Network Intell: Enabling the Non-Expert Analysis of Large Volumes of Intercepted Network Traffic

12/15/2017
by   Erwin van de Wiel, et al.
1

In criminal investigations, telecommunication wiretaps have become a common technique used by law enforcement. While phone-based wiretapping is well documented and the procedure for their execution are well known, the same cannot be said for Internet taps. Lawfully intercepted network traffic often contains a lot of encrypted traffic making it increasingly difficult to find useful information inside the traffic captured. The advent of Internet-of-Things further complicates the process for non-technical investigators. The current level of complexity of intercepted network traffic is close to a point where data cannot be analysed without supervision of a digital investigator with advanced network knowledge. Current investigations focus on analysing all traffic in a chronological manner and are predominately conducted on the data contents of the intercepted traffic. This approach often becomes overly arduous when the amount of data to be analysed becomes very large. In this paper, we propose a novel approach to analyse large amounts of intercepted network traffic based on network metadata. Our approach significantly reduces the duration of the analysis and also produces an insight view of analysing results for the non-technical investigator. We also test our approach with a large sample of network traffic data.

READ FULL TEXT

page 13

page 14

research
04/16/2019

Decrypting SSL/TLS traffic for hidden threats detection

The paper presents an analysis of the main mechanisms of decryption of S...
research
11/04/2019

Smart City Intelligent System Traffic Congestion Optimization using Internet Of Things

The raising level of traffic imposes a great demand in the growth of int...
research
09/07/2022

Large Scale Enrichment and Statistical Cyber Characterization of Network Traffic

Modern network sensors continuously produce enormous quantities of raw d...
research
03/23/2022

Towards Reproducible Network Traffic Analysis

Analysis techniques are critical for gaining insight into network traffi...
research
03/11/2016

Powering the Internet of Things with RIOT: Why? How? What is RIOT?

The crucial importance of software platforms was highlighted by recent e...
research
02/24/2023

A New Scheduler for URLLC in 5G NR IIoT Networks with Spatio-Temporal Traffic Correlations

This paper explores the issue of enabling Ultra-Reliable Low-Latency Com...
research
01/19/2023

OblivIO: Securing reactive programs by oblivious execution with bounded traffic overheads

Traffic analysis attacks remain a significant problem for online securit...

Please sign up or login with your details

Forgot password? Click here to reset