Authors
Kevin P Dyer, Scott E Coull, Thomas Ristenpart, Thomas Shrimpton
Publication date
2013/11/4
Book
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Pages
61-72
Description
Deep packet inspection (DPI) technologies provide much-needed visibility and control of network traffic using port-independent protocol identification, where a network flow is labeled with its application-layer protocol based on packet contents. In this paper, we provide the first comprehensive evaluation of a large set of DPI systems from the point of view of protocol misidentification attacks, in which adversaries on the network attempt to force the DPI to mislabel connections. Our approach uses a new cryptographic primitive called format-transforming encryption (FTE), which extends conventional symmetric encryption with the ability to transform the ciphertext into a format of our choosing. We design an FTE-based record layer that can encrypt arbitrary application-layer traffic, and we experimentally show that this forces misidentification for all of the evaluated DPI systems. This set includes a proprietary, enterprise …
Total citations
201220132014201520162017201820192020202120222023202414142120221811191211153
Scholar articles
KP Dyer, SE Coull, T Ristenpart, T Shrimpton - Proceedings of the 2013 ACM SIGSAC conference on …, 2013
KP Dyer, SE Coull, T Ristenpart, T Shrimpton - IACR Cryptol. ePrint Arch., 2012