Classification of Encrypted IoT Traffic Despite Padding and Shaping

10/21/2021
by   Aviv Engelberg, et al.
0

It is well known that when IoT traffic is unencrypted it is possible to identify the active devices based on their TCP/IP headers. And when traffic is encrypted, packet-sizes and timings can still be used to do so. To defend against such fingerprinting, traffic padding and shaping were introduced. In this paper we demonstrate that the packet-sizes distribution can still be used to successfully fingerprint the active IoT devices when shaping and padding are used, as long as the adversary is aware that these mitigations are deployed, and even if the values of the padding and shaping parameters are unknown. The main tool we use in our analysis is the full distribution of packet-sizes, as opposed to commonly used statistics such as mean and variance. We further show how an external adversary who only sees the padded and shaped traffic as aggregated and hidden behind a NAT middlebox can accurately identify the subset of active devices with Recall and Precision of at least 96 the adversary can distinguish time windows containing only bogus cover packets from windows with real device activity, at a granularity of 1sec time windows, with 81 defender's side, we are also able to detect anomalous activities in IoT traffic due to the Mirai worm.

READ FULL TEXT

page 5

page 6

page 8

page 9

page 10

research
05/30/2021

IoTAthena: Unveiling IoT Device Activities from Network Traffic

The recent spate of cyber attacks towards Internet of Things (IoT) devic...
research
04/19/2022

Differentiating Network Flows for Priority-Aware Scheduling of Incoming Packets in Real-Time IoT Systems

When IP-packet processing is unconditionally carried out on behalf of an...
research
09/08/2021

Data Aggregation in Synchronous Large-scale IoT Networks: Granularity, Reliability, and Delay Tradeoffs

This paper studies data aggregation in large-scale regularly deployed In...
research
05/07/2018

Detecting Compressed Cleartext Traffic from Consumer Internet of Things Devices

Data encryption is the primary method of protecting the privacy of consu...
research
01/15/2019

Early Detection Of Mirai-Like IoT Bots In Large-Scale Networks Through Sub-Sampled Packet Traffic Analysis

The widespread adoption of Internet of Things has led to many security i...
research
09/12/2023

Random Segmentation: New Traffic Obfuscation against Packet-Size-Based Side-Channel Attacks

Despite encryption, the packet size is still visible, enabling observers...
research
01/07/2020

Towards Practical Encrypted Network Traffic Pattern Matching for Secure Middleboxes

Network Function Virtualisation (NFV) advances the development of compos...

Please sign up or login with your details

Forgot password? Click here to reset