IDEAS home Printed from https://ideas.repec.org/a/wly/intnem/v31y2021i2ne2090.html
   My bibliography  Save this article

Network traffic identification of several open source secure proxy protocols

Author

Listed:
  • Yidan Zhang
  • Jiageng Chen
  • Kaiming Chen
  • Ruoyan Xu
  • Jesen Teh
  • Shuai Zhang

Abstract

Secure proxy technique has a wide range of applications especially in the area of VPN to protect the private communication from being surveilled. However, the adversaries may also take advantage of the VPN services for other purposes. Thus, knowing the characteristics of the corresponding security protocols will benefit the administration to narrow down the targets. Also, given the various VPN services on the market, we also want to know whether there exists some security flaws from the cryptographic protocol's point of view, so that can be used to improve analyzing the protocol. In this paper, we first target several widely used open source secure proxy protocols and provide their weaknesses through the static analysis. Then we apply the deep learning technique to train all the related network traffic, and our results showed that all the secure proxy traffics can be successfully distinguished with high accuracy.

Suggested Citation

  • Yidan Zhang & Jiageng Chen & Kaiming Chen & Ruoyan Xu & Jesen Teh & Shuai Zhang, 2021. "Network traffic identification of several open source secure proxy protocols," International Journal of Network Management, John Wiley & Sons, vol. 31(2), March.
  • Handle: RePEc:wly:intnem:v:31:y:2021:i:2:n:e2090
    DOI: 10.1002/nem.2090
    as

    Download full text from publisher

    File URL: https://doi.org/10.1002/nem.2090
    Download Restriction: no

    File URL: https://libkey.io/10.1002/nem.2090?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:wly:intnem:v:31:y:2021:i:2:n:e2090. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Wiley Content Delivery (email available below). General contact details of provider: https://doi.org/10.1002/(ISSN)1099-1190 .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.