2015 10th International Conference on Availability, Reliability and Security 2015
DOI: 10.1109/ares.2015.35
|View full text |Cite
|
Sign up to set email alerts
|

Network-Based HTTPS Client Identification Using SSL/TLS Fingerprinting

Abstract: Abstract-The growing share of encrypted network traffic complicates network traffic analysis and network forensics. In this paper, we present real-time lightweight identification of HTTPS clients based on network monitoring and SSL/TLS fingerprinting. Our experiment shows that it is possible to estimate the UserAgent of a client in HTTPS communication via the analysis of the SSL/TLS handshake. The fingerprints of SSL/TLS handshakes, including a list of supported cipher suites, differ among clients and correlat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
17
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
5

Relationship

1
9

Authors

Journals

citations
Cited by 25 publications
(18 citation statements)
references
References 12 publications
(10 reference statements)
1
17
0
Order By: Relevance
“…Later, in 2012, Majkowski implemented SSL fingerprinting in p0f [36]. In 2015, Husá et al used client fingerprinting to broadly describe the types of HTTPS traffic on their institutional network [28], and in 2016, Brotherston showed how desktop applications could be identified by their Client Hello messages [9]. Concurrent to our work, Cisco showed that malware uses different TLS parameters than browsers [3].…”
Section: I I I R E L At E D W O R Ksupporting
confidence: 53%
“…Later, in 2012, Majkowski implemented SSL fingerprinting in p0f [36]. In 2015, Husá et al used client fingerprinting to broadly describe the types of HTTPS traffic on their institutional network [28], and in 2016, Brotherston showed how desktop applications could be identified by their Client Hello messages [9]. Concurrent to our work, Cisco showed that malware uses different TLS parameters than browsers [3].…”
Section: I I I R E L At E D W O R Ksupporting
confidence: 53%
“…Majkowski implemented fingerprinting for p0f [61]. Most closely related to our work, HusÃąk et al [55] did a study in which they linked HTTP user-agent to TLS cipher suite lists. They obtained 12,832 user-agent/cipher-suite links.…”
Section: Related Workmentioning
confidence: 99%
“…The data features originally used in fingerprinting were from TCP/IP headers, but more recent work has made use of features from HTTP headers [19], [26] and unencrypted fields from the TLS/SSL handshake [8], [14]. These features can be analyzed independently when only a single session's data is available, which is not uncommon in some scenarios.…”
Section: Introductionmentioning
confidence: 99%