Activity Detection from Encrypted Remote Desktop Protocol Traffic

08/06/2020
by   L. Lapczyk, et al.
0

An increasing amount of Internet traffic has its content encrypted. We address the question of whether it is possible to predict the activities taking place over an encrypted channel, in particular Microsoft's Remote Desktop Protocol. We show that the presence of five typical activities can be detected with precision greater than 97% and recall greater than 94% in 30-second traces. We also show that the design of the protocol exposes fine-grained actions such as keystrokes and mouse movements which may be leveraged to reveal properties such as lengths of passwords.

READ FULL TEXT

page 3

page 8

page 9

research
03/25/2022

Deep Learning for Encrypted Traffic Classification and Unknown Data Detection

Despite the widespread use of encryption techniques to provide confident...
research
03/15/2019

White Mirror: Leaking Sensitive Information from Interactive Netflix Movies using Encrypted Traffic Analysis

Privacy leaks from Netflix videos/movies is well researched. Current sta...
research
04/16/2019

Decrypting SSL/TLS traffic for hidden threats detection

The paper presents an analysis of the main mechanisms of decryption of S...
research
01/01/2022

Impact of Evolving Protocols and COVID-19 on Internet Traffic Shares

The rapid deployment of new Internet protocols over the last few years a...
research
05/17/2022

Can You Still See Me?: Reconstructing Robot Operations Over End-to-End Encrypted Channels

Connected robots play a key role in Industry 4.0, providing automation a...
research
02/24/2022

Fine-grained TLS Services Classification with Reject Option

The recent success and proliferation of machine learning and deep learni...
research
01/16/2018

A First Look at QUIC in the Wild

For the first time since the establishment of TCP and UDP, the Internet ...

Please sign up or login with your details

Forgot password? Click here to reset