• Corpus ID: 14067436

Traffic Analysis of SSL Encrypted Web Browsing

@inproceedings{Cheng1998TrafficAO,
  title={Traffic Analysis of SSL Encrypted Web Browsing},
  author={He Cheng},
  year={1998}
}
The SSL protocol, an application-layer mechanism widely used for encrypted Web browsing, was not designed to address traffic analysis attacks. We investigate the threat to privacy posed by such attacks and consider possible defenses. We implement a prototype of a traffic analysis attack and employ it to identify the pages visited by users browsing a Web site. Numerical models and simulations are used to predict the effectiveness of traffic analysis on various sites, as well as the efficacy of… 

Figures and Tables from this paper

Intrusion detection in encrypted accesses with SSH protocol to network public servers

A new approach to detect anomaly behaviors in encrypted accesses with SSH2 protocol to network public servers such as http servers, ftp servers and database servers by implementing the proposed system on the Snort intrusion detection software and with making use of DARPA evaluation dataset.

Intrusion Detection for Encrypted Web Accesses

This paper presents a novel approach to anomaly detection for encrypted web accesses, which applies encrypted traffic analysis to intrusion detection, which analyzes contents of encrypted traffic using only data size and timing without decryption.

Website Fingerprinting Defenses at the Application Layer

This paper proposes two application-level defenses including the first server-side defense against WF, as .onion services have incentives to support it, and a lightweight client-sidedefense implemented as a browser add-on, improving ease of deployment over previous approaches.

Distinguishability and Web traffic timing analysis

The study of the joint trade-off between privacy, throughput and delay in a shared network as a utility fairness problem and the proportional fair rate allocation for networks of flows subject to privacy constraints and delay deadlines is initiated.

Snoopy: A Webpage Fingerprinting Framework with Finite Query Model for Mass-Surveillance

Snoopy caters to the generalization requirements of mass-surveillance while complying with a bound on the number of website accesses ( finite query model) for traffic sample collection, and achieves 90% accuracy when evaluated on most websites, across various browsing contexts.

Website Fingerprinting on Early QUIC Traffic

Fingerprinting Defenses at the Application Layer

Two application-level defenses are proposed including the first server-side defense against WF, as .onion services have incentives to support it, and a lightweight client-sidedefense implemented as a browser add-on, improving ease of deployment over previous approaches.

Robust Website Fingerprinting Through the Cache Occupancy Channel

This work shows that cache website fingerprinting attacks in JavaScript are highly feasible, even when they are run from highly restrictive environments, such as the Tor Browser, and uses machine learning techniques to classify traces of cache activity.

Transparent and Service-Agnostic Monitoring of Encrypted Web Traffic

The solution, H2Classifier, aims at detecting if a user performs an action that has been previously defined over a monitored Web service, but without using any decryption, based on passive traffic analysis and relies on random forest classifier.

A multi-level framework to identify HTTPS services

This paper proposes a robust technique to precisely identify the services run within HTTPS connections, i.e. to name the services, without relying on specific header fields that can be easily altered.
...

References

SHOWING 1-5 OF 5 REFERENCES

Analysis of the SSL 3.0 protocol

A number of minor flaws in the protocol and several new active attacks on SSL are presented; however, these can be easily corrected without overhauling the basic structure of the protocol.

Privacy-enhancing technologies for the Internet

The paper gives an overview of existing and potential privacy enhancing technologies for the Internet, as well as motivation and challenges for future work in this field.

http://www.anonymizer.com/ 2. Enough is Enough Home Page

  • http://www.anonymizer.com/ 2. Enough is Enough Home Page

American Spectator Web Site

  • American Spectator Web Site

An introduction to hid den Markov models,

  • IEEE ASSP Magazine,
  • 1986