Research on Novel TLS Protocol Network Traffic Management and Monitoring Method

Yangyang Guan, Zhen Li, G. Xiong
{"title":"Research on Novel TLS Protocol Network Traffic Management and Monitoring Method","authors":"Yangyang Guan, Zhen Li, G. Xiong","doi":"10.1145/3558819.3558835","DOIUrl":null,"url":null,"abstract":"With the development of Internet technology, more and more websites use the novel TLS encryption technologies (such as TLS1.3, DOH, ESNI, etc.). The full encryption technology of network traffic brings great challenges to identify and prevent threats in encrypted traffic. In the face of new threat behavior, the traditional network management needs a long-term experimental process such as observation and analysis, feature extraction and online recognition. The whole process is time-consuming and labor-consuming. With the full encryption of the novel protocol, this confrontation will continue to escalate and unsustainable. This paper proposes a new idea of network management, which changes the traditional confrontation management into cooperation management, and can compromise privacy protection and network management. The main idea is to study the traffic management method combining \"endpoint\" and \"pipe\" and the novel protocol extension method. Securely transmit the secret key and data senseless decryption method through the hidden channel method to obtain the real URL access path of users. On this basis, this paper proposes and designs two traffic management methods: key acquisition and covert transmission method and TLS protocol upgrade implementation method. The first method requires the cooperation of the client. By studying the extension of the TLS protocol, we can decrypt the original traffic and realize network management; the second method requires the cooperation of the client and the server. By upgrading the handshake process and data of the TLS protocol transmission implementation, we can implement network management. On the network management side, it is necessary to decrypt and restore the network management packets, while the user request and response data cannot be decrypted. These two approaches are a novel solution idea under the popular application of novel protocols.","PeriodicalId":373484,"journal":{"name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","volume":"14 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3558819.3558835","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

With the development of Internet technology, more and more websites use the novel TLS encryption technologies (such as TLS1.3, DOH, ESNI, etc.). The full encryption technology of network traffic brings great challenges to identify and prevent threats in encrypted traffic. In the face of new threat behavior, the traditional network management needs a long-term experimental process such as observation and analysis, feature extraction and online recognition. The whole process is time-consuming and labor-consuming. With the full encryption of the novel protocol, this confrontation will continue to escalate and unsustainable. This paper proposes a new idea of network management, which changes the traditional confrontation management into cooperation management, and can compromise privacy protection and network management. The main idea is to study the traffic management method combining "endpoint" and "pipe" and the novel protocol extension method. Securely transmit the secret key and data senseless decryption method through the hidden channel method to obtain the real URL access path of users. On this basis, this paper proposes and designs two traffic management methods: key acquisition and covert transmission method and TLS protocol upgrade implementation method. The first method requires the cooperation of the client. By studying the extension of the TLS protocol, we can decrypt the original traffic and realize network management; the second method requires the cooperation of the client and the server. By upgrading the handshake process and data of the TLS protocol transmission implementation, we can implement network management. On the network management side, it is necessary to decrypt and restore the network management packets, while the user request and response data cannot be decrypted. These two approaches are a novel solution idea under the popular application of novel protocols.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
新型TLS协议网络流量管理与监控方法研究
随着互联网技术的发展,越来越多的网站采用了新颖的TLS加密技术(如TLS1.3、DOH、ESNI等)。网络流量的全加密技术为识别和防范加密流量中的威胁带来了巨大的挑战。面对新的威胁行为,传统的网络管理需要一个长期的实验过程,如观察分析、特征提取和在线识别。整个过程耗时耗力。随着新协议的全面加密,这种对抗将继续升级且不可持续。本文提出了一种新的网络管理思路,将传统的对抗管理转变为协作管理,并能兼顾隐私保护和网络管理。主要思想是研究“端点”和“管道”相结合的流量管理方法和新的协议扩展方法。通过隐藏通道方法安全传输密钥和数据无意义解密方法,获取用户的真实URL访问路径。在此基础上,本文提出并设计了两种流量管理方法:密钥获取与隐蔽传输方法和TLS协议升级实现方法。第一种方法需要客户端的配合。通过研究TLS协议的扩展,可以对原始流量进行解密,实现网络管理;第二种方法需要客户机和服务器的合作。通过升级TLS协议传输的握手过程和数据实现,可以实现网络管理。在网管侧,需要对网管报文进行解密和恢复,而用户的请求和响应数据无法解密。这两种方法是在新协议广泛应用下的一种新颖的解决思路。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Development and Application of Portable Multi-Function Power Distribution Emergency Repair Standardized Equipment Research on Automatic Self-healing Control of Intelligent Feeder based on Multi-Agent Algorithm Research and implementation of IP address management in medium and large-scale local area networks Application of Compressive Sensing Technology and Image Processing in Space Exploration House Price Prediction Model Using Bridge Memristors Recurrent Neural Network
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1