic recognition method is difficult to accurately recognize ethereum encrypted traffic.After a full study of the RLPx protocol,we proposed an ethereum encrypted traffic recognition method based on ethereum active node-base,combined with features such as the high port number and the length of the packets,etc.And we have achieved more than 95%accuracy of Ethereum traffic recognition in the experiment.
作者 胡晓艳 童钟奇 吴桦 许昱玮 Hu Xiaoyan;Tong Zhongqi;Wu Hua;Xu Yuwei(School of Cyber Science and Engineering,Southeast University,Jiangsu Nanjing 211189;Key Laboratory of Computer Network and Information Integration(Southeast University),Ministry of Education,Jiangsu Nanjing 211189;Research Base of International Cyberspace Governance(Southeast University),Jiangsu Nanjing 211189;Purple Mountain Laboratories for Network and Communication Security,Jiangsu Nanjing 211111)
出处 《网络空间安全》 2020年第8期34-39,共6页 Cyberspace Security
基金 东南大学至善青年学者支持计划资助。
关键词 以太坊 RLPx加密协议 加密流量识别 区块链监管 ethereum RLPx protocol recognition of encrypted traffic supervision of blockchain
  • 相关文献

参考文献2

二级参考文献20

  • 1Alshammari R, Zincir-Heywood AN. A flow based approach for SSH traffic detection. In: Proc. of the IEEE Int'l Conf. on Systems, Man and Cybernetics (ISIC). 2007. 296-301. [doi: 10.1109/ICSMC.2007.4414006].
  • 2Yu Q, Huo HW. Algorithms improving the storage efficiency of deep packet inspection. Ruan Jian Xue Bao/Journal of Software, 2011,22(1):149-163 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/3724.htm [doi: 10.3724/SPJ.1001.2011. 03724].
  • 3Xu P, Lin S. Internet traffic classification using C4.5 decision tree. Ruan Jian Xue Bao/Journal of Software, 2009,20(10): 2692-2704 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/3444.htm [doi: 10.3724/SP.J.1001.2009.03444].
  • 4Alshammari R, Zincir-Heywood AN. Generalization of signatures for SSH encrypted traffic identification. In: Proc. of the Computational Intelligence in Cyber Security. 2009. 167-174. [doi: 10.1109/CICYBS.2009.4925105].
  • 5Bernaille L, Teixeira R, Akodkenou I, Soule A, Salamation K. Traffic classification on the fly. SIGCOMM Computer Communication Review, 2006,36(2):23-26. [doi: 10.1145/1129582.1129589].
  • 6Bernaille L, Teixeira R. Early recognition of encrypted applications. In: Proc. of the 8th Int'l Conf. on Passive and Active Network Measurement (PAM 2007). Louvain-Ia-Neuve, 2007. 165-175. [doi: 10.1007/978-3-540-71617-4_17].
  • 7Alshammari R, Zincir-Heywood AN. Investigating two different approaches for encrypted traffic classification. In: Proc. of the 2008 Sixth Annual Conf. on Privacy, Security and Trust. 2008. 156-166. [doi: 10.1109/PST.2008.15].
  • 8Haffner P, Sen S, Spats check 0, Wang DM. ACAS: Automated construction of application signatures. In: Proc. of the ACM SIGCOMM Workshop on Mining Network Data. 2005.197-202. [doi: 10.1145/1080173.1080183].
  • 9Baset SA, Schulzrinne HN. An analysis of the skype peer-to-peer Internet telephony protocol. In: Proc. of the IEEE Infocom 2006. 2006.1-11. [doi: 10.1109/INFOCOM.2006.312].
  • 10Lai XJ, Massey JL, Murphy S. Markov ciphers and differential cryptanalysis. In: Proc. of the Advances in Cryptology (EU ROCRYPT'91). Berlin: Springer-Verlag, 1991. 17-38. [doi: 10.1007/3-540-46416-6_2].

共引文献41

同被引文献6

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部