An Investigation on Detecting Applications Hidden in SSL Streams using Machine Learning Techniques
dc.contributor.author | McCarthy, Curtis | |
dc.contributor.copyright-release | Not Applicable | en_US |
dc.contributor.degree | Master of Electronic Commerce | en_US |
dc.contributor.department | Electronic Commerce Programme | en_US |
dc.contributor.ethics-approval | Not Applicable | en_US |
dc.contributor.external-examiner | N/A | en_US |
dc.contributor.graduate-coordinator | Dr. Vlado Keselj | en_US |
dc.contributor.manuscripts | Not Applicable | en_US |
dc.contributor.thesis-reader | Dr. V. Keselj | en_US |
dc.contributor.thesis-reader | Dr. E. Milios | en_US |
dc.contributor.thesis-supervisor | Dr. N. Zincir-Heywood | en_US |
dc.date.accessioned | 2010-09-09T18:56:26Z | |
dc.date.available | 2010-09-09T18:56:26Z | |
dc.date.defence | 2010-08-13 | |
dc.date.issued | 2010-09-09 | |
dc.description.abstract | The importance of knowing what type of traffic is flowing through a network is paramount to its success. Traffic shaping, Quality of Service, identifying critical business applications, Intrusion Detection Systems, as well as network administra- tion activities all require the base knowledge of what traffic is flowing over a network before any further steps can be taken. With SSL traffic on the rise due to applica- tions securing or concealing their traffic, the ability to determine what applications are running within a network is getting more and more difficult. Traditional methods of traffic classification through port numbers or deep packet inspection have been deemed inadequate by researchers thus making way for new methods. The purpose of this thesis is to investigate if a machine learning approach can be used with flow features to identify SSL in a given network trace. To this end, different machine learning methods are investigated without the use of port numbers, Internet Protocol addresses, or payload information. Various machine learning models are investigated including AdaBoost, Naive Bayes, RIPPER, and C4.5. The robustness of the results are tested against unseen datasets during training. Moreover, the proposed approach is compared to the Wireshark traffic analysis tool. Results show that the proposed ap- proach is very promising in identifying SSL traffic from a given network trace without using port numbers, Internet protocol addresses, or payload information. | en_US |
dc.identifier.uri | http://hdl.handle.net/10222/13055 | |
dc.language.iso | en | en_US |
dc.subject | SSL | en_US |
dc.subject | Traffic Classification | en_US |
dc.subject | Machine Learning | en_US |
dc.subject | TLS | en_US |
dc.subject | Secure Sockets Layer | en_US |
dc.subject | Transport Layer Security | en_US |
dc.title | An Investigation on Detecting Applications Hidden in SSL Streams using Machine Learning Techniques | en_US |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- McCarthy_Curtis_MEC_CS_September_2010.pdf
- Size:
- 3.59 MB
- Format:
- Adobe Portable Document Format
- Description:
License bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- license.txt
- Size:
- 1.69 KB
- Format:
- Item-specific license agreed upon to submission
- Description: