Title
Taking a Peek at Bandwidth Usage on Encrypted Links
Abstract
In this paper we describe a practical yet effective technique to monitor the amount of bytes that several classes of protocols, such as peer-to-peer, e-mail, etc., transmit over encrypted virtual links, such as IPSec tunnels. The experiments described in this paper demonstrate that our regression-tree-based bandwidth estimator is effective enough to create usage models inherently robust to changes in path, number of users and type of protocols multiplexed over the encrypted link. In other words, our experimental results indicate that training data obtained from a test IPSec tunnel can be successfully used to monitor bandwidth usage on other encrypted tunnels where only the ciphertext is available.
Year
DOI
Venue
2011
10.1109/icc.2011.5963290
Communications
Keywords
Field
DocType
IP networks,bandwidth allocation,computer network security,cryptographic protocols,regression analysis,trees (mathematics),IPSec tunnels,bandwidth usage,ciphertext,e-mail,encrypted links,encrypted tunnels,encrypted virtual links,peer-to-peer,protocols,regression-tree-based bandwidth estimator,training data,usage models
Byte,IPsec,Bandwidth allocation,Computer science,Network security,Computer network,Encryption,Robustness (computer science),Bandwidth (signal processing),Ciphertext
Conference
ISSN
ISBN
Citations 
1550-3607 E-ISBN : 978-1-61284-231-8
978-1-61284-231-8
0
PageRank 
References 
Authors
0.34
11
4
Name
Order
Citations
PageRank
Maurizio Dusi130318.21
Alice Este21967.42
Francesco Gringoli389061.65
Luca Salgarelli493781.17