Mitigation of Privacy Threats due to Encrypted Traffic Analysis through a Policy-Based Framework and MUD Profiles release_64t4gqfuibauto7n22teiqp6ve

by gianmarco baldini, José Luis Hernández-Ramos, Sławomir Nowak, Ricardo Neisse, Mateusz Nowak

Published in Symmetry by MDPI AG.

2020   Volume 12, p1576

Abstract

It has been proven in research literature that the analysis of encrypted traffic with statistical analysis and machine learning can reveal the type of activities performed by a user accessing the network, thus leading to privacy risks. In particular, different types of traffic (e.g., skype, web access) can be identified by extracting time based features and using them in a classifier. Such privacy attacks are asymmetric because a limited amount of resources (e.g., machine learning algorithms) can extract information from encrypted traffic generated by cryptographic systems implemented with a significant amount of resources. To mitigate privacy risks, studies in research literature have proposed a number of techniques, but in most cases only a single technique is applied, which can lead to limited effectiveness. This paper proposes a mitigation approach for privacy risks related to the analysis of encrypted traffic which is based on the integration of three main components: (1) A machine learning component which proactively analyzes the encrypted traffic in the network to identify potential privacy threats and evaluate the effectiveness of various mitigation techniques (e.g., obfuscation), (2) a policy based component where policies are used to enforce privacy mitigation solutions in the network and (3) a network node profile component based on the Manufacturer Usage Description (MUD) standard to enable changes in the network nodes in the cases where the first two components are not effective in mitigating the privacy risks. This paper describes the different components and how they interact in a potential deployment scenario. The approach is evaluated on the public dataset ISCXVPN2016 and the results show that the privacy threat can be mitigated significantly by removing completely the identification of specific types of traffic or by decreasing the probability of their identification as in the case of VOIP by 50%, Chat by 40% and Browsing by 33%, thus reducing significantly the privacy risk.
In application/xml+jats format

Archived Files and Locations

application/pdf  405.5 kB
file_ykwhynvu4ndbrdsnsri5mqxqvm
res.mdpi.com (publisher)
web.archive.org (webarchive)

Web Captures

https://www.mdpi.com/2073-8994/12/9/1576/htm
2022-07-17 14:26:40 | 47 resources
webcapture_ay4hrqi22naphgqo3jyvp52efq
web.archive.org (webarchive)
Read Archived PDF
Preserved and Accessible
Type  article-journal
Stage   published
Date   2020-09-22
Language   en ?
Container Metadata
Open Access Publication
In DOAJ
In ISSN ROAD
In Keepers Registry
ISSN-L:  2073-8994
Work Entity
access all versions, variants, and formats of this works (eg, pre-prints)
Catalog Record
Revision: 11a1e7cb-ab38-4c5f-9444-4e5752faa620
API URL: JSON