HTTPS Traffic Classification
Wazen M. Shbair, Thibault Cholez, J´ erˆ
- me Fran¸
cois, Isabelle Chrisment
J´ erˆ
- me Fran¸
cois
Inria Nancy Grand Est, France jerome.francois@inria.fr
NMLRG - IETF95 April 7th, 2016
1 / 26
HTTPS Traffic Classification Wazen M. Shbair, Thibault Cholez, J er - - PowerPoint PPT Presentation
HTTPS Traffic Classification Wazen M. Shbair, Thibault Cholez, J er ome Fran cois, Isabelle Chrisment J er ome Fran cois Inria Nancy Grand Est, France jerome.francois@inria.fr NMLRG - IETF95 April 7th, 2016 1 / 26 The HTTPS
1 / 26
The HTTPS Dilemma SNI-Based Filtering A Multi-Level Framework to Identify HTTPS Services Evaluation Conclusion
2 / 26
The HTTPS Dilemma SNI-Based Filtering A Multi-Level Framework to Identify HTTPS Services Evaluation Conclusion
3 / 26
The HTTPS Dilemma SNI-Based Filtering A Multi-Level Framework to Identify HTTPS Services Evaluation Conclusion
4 / 26
The HTTPS Dilemma SNI-Based Filtering A Multi-Level Framework to Identify HTTPS Services Evaluation Conclusion
5 / 26
The HTTPS Dilemma SNI-Based Filtering A Multi-Level Framework to Identify HTTPS Services Evaluation Conclusion
6 / 26
The HTTPS Dilemma SNI-Based Filtering A Multi-Level Framework to Identify HTTPS Services Evaluation Conclusion
6 / 26
The HTTPS Dilemma SNI-Based Filtering A Multi-Level Framework to Identify HTTPS Services Evaluation Conclusion
7 / 26
The HTTPS Dilemma SNI-Based Filtering A Multi-Level Framework to Identify HTTPS Services Evaluation Conclusion
7 / 26
The HTTPS Dilemma SNI-Based Filtering A Multi-Level Framework to Identify HTTPS Services Evaluation Conclusion
8 / 26
The HTTPS Dilemma SNI-Based Filtering A Multi-Level Framework to Identify HTTPS Services Evaluation Conclusion
9 / 26
The HTTPS Dilemma SNI-Based Filtering A Multi-Level Framework to Identify HTTPS Services Evaluation Conclusion
10 / 26
The HTTPS Dilemma SNI-Based Filtering A Multi-Level Framework to Identify HTTPS Services Evaluation Conclusion
11 / 26
The HTTPS Dilemma SNI-Based Filtering A Multi-Level Framework to Identify HTTPS Services Evaluation Conclusion
12 / 26
The HTTPS Dilemma SNI-Based Filtering A Multi-Level Framework to Identify HTTPS Services Evaluation Conclusion
13 / 26
The HTTPS Dilemma SNI-Based Filtering A Multi-Level Framework to Identify HTTPS Services Evaluation Conclusion
14 / 26
The HTTPS Dilemma SNI-Based Filtering A Multi-Level Framework to Identify HTTPS Services Evaluation Conclusion
15 / 26
The HTTPS Dilemma SNI-Based Filtering A Multi-Level Framework to Identify HTTPS Services Evaluation Conclusion
1www.cs.waikato.ac.nz 16 / 26
The HTTPS Dilemma SNI-Based Filtering A Multi-Level Framework to Identify HTTPS Services Evaluation Conclusion
17 / 26
The HTTPS Dilemma SNI-Based Filtering A Multi-Level Framework to Identify HTTPS Services Evaluation Conclusion
18 / 26
The HTTPS Dilemma SNI-Based Filtering A Multi-Level Framework to Identify HTTPS Services Evaluation Conclusion
19 / 26
The HTTPS Dilemma SNI-Based Filtering A Multi-Level Framework to Identify HTTPS Services Evaluation Conclusion
20 / 26
The HTTPS Dilemma SNI-Based Filtering A Multi-Level Framework to Identify HTTPS Services Evaluation Conclusion
21 / 26
The HTTPS Dilemma SNI-Based Filtering A Multi-Level Framework to Identify HTTPS Services Evaluation Conclusion
22 / 26
The HTTPS Dilemma SNI-Based Filtering A Multi-Level Framework to Identify HTTPS Services Evaluation Conclusion
1-week 2-weeks 16-weeks 17-weeks 22-weeks 23-weeks 0.2 0.4 0.6 0.8 1 Period per Week Classification Error %
23 / 26
The HTTPS Dilemma SNI-Based Filtering A Multi-Level Framework to Identify HTTPS Services Evaluation Conclusion
24 / 26
The HTTPS Dilemma SNI-Based Filtering A Multi-Level Framework to Identify HTTPS Services Evaluation Conclusion
25 / 26
The HTTPS Dilemma SNI-Based Filtering A Multi-Level Framework to Identify HTTPS Services Evaluation Conclusion
[1]
classification,” Network, IEEE, vol. 28, no. 2, pp. 56–64, 2014. [2]
[3]
application identification of encrypted traffic,” in Machine Learning and Applications and Workshops (ICMLA), 2011 10th International Conference on, vol. 2, pp. 358–361, IEEE, 2011. [4]
identification of encrypted traffic,” in Computing, Networking and Communications (ICNC), 2014 International Conference on, pp. 136–140, IEEE, 2014. [5]
demystified: myths, caveats, and the best practices,” in Proceedings of the 2008 ACM CoNEXT conference,
26 / 26