Computer Science ›› 2014, Vol. 41 ›› Issue (8): 192-196.doi: 10.11896/j.issn.1002-137X.2014.08.042

Previous Articles     Next Articles

Independent Identification of Encrypted Data in Data Link Layer Based on Randomness Test

WU Yang,MA Yun-fei,WANG Tao and XING Meng   

  • Online:2018-11-14 Published:2018-11-14

Abstract: To identify the encrypted data of data link layer,an independent identification scheme was proposed by mainly using the technique of frequency test within a block.As the identification rate of frequency test within a block is impressionable to the size of the block,a block size chosen scheme was provided based on the principle of variance.Furthermore,as the identification ability of frequency test within a block is also limited to short bit sequence,random sampling was introduced into its information extraction process to heighten the identification rate.Eventually,by taking the link layer bit sequence of a wiriness network as the identification object,the identification rate of the proposed schemes was verified.Experimental results demonstrate that the proposed schemes have high rates to identify encrypted data of data link layer and the correlative research paves the way for the further protocol identification research.

Key words: Data link layer,Encrypted data,Frequency test within a block,Variance principle,Random sampling

[1] 陈亮,龚俭,徐选.应用层协议识别算法综述[J].计算机科学,2007,4(7):73-75
[2] 吴志军,阚洪涛.基于ECC的TES网络链路层安全协议的研究[J].通信学报,2009,30(11):86-92
[3] 张杨.基于NDIS的数据链路层加密[J].辽宁大学学报,2010,37(2):116-118
[4] DOD(Department of Defense).MIL-STD-188-220C[EB/OL].http://www.everyspec.com,2012-06-29
[5] Charles V W,Fabian M,Gerald M M.On inferring application protocol behaviors in encrypted network traffic[J].Journal of Machine Learning Research,2006,7(12):2745-2769
[6] Sun Guang-lu,Xue Yi-bo,Dong Ying-fei,et al.A Novel Hybrid Method for Effectively Classifying Encrypted Traffic[C]∥Proceedings of Communications and Systems Security,2010(GLOBECOM 2010) .Miami USA:IEEE,2010:1-5
[7] 赵博,郭虹,刘勤让,等.基于加权累积和检验的加密流量盲识别算法[J].软件学报,2013,24(6):1334-1345
[8] Menezes Alfred J,van Oorschot P C,Vanstone S A.应用密码学手册[M].胡磊,王鹏,等译.北京:电子工业出版社,2005
[9] 胡俭勇,苏锦海.一种随机性实时检测方案[J].计算机工程,2009,34(9):136-138
[10] Rukhin A,Soto J,Nechvatal J.A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications[R].Technical Report.SP 2001:800-22
[11] Filiol E.A new statistical testing for symmetric ciphers and hash functions[C]∥Information and Communications Security:4th International Conference.Berlin:Springer,2002:342-353
[12] NIST FIPS PUB 140-2-2001.Security Requirements for Cryptographic Modules[S].Washington DC,USA:National Institute of Standards and Technology,http://csrc.nist.gov,2001
[13] NIST SP800-22.A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications Revision 1a[S].Washington DC,USA:National Institute of Standards and Technology,http://csrc.nist.gov,2010

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!