Show simple item record

dc.contributor.authorMcCarthy, Curtis
dc.date.accessioned2010-09-09T18:56:26Z
dc.date.available2010-09-09T18:56:26Z
dc.date.issued2010-09-09
dc.identifier.urihttp://hdl.handle.net/10222/13055
dc.description.abstractThe importance of knowing what type of traffic is flowing through a network is paramount to its success. Traffic shaping, Quality of Service, identifying critical business applications, Intrusion Detection Systems, as well as network administra- tion activities all require the base knowledge of what traffic is flowing over a network before any further steps can be taken. With SSL traffic on the rise due to applica- tions securing or concealing their traffic, the ability to determine what applications are running within a network is getting more and more difficult. Traditional methods of traffic classification through port numbers or deep packet inspection have been deemed inadequate by researchers thus making way for new methods. The purpose of this thesis is to investigate if a machine learning approach can be used with flow features to identify SSL in a given network trace. To this end, different machine learning methods are investigated without the use of port numbers, Internet Protocol addresses, or payload information. Various machine learning models are investigated including AdaBoost, Naive Bayes, RIPPER, and C4.5. The robustness of the results are tested against unseen datasets during training. Moreover, the proposed approach is compared to the Wireshark traffic analysis tool. Results show that the proposed ap- proach is very promising in identifying SSL traffic from a given network trace without using port numbers, Internet protocol addresses, or payload information.en_US
dc.language.isoenen_US
dc.subjectSSLen_US
dc.subjectTraffic Classificationen_US
dc.subjectMachine Learningen_US
dc.subjectTLSen_US
dc.subjectSecure Sockets Layeren_US
dc.subjectTransport Layer Securityen_US
dc.titleAn Investigation on Detecting Applications Hidden in SSL Streams using Machine Learning Techniquesen_US
dc.date.defence2010-08-13
dc.contributor.departmentElectronic Commerce Programmeen_US
dc.contributor.degreeMaster of Electronic Commerceen_US
dc.contributor.external-examinerN/Aen_US
dc.contributor.graduate-coordinatorDr. Vlado Keseljen_US
dc.contributor.thesis-readerDr. V. Keseljen_US
dc.contributor.thesis-readerDr. E. Miliosen_US
dc.contributor.thesis-supervisorDr. N. Zincir-Heywooden_US
dc.contributor.ethics-approvalNot Applicableen_US
dc.contributor.manuscriptsNot Applicableen_US
dc.contributor.copyright-releaseNot Applicableen_US
 Find Full text

Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record