loading
Papers

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Mario Di Mauro and Maurizio Longo

Affiliation: University of Salerno, Italy

ISBN: 978-989-758-117-5

Keyword(s): Encrypted Real-Time Traffic, WebRTC, DTLS, Decision Trees, Weka, Machine Learning.

Related Ontology Subjects/Areas/Topics: Data and Application Security and Privacy ; Information and Systems Security ; Information Assurance ; Information Hiding ; Intrusion Detection & Prevention ; Network Security ; Privacy ; Security in Information Systems ; Security Information Systems Architecture and Design and Security Patterns ; Security Protocols ; Wireless Network Security

Abstract: The detection of encrypted real-time traffic, both streaming and conversational, is an increasingly important issue for agencies in charge of lawful interception. Aside from well established technologies used in real-time communication (e.g. Skype, Facetime, Lync etc.) a new one is recently spreading: Web Real-Time Communication (WebRTC), which, with the support of a robust encryption method such as DTLS, offers capabilities for encrypted voice and video without the need of installing a specific application but using a common browser, like Chrome, Firefox or Opera. Encrypted WebRTC traffic cannot be recognized through methods of semantic recognition since it does not exhibit a discernible sequence of information pieces and hence statistical recognition methods are called for. In this paper we propose and evaluate a decision theory based system allowing to recognize encrypted WebRTC traffic by means of an open-source machine learning environment: Weka. Besides, a reasoned comp arison among some of the most credited algorithms (J48, Simple Cart, Naïve Bayes, Random Forests) in the field of decision systems has been carried out, indicating the prevalence of Random Forests. (More)

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.209.80.87

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Di Mauro, M. and Longo, M. (2015). Revealing Encrypted WebRTC Traffic via Machine Learning Tools.In Proceedings of the 12th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2015) ISBN 978-989-758-117-5, pages 259-266. DOI: 10.5220/0005542202590266

@conference{secrypt15,
author={Mario Di Mauro. and Maurizio Longo.},
title={Revealing Encrypted WebRTC Traffic via Machine Learning Tools},
booktitle={Proceedings of the 12th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2015)},
year={2015},
pages={259-266},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005542202590266},
isbn={978-989-758-117-5},
}

TY - CONF

JO - Proceedings of the 12th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2015)
TI - Revealing Encrypted WebRTC Traffic via Machine Learning Tools
SN - 978-989-758-117-5
AU - Di Mauro, M.
AU - Longo, M.
PY - 2015
SP - 259
EP - 266
DO - 10.5220/0005542202590266

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.