{"title":"新型TLS协议网络流量管理与监控方法研究","authors":"Yangyang Guan, Zhen Li, G. Xiong","doi":"10.1145/3558819.3558835","DOIUrl":null,"url":null,"abstract":"With the development of Internet technology, more and more websites use the novel TLS encryption technologies (such as TLS1.3, DOH, ESNI, etc.). The full encryption technology of network traffic brings great challenges to identify and prevent threats in encrypted traffic. In the face of new threat behavior, the traditional network management needs a long-term experimental process such as observation and analysis, feature extraction and online recognition. The whole process is time-consuming and labor-consuming. With the full encryption of the novel protocol, this confrontation will continue to escalate and unsustainable. This paper proposes a new idea of network management, which changes the traditional confrontation management into cooperation management, and can compromise privacy protection and network management. The main idea is to study the traffic management method combining \"endpoint\" and \"pipe\" and the novel protocol extension method. Securely transmit the secret key and data senseless decryption method through the hidden channel method to obtain the real URL access path of users. On this basis, this paper proposes and designs two traffic management methods: key acquisition and covert transmission method and TLS protocol upgrade implementation method. The first method requires the cooperation of the client. By studying the extension of the TLS protocol, we can decrypt the original traffic and realize network management; the second method requires the cooperation of the client and the server. By upgrading the handshake process and data of the TLS protocol transmission implementation, we can implement network management. On the network management side, it is necessary to decrypt and restore the network management packets, while the user request and response data cannot be decrypted. These two approaches are a novel solution idea under the popular application of novel protocols.","PeriodicalId":373484,"journal":{"name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","volume":"14 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Research on Novel TLS Protocol Network Traffic Management and Monitoring Method\",\"authors\":\"Yangyang Guan, Zhen Li, G. Xiong\",\"doi\":\"10.1145/3558819.3558835\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the development of Internet technology, more and more websites use the novel TLS encryption technologies (such as TLS1.3, DOH, ESNI, etc.). The full encryption technology of network traffic brings great challenges to identify and prevent threats in encrypted traffic. In the face of new threat behavior, the traditional network management needs a long-term experimental process such as observation and analysis, feature extraction and online recognition. The whole process is time-consuming and labor-consuming. With the full encryption of the novel protocol, this confrontation will continue to escalate and unsustainable. This paper proposes a new idea of network management, which changes the traditional confrontation management into cooperation management, and can compromise privacy protection and network management. The main idea is to study the traffic management method combining \\\"endpoint\\\" and \\\"pipe\\\" and the novel protocol extension method. Securely transmit the secret key and data senseless decryption method through the hidden channel method to obtain the real URL access path of users. On this basis, this paper proposes and designs two traffic management methods: key acquisition and covert transmission method and TLS protocol upgrade implementation method. The first method requires the cooperation of the client. By studying the extension of the TLS protocol, we can decrypt the original traffic and realize network management; the second method requires the cooperation of the client and the server. By upgrading the handshake process and data of the TLS protocol transmission implementation, we can implement network management. On the network management side, it is necessary to decrypt and restore the network management packets, while the user request and response data cannot be decrypted. These two approaches are a novel solution idea under the popular application of novel protocols.\",\"PeriodicalId\":373484,\"journal\":{\"name\":\"Proceedings of the 7th International Conference on Cyber Security and Information Engineering\",\"volume\":\"14 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-09-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 7th International Conference on Cyber Security and Information Engineering\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3558819.3558835\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3558819.3558835","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Research on Novel TLS Protocol Network Traffic Management and Monitoring Method
With the development of Internet technology, more and more websites use the novel TLS encryption technologies (such as TLS1.3, DOH, ESNI, etc.). The full encryption technology of network traffic brings great challenges to identify and prevent threats in encrypted traffic. In the face of new threat behavior, the traditional network management needs a long-term experimental process such as observation and analysis, feature extraction and online recognition. The whole process is time-consuming and labor-consuming. With the full encryption of the novel protocol, this confrontation will continue to escalate and unsustainable. This paper proposes a new idea of network management, which changes the traditional confrontation management into cooperation management, and can compromise privacy protection and network management. The main idea is to study the traffic management method combining "endpoint" and "pipe" and the novel protocol extension method. Securely transmit the secret key and data senseless decryption method through the hidden channel method to obtain the real URL access path of users. On this basis, this paper proposes and designs two traffic management methods: key acquisition and covert transmission method and TLS protocol upgrade implementation method. The first method requires the cooperation of the client. By studying the extension of the TLS protocol, we can decrypt the original traffic and realize network management; the second method requires the cooperation of the client and the server. By upgrading the handshake process and data of the TLS protocol transmission implementation, we can implement network management. On the network management side, it is necessary to decrypt and restore the network management packets, while the user request and response data cannot be decrypted. These two approaches are a novel solution idea under the popular application of novel protocols.