skip to main content
10.1145/1815396.1815567acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiwcmcConference Proceedingsconference-collections
research-article

Statistical classification of services tunneled into SSH connections by a K-means based learning algorithm

Published:28 June 2010Publication History

ABSTRACT

Secure SHell is a TCP based protocol designed to enhance with security features telnet and other insecure remote management tools. Due to its versatility, it is often exploited to forward applications (i.e. HTTP, SCP, etc.) into encoded TCP traffic flows. The point which makes challenging the identification of the uses of SSH is that packets are enciphered and instruments based on deep packet inspection (DPI) cannot achieve this task. We approached the problem of early SSH classification with k-means based machine by studying statistical behavior of IP traffic parameters, such as length, arrival time and direction of packets. In this paper we describe tools and networks designed to collect SSH remote administration traffic as well as relevant results obtained for its classification. In particular, our tool identifies remote management traffic out of other SSH encoded applications with accuracy up to 90.34

References

  1. Callado, A.; Kamienski, C.; Szabo, G.; Gero, B.; Kelner, J.; Fernandes, S.; Sadok, D.; A Survey on Internet Traffic Identification; Communications Surveys & Tutorials, IEEE Volume 11, Issue 3, 3rd Quarter 2009 Page(s):37--52 Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. T. Ylonen and C. Lonvick, ŞThe Secure Shell (SSH) Protocol Architecture, RFC 4251, IETF, Jan. 2006.Google ScholarGoogle Scholar
  3. C. Wright, F. Monrose, G. Masson, On Inferring Application Protocol Behaviors in Encrypted Network Traffic, Journal of Machine Learning Research (JMLR): Special issue on Machine Learning for Computer Security, volume 7, pp. 2745--2769, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. R. Alshammari and A. Nur Zincir-Heywood. A Flow Based Approach For SSH Traffic Detection, Systems, Man and Cybernetics, 2007. ISIC. IEEE International Conference on.Google ScholarGoogle Scholar
  5. M. Dusi, A. Este, F. Gringoli, L. Salgarelli, Using GMM and SVM-based Techniques for the Classification of SSH-Encrypted Traffic, Proceedings of the 44th IEEE International Conference on Communication (ICC 2009), Dresden, Germany, Jun. 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. http://www.openssh.com/Google ScholarGoogle Scholar
  7. http://www.tcpdump.org/Google ScholarGoogle Scholar

Index Terms

  1. Statistical classification of services tunneled into SSH connections by a K-means based learning algorithm

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        IWCMC '10: Proceedings of the 6th International Wireless Communications and Mobile Computing Conference
        June 2010
        1371 pages
        ISBN:9781450300629
        DOI:10.1145/1815396

        Copyright © 2010 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 28 June 2010

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader