VPN Traffic Detection in SSL-Protected Channel

Joint Authors

Zain ul Abideen, Muhammad
Saleem, Shahzad
Ejaz, Madiha

Source

Security and Communication Networks

Issue

Vol. 2019, Issue 2019 (31 Dec. 2019), pp.1-17, 17 p.

Publisher

Hindawi Publishing Corporation

Publication Date

2019-10-29

Country of Publication

Egypt

No. of Pages

17

Main Subjects

Information Technology and Computer Science

Abstract EN

In recent times, secure communication protocols over web such as HTTPS (Hypertext Transfer Protocol Secure) are being widely used instead of plain web communication protocols like HTTP (Hypertext Transfer Protocol).

HTTPS provides end-to-end encryption between the user and service.

Nowadays, organizations use network firewalls and/or intrusion detection and prevention systems (IDPS) to analyze the network traffic to detect and protect against attacks and vulnerabilities.

Depending on the size of organization, these devices may differ in their capabilities.

Simple network intrusion detection system (NIDS) and firewalls generally have no feature to inspect HTTPS or encrypted traffic, so they rely on unencrypted traffic to manage the encrypted payload of the network.

Recent and powerful next-generation firewalls have Secure Sockets Layer (SSL) inspection feature which are expensive and may not be suitable for every organizations.

A virtual private network (VPN) is a service which hides real traffic by creating SSL-protected channel between the user and server.

Every Internet activity is then performed under the established SSL tunnel.

The user inside the network with malicious intent or to hide his activity from the network security administration of the organization may use VPN services.

Any VPN service may be used by users to bypass the filters or signatures applied on network security devices.

These services may be the source of new virus or worm injected inside the network or a gateway to facilitate information leakage.

In this paper, we have proposed a novel approach to detect VPN activity inside the network.

The proposed system analyzes the communication between user and the server to analyze and extract features from network, transport, and application layer which are not encrypted and classify the incoming traffic as malicious, i.e., VPN traffic or standard traffic.

Network traffic is analyzed and classified using DNS (Domain Name System) packets and HTTPS- (Hypertext Transfer Protocol Secure-) based traffic.

Once traffic is classified, the connection based on the server’s IP, TCP port connected, domain name, and server name inside the HTTPS connection is analyzed.

This helps in verifying legitimate connection and flags the VPN-based traffic.

We worked on top five freely available VPN services and analyzed their traffic patterns; the results show successful detection of the VPN activity performed by the user.

We analyzed the activity of five users, using some sort of VPN service in their Internet activity, inside the network.

Out of total 729 connections made by different users, 329 connections were classified as legitimate activity, marking 400 remaining connections as VPN-based connections.

The proposed system is lightweight enough to keep minimal overhead, both in network and resource utilization and requires no specialized hardware.

American Psychological Association (APA)

Zain ul Abideen, Muhammad& Saleem, Shahzad& Ejaz, Madiha. 2019. VPN Traffic Detection in SSL-Protected Channel. Security and Communication Networks،Vol. 2019, no. 2019, pp.1-17.
https://search.emarefa.net/detail/BIM-1210565

Modern Language Association (MLA)

Zain ul Abideen, Muhammad…[et al.]. VPN Traffic Detection in SSL-Protected Channel. Security and Communication Networks No. 2019 (2019), pp.1-17.
https://search.emarefa.net/detail/BIM-1210565

American Medical Association (AMA)

Zain ul Abideen, Muhammad& Saleem, Shahzad& Ejaz, Madiha. VPN Traffic Detection in SSL-Protected Channel. Security and Communication Networks. 2019. Vol. 2019, no. 2019, pp.1-17.
https://search.emarefa.net/detail/BIM-1210565

Data Type

Journal Articles

Language

English

Notes

Includes bibliographical references

Record ID

BIM-1210565