Fingerprinting Encrypted Tunnel Endpoints

dc.contributor.advisorKourie, Derrick G.en
dc.contributor.advisorEloff, Jan H.P.en
dc.contributor.emailvafa@cs.up.ac.zaen
dc.contributor.postgraduateIzadinia, Vafa Darioen
dc.date.accessioned2013-09-06T20:54:21Z
dc.date.available2005-06-09en
dc.date.available2013-09-06T20:54:21Z
dc.date.created2005-02-21en
dc.date.issued2005en
dc.date.submitted2005-06-09en
dc.descriptionDissertation (MSc (Computer Science))--University of Pretoria, 2005.en
dc.description.abstractOperating System fingerprinting is a reconnaissance method used by Whitehats and Blackhats alike. Current techniques for fingerprinting do not take into account tunneling protocols, such as IPSec, SSL/TLS, and SSH, which effectively `wrap` network traffic in a ciphertext mantle, thus potentially rendering passive monitoring ineffectual. Whether encryption makes VPN tunnel endpoints immune to fingerprinting, or yields the encrypted contents of the VPN tunnel entirely indistinguishable, is a topic that has received modest coverage in academic literature. This study addresses these question by targeting two tunnelling protocols: IPSec and SSL/TLS. A new fingerprinting methodology is presented, several fingerprinting discriminants are identified, and test results are set forth, showing that endpoint identities can be uncovered, and that some of the contents of encrypted VPN tunnels can in fact be discerned.en
dc.description.availabilityunrestricteden
dc.description.departmentComputer Scienceen
dc.identifier.citationIzadinia, V 2005, Fingerprinting Encrypted Tunnel Endpoints, MSc dissertation, University of Pretoria, Pretoria, viewed yymmdd < http://hdl.handle.net/2263/25351 >en
dc.identifier.upetdurlhttp://upetd.up.ac.za/thesis/available/etd-06092005-093203/en
dc.identifier.urihttp://hdl.handle.net/2263/25351
dc.language.isoen
dc.publisherUniversity of Pretoriaen_ZA
dc.rights© 2005, University of Pretoria. All rights reserved. The copyright in this work vests in the University of Pretoria. No part of this work may be reproduced or transmitted in any form or by any means, without the prior written permission of the University of Pretoria.en
dc.subjectFingerprintingen
dc.subjectNetwork forensicsen
dc.subjectProtocol analysisen
dc.subjectIpsecen
dc.subjectIkeen
dc.subjectUCTDen_US
dc.titleFingerprinting Encrypted Tunnel Endpointsen
dc.typeDissertationen

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
00dissertation.pdf
Size:
4.42 MB
Format:
Adobe Portable Document Format