Encrypted HTTP/2 Traffic Monitoring: Standing the Test of Time and Space

Pierre-Olivier Brissaud, J. François, Isabelle Chrisment, Thibault Cholez, Olivier Bettan
{"title":"Encrypted HTTP/2 Traffic Monitoring: Standing the Test of Time and Space","authors":"Pierre-Olivier Brissaud, J. François, Isabelle Chrisment, Thibault Cholez, Olivier Bettan","doi":"10.1109/WIFS49906.2020.9360895","DOIUrl":null,"url":null,"abstract":"Encrypted HTTP/2 (h2) has been worldwide adopted since its official release in 2015. The major services over Internet use it to protect the user privacy against traffic interception. However, under the guise of privacy, one can hide the abnormal or even illegal use of a service. It has been demonstrated that machine learning algorithms combined with a proper set of features are still able to identify the incriminated traffic even when it is encrypted with h2. However, it can also be used to track normal service use and so endanger privacy of Internet users. Independently of the final objective, it is extremely important for a security practitioner to understand the efficiency of such a technique and its limit. No existing research has been achieved to assess how generic is it to be directly applicable to any service or website and how long an acceptable accuracy can be maintained.This paper addresses these challenges by defining an experimental methodology applied on more than 3000 different websites and also over four months continuously. The results highlight that an off-the-shelf machine-learning method to classify h2 traffic is applicable to many websites but a weekly training may be needed to keep the model accurate.","PeriodicalId":354881,"journal":{"name":"2020 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE International Workshop on Information Forensics and Security (WIFS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WIFS49906.2020.9360895","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

Encrypted HTTP/2 (h2) has been worldwide adopted since its official release in 2015. The major services over Internet use it to protect the user privacy against traffic interception. However, under the guise of privacy, one can hide the abnormal or even illegal use of a service. It has been demonstrated that machine learning algorithms combined with a proper set of features are still able to identify the incriminated traffic even when it is encrypted with h2. However, it can also be used to track normal service use and so endanger privacy of Internet users. Independently of the final objective, it is extremely important for a security practitioner to understand the efficiency of such a technique and its limit. No existing research has been achieved to assess how generic is it to be directly applicable to any service or website and how long an acceptable accuracy can be maintained.This paper addresses these challenges by defining an experimental methodology applied on more than 3000 different websites and also over four months continuously. The results highlight that an off-the-shelf machine-learning method to classify h2 traffic is applicable to many websites but a weekly training may be needed to keep the model accurate.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
加密HTTP/2流量监控:经得起时间和空间的考验
加密HTTP/2 (h2)自2015年正式发布以来,已在全球范围内采用。互联网上的主要业务都使用它来保护用户隐私,防止流量被截获。然而,在隐私的幌子下,人们可以隐藏对服务的异常甚至非法使用。已经证明,机器学习算法与一组适当的功能相结合,即使使用h2加密,仍然能够识别受犯罪的流量。但是,它也可以用来跟踪正常的服务使用,从而危及互联网用户的隐私。独立于最终目标之外,对于安全从业者来说,了解这种技术的效率及其局限性是极其重要的。目前还没有研究来评估它直接适用于任何服务或网站的通用程度,以及可接受的准确性可以维持多久。本文通过定义一种实验方法来解决这些挑战,该方法在3000多个不同的网站上连续应用了四个多月。结果表明,一种现成的机器学习方法对h2流量进行分类,适用于许多网站,但可能需要每周进行一次培训,以保持模型的准确性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Post-Quantum Secure Two-Party Computation for Iris Biometric Template Protection AmpleDroid Recovering Large Object Files from Android Application Memory The Suitability of RSA for Bulk Data Encryption ALASKA#2: Challenging Academic Research on Steganalysis with Realistic Images Landmark Breaker: Obstructing DeepFake By Disturbing Landmark Extraction
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1