SlideShare una empresa de Scribd logo
1 de 37
Descargar para leer sin conexión
SFMap: Inferring Services over
Encrypted Web Flows using
Dynamical Domain Name Graphs
TMA 2015
Tatsuya Mori1, Takeru Inoue2, Akihiro Shimoda3,
Kazumichi Sato3, Keisuke Ishibashi3, and Shigeki Goto1
1 Waseda University
2 NTT Network Innovation Laboratories
3 NTT Network Technology Laboratories
Background(1) Era of web
Change of Internet traffic
※WIDE Mawi Project http://mawi.wide.ad.jp,
samplepoint B, F
1
2002/12/1
2012/12/1
Many of primary Internet services have shifted to
Web (http): Everything over HTTP
Era of P2P
Era of Web
Background(2) Encrypting Web
2
D. Naylor et al., The Cost of the “S” in HTTP. Proceedings of ACM CoNext,
2014.
Deploying HTTPS is not cost any more
Significant portion of web traffic is now encrypted
YouTube video over HTTPS!
3
Netflix started encrypting stream
Era of WebSocket
5
HTTP = non-secure!
6
ISPs need to understand traffic mix
•  to figure out what to control in the presence
of congestion.
–  Shaping HTTP flows is too coarse-grained.
–  Shaping flows from a range of IP addresses is also too
coarse-grained.
•  to know demand of end-users
–  What types of services are consuming network resources.
→ Can be used to rethink new architecture or business model
  peering policy, installing cache mechanism,
WAN optimization, CCN/ICN,
•  Obstacle: coping with HTTPS
7
HTTP vs. HTTPS
•  HTTP:
– HTTP header composes of URL information
•  HTTPS:
– Entire HTTP protocol including header is
encrypted. No URL information is available.
8
HTTP
header
TCP
header
IP
header
HTTP
payload
TCP
header
IP
header
SSL/TLS encryption
http://www.example.com
Solution 1: Server IP addresses
•  Many of IP addresses can be
reverse looked up (PTR record)
•  There are many IP addresses
that are not configured to
have PTR records.
•  A single IP address can be
associated with many distinct
FQDNS (cloud, hosting
services, etc.)
9
Solution 2: SSL/TLS certificates
•  Public key certificate of server is exchanged
during SSL/TLS handshake stage. The
certificate should contain domain name of
the server.
•  An organization can register a single
certificate for many sub-domains, i.e., so
called wildcard certificates
–  E.g., *.google.com
10
Solution 3: SNI extension
•  SNI (Server Name Identification) of TLS
can be used to obtain FQDN of an
HTTPS server.
•  Many of client/server implementations
have not adopted SNI, yet.
– In our dataset, roughly half of HTTPS clients
did not use the SNI extension.
11
Solution 4: Decrypting HTTPS
•  Anti-virus software or firewall products have
mechanisms to intercept HTTPS traffic
•  They use self-signed certificates to work as a
transparent HTTP(S) proxy.
–  Same as the MTIM (Man-in-the-middle) attack
–  Needs for installation of certificates for each OS/
application
•  [cf] IETF Explicit Trusted Proxy in HTTP/2.0 (I-D expired)
12
Goal
•  Estimate server hostnames of HTTPS traffic
–  Server hostnames can be used as a good hint to
estimate the services provided by the server
–  E.g., www.apple..com, itunes.apple.com , …
•  Establish better performance than the
existing solution (DN-Hunter)
 
13
Idea
•  Leverage DNS name resolutions that
precedes HTTPS transactions
–  Labeling data plane using control plane
–  This is not a simple task as we will describe soon.
–  [cf] state-of-the-art = DN-Hunter (IMC 2012)
•  Use statistical inference when measurement
is incomplete
–  DNS resolutions can be missed due to some
reasons
14
Illustration of DNS approach
15
Client
C1
DNS resolver
HTTPS server
S1
61.213.146.4 (akamai)
NTT-COM
10.20.2.3
61.213.146.4:443 10.20.2.3:31587
= www.apple.com (APPLE)
www.apple.com? 61.213.146.4
from 10.20.2.3
Three practical challenges:
1)  CNAME tricks
2)  Incomplete measurements
3)  Dynamicity, diversity, and ambiguity
16
1) CNAME tricks
•  Modern CDN providers heavily make use of
CNAME tricks to optimize content distribution
•  We need to keep track of not only client/server IP
addresses/hostnames, but also intermediate
CNAMEs
17
s1 m1 n1m2
23.2.132.181
e1630.c.akamaiedge.net
(TTL=20)
www.ieee.org.edgekey.net
(TTL=11002)
www.ieee.org
(TTL=60)
2) incomplete measurements
•  Various DNS caching mechanisms in the
wild
–  Browser/apps
–  OS
–  Home routers w/DNS resolver
–  DNS resolvers (Organization/ISP/Open)
•  From the viewpoint of ISPs, DNS queries
originated from end-users can be missed
due to the intermediate caching
mechanisms
18
3) Dynamicity, diversity, and
ambiguity
•  A pathological/popular example
19
s1
m1
n1
s1
m1
n1
n2
Observa(on+1: n1! s1
Observa(on+2: n2! s2
s2
SFMap (Service-Flow Map)
20
DNS
queries/ responses
HTTPS flow
DNG
Sec 3.2
Flow key: {s, c}
Hostname, n
input
output
Freq. Counter
Estimator
Sec 3.3
Learner
Updater
Sec 3.4
Learning with monitored
queries:
Building DNG (Domain
Name Graph)
Hostname estimation
using DNG
Use maximum likelihood
estimation when
necessary
Illustration of DNG
21
s1 n1
n2
c1 s2 m1
s3
n3
s3
c2
m2
n4
n6
s1 n5
s1
n1
n2
s2 m1
s3
n3
m2
n4
n6
n5
c1
c2
Per-client graphs
(local DNG)
A global graph
(union DNG)
m2
Overview of hostname
estimation algorithm (1)
•  Get client/server IP addresses (C,S)
from an HTTPS flow
•  Search a set of hostnames N
corresponding to (C,S) on DNG
– Enumerate edge nodes N that have paths
reachable from C to S on DNG
– Also consider TTL expiration
•  If |N| = 1, it is the estimated hostname
22
An example
23
s3
c2
m2
m3
n6
n7
s1 n5
(c2, s1) à estimation = n5
(c2, s3) à candidates = n6, n7
Overview of hostname
estimation algorithm (2)
•  If there are multiple candidates, sort
them in descending order, according to
the likelihood probabilities
–  Uncertain events à use frequencies
•  Second, third candidates can be informative
–  Note: The statistical inference can be
extended to Bayes estimation that uses P(n)
(a priori probability)
24
Updating DNG
•  States/Statistics of DNG is updated
online when a DNS query is observed
25
Dataset
•  LAB:
– A small LAN used by research group
•  PROD:
– Middle-scale production network
26
Scales of DNGs (12 hours long)
27
Estimation accuracy (1)
28
UNION グラフ
TTL expiration 無し
UNION DNG without TTL expiration
Exact match
Public suffix match
Estimation accuracy (2)
29
Accuracies of top-3 estimations (UE-NTE)
The top-3 ranked hostnames were similar in many
cases; e.g,
 pagead2. googlesyndication.com
 pubads.g.doubleclick.net,
 googleads.g.doubleclick. net
Discussion
•  Sources of inevitable misclassification
– DNS implementations that ignore TTL
expiration
•  It keeps holding old information
– mobility
•  DNS could be resolved in different vantage
point
– Hardcoded IP addresses
•  Some gaming apps did have such mechanism
30
Discussion (cont.)
•  Scalability
– Did not matter for our datasets
– Size of DNG depends on the number of
client IP addresses
•  Some aging mechanism should be
incorporated for much large-scale DNGs
(future work)
•  URL=hostname + path.
–  How can we deal with path?
–  Need for a standard mechanism to explicitly
expose path like SNI?
31
Summary
•  SFMap framework estimates hostnames
(~services) of HTTPS traffic using past DNS queries
•  Key ideas:use of DNG and statistical inference
•  SFMap achieved better accuracies than the
state-of-the-art work (DN-Hunter)
–  Exact match: 90-92% accuracies
–  Public suffix match: 94-95% accuracies
–  Top-3 hit: 97-98% accuracies
32
Acknowledgements
•  This work was supported by JSPS KAKENHI Grant
Number 25880020.
33
Existing research: DN Hunter
•  Bermudez et al., “DNS to the Rescue: Discerning Content and
Services in a Tangled Web”, ACM IMC 2012 
34
Comparison with DN-Hunter
35
Distributed
monitoring
Statistical
estimation
DN Hunter △ ☓ 
SFMap ⃝ ⃝ 
Distributed monitoring
36
ER
ER
ER
DNS
resolver
SFMap
DNS
(Control-plane)
CR
GW
sampled
NetFlow
(data-plane)

Más contenido relacionado

La actualidad más candente

Module 1-Application Layer
Module 1-Application Layer Module 1-Application Layer
Module 1-Application Layer Gururaj H L
 
A New Form of Dos attack in Cloud
A New Form of Dos attack in CloudA New Form of Dos attack in Cloud
A New Form of Dos attack in CloudSanoj Kumar
 
Network time sync solutions for security
Network time sync solutions for securityNetwork time sync solutions for security
Network time sync solutions for securityMohd Amir
 
PlatCon-19 ICMPv6SD
PlatCon-19 ICMPv6SDPlatCon-19 ICMPv6SD
PlatCon-19 ICMPv6SDlinzichao
 
LinuxCon 2015 Stateful NAT with OVS
LinuxCon 2015 Stateful NAT with OVSLinuxCon 2015 Stateful NAT with OVS
LinuxCon 2015 Stateful NAT with OVSThomas Graf
 
Fiware: Connecting to robots
Fiware: Connecting to robotsFiware: Connecting to robots
Fiware: Connecting to robotsJaime Martin Losa
 
Entropy based DDos Detection in SDN
Entropy based DDos Detection in SDNEntropy based DDos Detection in SDN
Entropy based DDos Detection in SDNVishal Vasudev
 
Type of DDoS attacks with hping3 example
Type of DDoS attacks with hping3 exampleType of DDoS attacks with hping3 example
Type of DDoS attacks with hping3 exampleHimani Singh
 
Leveraging Machine Learning Approach to Setup Software Defined Network(SDN) C...
Leveraging Machine Learning Approach to Setup Software Defined Network(SDN) C...Leveraging Machine Learning Approach to Setup Software Defined Network(SDN) C...
Leveraging Machine Learning Approach to Setup Software Defined Network(SDN) C...Kishor Datta Gupta
 
EBPF and Linux Networking
EBPF and Linux NetworkingEBPF and Linux Networking
EBPF and Linux NetworkingPLUMgrid
 
Content Addressable NDN Repository - checkpoint
Content Addressable NDN Repository - checkpointContent Addressable NDN Repository - checkpoint
Content Addressable NDN Repository - checkpointShi Junxiao
 
Geographically dispersed perconaxtra db cluster deployment
Geographically dispersed perconaxtra db cluster deploymentGeographically dispersed perconaxtra db cluster deployment
Geographically dispersed perconaxtra db cluster deploymentMarco Tusa
 
Faster Content Distribution with Content Addressable NDN Repository
Faster Content Distribution with Content Addressable NDN RepositoryFaster Content Distribution with Content Addressable NDN Repository
Faster Content Distribution with Content Addressable NDN RepositoryShi Junxiao
 

La actualidad más candente (18)

Module 1-Application Layer
Module 1-Application Layer Module 1-Application Layer
Module 1-Application Layer
 
Ns2pre
Ns2preNs2pre
Ns2pre
 
A New Form of Dos attack in Cloud
A New Form of Dos attack in CloudA New Form of Dos attack in Cloud
A New Form of Dos attack in Cloud
 
Network time sync solutions for security
Network time sync solutions for securityNetwork time sync solutions for security
Network time sync solutions for security
 
PlatCon-19 ICMPv6SD
PlatCon-19 ICMPv6SDPlatCon-19 ICMPv6SD
PlatCon-19 ICMPv6SD
 
LinuxCon 2015 Stateful NAT with OVS
LinuxCon 2015 Stateful NAT with OVSLinuxCon 2015 Stateful NAT with OVS
LinuxCon 2015 Stateful NAT with OVS
 
Fiware: Connecting to robots
Fiware: Connecting to robotsFiware: Connecting to robots
Fiware: Connecting to robots
 
Common ports hacked by hackers
Common ports hacked by hackersCommon ports hacked by hackers
Common ports hacked by hackers
 
Entropy based DDos Detection in SDN
Entropy based DDos Detection in SDNEntropy based DDos Detection in SDN
Entropy based DDos Detection in SDN
 
Type of DDoS attacks with hping3 example
Type of DDoS attacks with hping3 exampleType of DDoS attacks with hping3 example
Type of DDoS attacks with hping3 example
 
Leveraging Machine Learning Approach to Setup Software Defined Network(SDN) C...
Leveraging Machine Learning Approach to Setup Software Defined Network(SDN) C...Leveraging Machine Learning Approach to Setup Software Defined Network(SDN) C...
Leveraging Machine Learning Approach to Setup Software Defined Network(SDN) C...
 
EBPF and Linux Networking
EBPF and Linux NetworkingEBPF and Linux Networking
EBPF and Linux Networking
 
Netcat - A Swiss Army Tool
Netcat - A Swiss Army ToolNetcat - A Swiss Army Tool
Netcat - A Swiss Army Tool
 
Content Addressable NDN Repository - checkpoint
Content Addressable NDN Repository - checkpointContent Addressable NDN Repository - checkpoint
Content Addressable NDN Repository - checkpoint
 
Netcat
NetcatNetcat
Netcat
 
Geographically dispersed perconaxtra db cluster deployment
Geographically dispersed perconaxtra db cluster deploymentGeographically dispersed perconaxtra db cluster deployment
Geographically dispersed perconaxtra db cluster deployment
 
Faster Content Distribution with Content Addressable NDN Repository
Faster Content Distribution with Content Addressable NDN RepositoryFaster Content Distribution with Content Addressable NDN Repository
Faster Content Distribution with Content Addressable NDN Repository
 
Tunneling
TunnelingTunneling
Tunneling
 

Similar a SFMap (TMA 2015)

Fast RTPS Workshop at FIWARE Summit 2018
Fast RTPS Workshop at FIWARE Summit 2018Fast RTPS Workshop at FIWARE Summit 2018
Fast RTPS Workshop at FIWARE Summit 2018Jaime Martin Losa
 
AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!APNIC
 
Primer to Browser Netwroking
Primer to Browser NetwrokingPrimer to Browser Netwroking
Primer to Browser NetwrokingShuya Osaki
 
Fiware - communicating with ROS robots using Fast RTPS
Fiware - communicating with ROS robots using Fast RTPSFiware - communicating with ROS robots using Fast RTPS
Fiware - communicating with ROS robots using Fast RTPSJaime Martin Losa
 
PacketCloud: an Open Platform for Elastic In-network Services.
PacketCloud: an Open Platform for Elastic In-network Services. PacketCloud: an Open Platform for Elastic In-network Services.
PacketCloud: an Open Platform for Elastic In-network Services. yeung2000
 
FIWARE Global Summit - Fast RTPS: Programming with the Default middleware for...
FIWARE Global Summit - Fast RTPS: Programming with the Default middleware for...FIWARE Global Summit - Fast RTPS: Programming with the Default middleware for...
FIWARE Global Summit - Fast RTPS: Programming with the Default middleware for...FIWARE
 
Fast RTPS: Programming with the Default Middleware for Robotics Adopted in ROS2
Fast RTPS: Programming with the Default Middleware for Robotics Adopted in ROS2Fast RTPS: Programming with the Default Middleware for Robotics Adopted in ROS2
Fast RTPS: Programming with the Default Middleware for Robotics Adopted in ROS2Jaime Martin Losa
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...
A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...
A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...Tal Lavian Ph.D.
 
A new Internet? Intro to HTTP/2, QUIC, DoH and DNS over QUIC
A new Internet? Intro to HTTP/2, QUIC, DoH and DNS over QUICA new Internet? Intro to HTTP/2, QUIC, DoH and DNS over QUIC
A new Internet? Intro to HTTP/2, QUIC, DoH and DNS over QUICAPNIC
 
Monitoring federation open stack infrastructure
Monitoring federation open stack infrastructureMonitoring federation open stack infrastructure
Monitoring federation open stack infrastructureFernando Lopez Aguilar
 
Aplication and Transport layer- a practical approach
Aplication and Transport layer-  a practical approachAplication and Transport layer-  a practical approach
Aplication and Transport layer- a practical approachSarah R. Dowlath
 
Next-Generation Network Security: TechNet Augusta 2015
Next-Generation Network Security: TechNet Augusta 2015Next-Generation Network Security: TechNet Augusta 2015
Next-Generation Network Security: TechNet Augusta 2015AFCEA International
 
Data Security Governanace and Consumer Cloud Storage
Data Security Governanace and Consumer Cloud StorageData Security Governanace and Consumer Cloud Storage
Data Security Governanace and Consumer Cloud StorageDaniel Rohan
 
Zero Downtime JEE Architectures
Zero Downtime JEE ArchitecturesZero Downtime JEE Architectures
Zero Downtime JEE ArchitecturesAlexander Penev
 
A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...
A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...
A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...Tal Lavian Ph.D.
 

Similar a SFMap (TMA 2015) (20)

Fast RTPS Workshop at FIWARE Summit 2018
Fast RTPS Workshop at FIWARE Summit 2018Fast RTPS Workshop at FIWARE Summit 2018
Fast RTPS Workshop at FIWARE Summit 2018
 
AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!
 
Primer to Browser Netwroking
Primer to Browser NetwrokingPrimer to Browser Netwroking
Primer to Browser Netwroking
 
Fiware - communicating with ROS robots using Fast RTPS
Fiware - communicating with ROS robots using Fast RTPSFiware - communicating with ROS robots using Fast RTPS
Fiware - communicating with ROS robots using Fast RTPS
 
PacketCloud: an Open Platform for Elastic In-network Services.
PacketCloud: an Open Platform for Elastic In-network Services. PacketCloud: an Open Platform for Elastic In-network Services.
PacketCloud: an Open Platform for Elastic In-network Services.
 
FIWARE Global Summit - Fast RTPS: Programming with the Default middleware for...
FIWARE Global Summit - Fast RTPS: Programming with the Default middleware for...FIWARE Global Summit - Fast RTPS: Programming with the Default middleware for...
FIWARE Global Summit - Fast RTPS: Programming with the Default middleware for...
 
Fast RTPS
Fast RTPSFast RTPS
Fast RTPS
 
Fast RTPS: Programming with the Default Middleware for Robotics Adopted in ROS2
Fast RTPS: Programming with the Default Middleware for Robotics Adopted in ROS2Fast RTPS: Programming with the Default Middleware for Robotics Adopted in ROS2
Fast RTPS: Programming with the Default Middleware for Robotics Adopted in ROS2
 
Lecture set 7
Lecture set 7Lecture set 7
Lecture set 7
 
Lec13 cdn
Lec13 cdnLec13 cdn
Lec13 cdn
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...
A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...
A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...
 
A new Internet? Intro to HTTP/2, QUIC, DoH and DNS over QUIC
A new Internet? Intro to HTTP/2, QUIC, DoH and DNS over QUICA new Internet? Intro to HTTP/2, QUIC, DoH and DNS over QUIC
A new Internet? Intro to HTTP/2, QUIC, DoH and DNS over QUIC
 
Part 7 : HTTP/2, UDP and TCP
Part 7 : HTTP/2, UDP and TCPPart 7 : HTTP/2, UDP and TCP
Part 7 : HTTP/2, UDP and TCP
 
Monitoring federation open stack infrastructure
Monitoring federation open stack infrastructureMonitoring federation open stack infrastructure
Monitoring federation open stack infrastructure
 
Aplication and Transport layer- a practical approach
Aplication and Transport layer-  a practical approachAplication and Transport layer-  a practical approach
Aplication and Transport layer- a practical approach
 
Next-Generation Network Security: TechNet Augusta 2015
Next-Generation Network Security: TechNet Augusta 2015Next-Generation Network Security: TechNet Augusta 2015
Next-Generation Network Security: TechNet Augusta 2015
 
Data Security Governanace and Consumer Cloud Storage
Data Security Governanace and Consumer Cloud StorageData Security Governanace and Consumer Cloud Storage
Data Security Governanace and Consumer Cloud Storage
 
Zero Downtime JEE Architectures
Zero Downtime JEE ArchitecturesZero Downtime JEE Architectures
Zero Downtime JEE Architectures
 
A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...
A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...
A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...
 

Último

MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 

Último (20)

MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 

SFMap (TMA 2015)

  • 1. SFMap: Inferring Services over Encrypted Web Flows using Dynamical Domain Name Graphs TMA 2015 Tatsuya Mori1, Takeru Inoue2, Akihiro Shimoda3, Kazumichi Sato3, Keisuke Ishibashi3, and Shigeki Goto1 1 Waseda University 2 NTT Network Innovation Laboratories 3 NTT Network Technology Laboratories
  • 2. Background(1) Era of web Change of Internet traffic ※WIDE Mawi Project http://mawi.wide.ad.jp, samplepoint B, F 1 2002/12/1 2012/12/1 Many of primary Internet services have shifted to Web (http): Everything over HTTP Era of P2P Era of Web
  • 3. Background(2) Encrypting Web 2 D. Naylor et al., The Cost of the “S” in HTTP. Proceedings of ACM CoNext, 2014. Deploying HTTPS is not cost any more Significant portion of web traffic is now encrypted
  • 8. ISPs need to understand traffic mix •  to figure out what to control in the presence of congestion. –  Shaping HTTP flows is too coarse-grained. –  Shaping flows from a range of IP addresses is also too coarse-grained. •  to know demand of end-users –  What types of services are consuming network resources. → Can be used to rethink new architecture or business model   peering policy, installing cache mechanism, WAN optimization, CCN/ICN, •  Obstacle: coping with HTTPS 7
  • 9. HTTP vs. HTTPS •  HTTP: – HTTP header composes of URL information •  HTTPS: – Entire HTTP protocol including header is encrypted. No URL information is available. 8 HTTP header TCP header IP header HTTP payload TCP header IP header SSL/TLS encryption http://www.example.com
  • 10. Solution 1: Server IP addresses •  Many of IP addresses can be reverse looked up (PTR record) •  There are many IP addresses that are not configured to have PTR records. •  A single IP address can be associated with many distinct FQDNS (cloud, hosting services, etc.) 9
  • 11. Solution 2: SSL/TLS certificates •  Public key certificate of server is exchanged during SSL/TLS handshake stage. The certificate should contain domain name of the server. •  An organization can register a single certificate for many sub-domains, i.e., so called wildcard certificates –  E.g., *.google.com 10
  • 12. Solution 3: SNI extension •  SNI (Server Name Identification) of TLS can be used to obtain FQDN of an HTTPS server. •  Many of client/server implementations have not adopted SNI, yet. – In our dataset, roughly half of HTTPS clients did not use the SNI extension. 11
  • 13. Solution 4: Decrypting HTTPS •  Anti-virus software or firewall products have mechanisms to intercept HTTPS traffic •  They use self-signed certificates to work as a transparent HTTP(S) proxy. –  Same as the MTIM (Man-in-the-middle) attack –  Needs for installation of certificates for each OS/ application •  [cf] IETF Explicit Trusted Proxy in HTTP/2.0 (I-D expired) 12
  • 14. Goal •  Estimate server hostnames of HTTPS traffic –  Server hostnames can be used as a good hint to estimate the services provided by the server –  E.g., www.apple..com, itunes.apple.com , … •  Establish better performance than the existing solution (DN-Hunter)   13
  • 15. Idea •  Leverage DNS name resolutions that precedes HTTPS transactions –  Labeling data plane using control plane –  This is not a simple task as we will describe soon. –  [cf] state-of-the-art = DN-Hunter (IMC 2012) •  Use statistical inference when measurement is incomplete –  DNS resolutions can be missed due to some reasons 14
  • 16. Illustration of DNS approach 15 Client C1 DNS resolver HTTPS server S1 61.213.146.4 (akamai) NTT-COM 10.20.2.3 61.213.146.4:443 10.20.2.3:31587 = www.apple.com (APPLE) www.apple.com? 61.213.146.4 from 10.20.2.3
  • 17. Three practical challenges: 1)  CNAME tricks 2)  Incomplete measurements 3)  Dynamicity, diversity, and ambiguity 16
  • 18. 1) CNAME tricks •  Modern CDN providers heavily make use of CNAME tricks to optimize content distribution •  We need to keep track of not only client/server IP addresses/hostnames, but also intermediate CNAMEs 17 s1 m1 n1m2 23.2.132.181 e1630.c.akamaiedge.net (TTL=20) www.ieee.org.edgekey.net (TTL=11002) www.ieee.org (TTL=60)
  • 19. 2) incomplete measurements •  Various DNS caching mechanisms in the wild –  Browser/apps –  OS –  Home routers w/DNS resolver –  DNS resolvers (Organization/ISP/Open) •  From the viewpoint of ISPs, DNS queries originated from end-users can be missed due to the intermediate caching mechanisms 18
  • 20. 3) Dynamicity, diversity, and ambiguity •  A pathological/popular example 19 s1 m1 n1 s1 m1 n1 n2 Observa(on+1: n1! s1 Observa(on+2: n2! s2 s2
  • 21. SFMap (Service-Flow Map) 20 DNS queries/ responses HTTPS flow DNG Sec 3.2 Flow key: {s, c} Hostname, n input output Freq. Counter Estimator Sec 3.3 Learner Updater Sec 3.4 Learning with monitored queries: Building DNG (Domain Name Graph) Hostname estimation using DNG Use maximum likelihood estimation when necessary
  • 22. Illustration of DNG 21 s1 n1 n2 c1 s2 m1 s3 n3 s3 c2 m2 n4 n6 s1 n5 s1 n1 n2 s2 m1 s3 n3 m2 n4 n6 n5 c1 c2 Per-client graphs (local DNG) A global graph (union DNG) m2
  • 23. Overview of hostname estimation algorithm (1) •  Get client/server IP addresses (C,S) from an HTTPS flow •  Search a set of hostnames N corresponding to (C,S) on DNG – Enumerate edge nodes N that have paths reachable from C to S on DNG – Also consider TTL expiration •  If |N| = 1, it is the estimated hostname 22
  • 24. An example 23 s3 c2 m2 m3 n6 n7 s1 n5 (c2, s1) à estimation = n5 (c2, s3) à candidates = n6, n7
  • 25. Overview of hostname estimation algorithm (2) •  If there are multiple candidates, sort them in descending order, according to the likelihood probabilities –  Uncertain events à use frequencies •  Second, third candidates can be informative –  Note: The statistical inference can be extended to Bayes estimation that uses P(n) (a priori probability) 24
  • 26. Updating DNG •  States/Statistics of DNG is updated online when a DNS query is observed 25
  • 27. Dataset •  LAB: – A small LAN used by research group •  PROD: – Middle-scale production network 26
  • 28. Scales of DNGs (12 hours long) 27
  • 29. Estimation accuracy (1) 28 UNION グラフ TTL expiration 無し UNION DNG without TTL expiration Exact match Public suffix match
  • 30. Estimation accuracy (2) 29 Accuracies of top-3 estimations (UE-NTE) The top-3 ranked hostnames were similar in many cases; e.g,  pagead2. googlesyndication.com  pubads.g.doubleclick.net,  googleads.g.doubleclick. net
  • 31. Discussion •  Sources of inevitable misclassification – DNS implementations that ignore TTL expiration •  It keeps holding old information – mobility •  DNS could be resolved in different vantage point – Hardcoded IP addresses •  Some gaming apps did have such mechanism 30
  • 32. Discussion (cont.) •  Scalability – Did not matter for our datasets – Size of DNG depends on the number of client IP addresses •  Some aging mechanism should be incorporated for much large-scale DNGs (future work) •  URL=hostname + path. –  How can we deal with path? –  Need for a standard mechanism to explicitly expose path like SNI? 31
  • 33. Summary •  SFMap framework estimates hostnames (~services) of HTTPS traffic using past DNS queries •  Key ideas:use of DNG and statistical inference •  SFMap achieved better accuracies than the state-of-the-art work (DN-Hunter) –  Exact match: 90-92% accuracies –  Public suffix match: 94-95% accuracies –  Top-3 hit: 97-98% accuracies 32
  • 34. Acknowledgements •  This work was supported by JSPS KAKENHI Grant Number 25880020. 33
  • 35. Existing research: DN Hunter •  Bermudez et al., “DNS to the Rescue: Discerning Content and Services in a Tangled Web”, ACM IMC 2012  34