University of Wollongong
Browse

Detecting policy violations through traffic analysis

Download (381.68 kB)
conference contribution
posted on 2024-11-13, 14:19 authored by J Horton, Reihaneh Safavi-Naini
Restrictions are commonly placed on the permitted uses of network protocols in the interests of security. These restrictions can sometimes be difficult to enforce. As an example, a permitted protocol can be used as a carrier for another protocol not otherwise permitted. However, if the observable behaviour of the protocol exhibits differences between permitted and non-permitted uses, it is possible to detect inappropriate use. We consider SSH, the Secure Shell protocol. This is an encrypted protocol with several uses. We attempt firstly to classify SSH sessions according to some different types of traffic for which the sessions have been used, and secondly, given a policy that permits SSH use for interactive traffic, to identify when a session appears to have been used for some other purpose.

History

Citation

This paper was originally published as: Horton, J & Safavi-Naini, R, Detecting policy violations through traffic analysis, 22nd Annual Computer Security Applications Conference (ACSAC '06), Miami Beach, Florida, USA, December 2006, 109-120. Copyright IEEE 2006.

Pagination

109-120

Language

English

RIS ID

73100

Usage metrics

    Categories

    Keywords

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC