<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.3 20210610//EN" "JATS-journalpublishing1-3.dtd">
<article article-type="research-article" dtd-version="1.3" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xml:lang="ru"><front><journal-meta><journal-id journal-id-type="publisher-id">tuzsut</journal-id><journal-title-group><journal-title xml:lang="ru">Труды учебных заведений связи</journal-title><trans-title-group xml:lang="en"><trans-title>Proceedings of Telecommunication Universities</trans-title></trans-title-group></journal-title-group><issn pub-type="ppub">1813-324X</issn><issn pub-type="epub">2712-8830</issn><publisher><publisher-name>СПбГУТ</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="doi">10.31854/1813-324X-2022-8-4-109-118</article-id><article-id custom-type="elpub" pub-id-type="custom">tuzsut-422</article-id><article-categories><subj-group subj-group-type="heading"><subject>Research Article</subject></subj-group><subj-group subj-group-type="section-heading" xml:lang="ru"><subject>РЕЗУЛЬТАТЫ ИССЛЕДОВАНИЙ МОЛОДЫХ УЧЕНЫХ</subject></subj-group><subj-group subj-group-type="section-heading" xml:lang="en"><subject>RESEARCH RESULTS BY YOUNG SCIENTISTS</subject></subj-group></article-categories><title-group><article-title>Способ и алгоритм определения типа трафика в шифрованном канале связи</article-title><trans-title-group xml:lang="en"><trans-title>Method and Algorithm for Determining the Type of Traffic in an Encrypted Communication Channel</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author" corresp="yes"><contrib-id contrib-id-type="orcid">https://orcid.org/0000-0002-4006-3693</contrib-id><name-alternatives><name name-style="eastern" xml:lang="ru"><surname>Ишкуватов</surname><given-names>С. М.</given-names></name><name name-style="western" xml:lang="en"><surname>Ishkuvatov</surname><given-names>S.</given-names></name></name-alternatives><bio xml:lang="ru"><p>Ишкуватов Сергей Маратович, аспирант факультета безопасности информационных технологий</p><p>Санкт-Петербург, 197101</p></bio><bio xml:lang="en"><p>Sergei Ishkuvatov</p><p>St. Petersburg, 197101</p></bio><email xlink:type="simple">sysroot0@gmail.com</email><xref ref-type="aff" rid="aff-1"/></contrib></contrib-group><aff-alternatives id="aff-1"><aff xml:lang="ru">Национальный исследовательский университет ИТМО<country>Россия</country></aff><aff xml:lang="en">ITMO University<country>Russian Federation</country></aff></aff-alternatives><pub-date pub-type="collection"><year>2022</year></pub-date><pub-date pub-type="epub"><day>10</day><month>01</month><year>2023</year></pub-date><volume>8</volume><issue>4</issue><fpage>109</fpage><lpage>118</lpage><permissions><copyright-statement>Copyright &amp;#x00A9; Ишкуватов С.М., 2023</copyright-statement><copyright-year>2023</copyright-year><copyright-holder xml:lang="ru">Ишкуватов С.М.</copyright-holder><copyright-holder xml:lang="en">Ishkuvatov S.</copyright-holder><license license-type="creative-commons-attribution" xlink:href="https://creativecommons.org/licenses/by/4.0/" xlink:type="simple"><license-p>This work is licensed under a Creative Commons Attribution 4.0 License.</license-p></license></permissions><self-uri xlink:href="https://tuzs.sut.ru/jour/article/view/422">https://tuzs.sut.ru/jour/article/view/422</self-uri><abstract><p>В статье предложен способ определения состава протоколов, применяемых в IPsec-канале связи, на основе закономерностей хронологии следования и длин пакетов с шифрованной нагрузкой. Рассмотрены характерные информативные признаки протоколов. Приведен алгоритм, позволяющий получить значения длин ESP-пакетов, содержащих произвольные пользовательские данные, для распространенных режимов работы IPsec-туннеля. </p></abstract><trans-abstract xml:lang="en"><p>The article proposes a method for determining the composition of protocols used in IPsec communication channel, based on the regularities of the chronology and the lengths of encrypted load packets. The characteristic informative features of the protocols are considered. An algorithm is given to obtain the length values of ESP packets containing arbitrary user data for common modes of IPsec tunnel operation.</p></trans-abstract><kwd-group xml:lang="ru"><kwd>шифрование</kwd><kwd>пассивный наблюдатель</kwd><kwd>Virtual Private Network</kwd><kwd>IPsec-туннель</kwd></kwd-group><kwd-group xml:lang="en"><kwd>encryption</kwd><kwd>passive observer</kwd><kwd>Virtual Private Network</kwd><kwd>IPsec tunnel</kwd></kwd-group></article-meta></front><back><ref-list><title>References</title><ref id="cit1"><label>1</label><citation-alternatives><mixed-citation xml:lang="ru">Rasteh A., Delpech F., Aguilar-Melchor C., Zimmer R., Shouraki S.B., Masquelier T. Encrypted Internet Traffic Classification Using a Supervised Spiking Neural Network // arXiv preprint arXiv:2101.09818. 2022. URL: https://arxiv.org/pdf/2101.09818 (дата обращения 07.01.2022).</mixed-citation><mixed-citation xml:lang="en">Rasteh A., Delpech F., Aguilar-Melchor C., Zimmer R., Shouraki S.B., Masquelier T. Encrypted Internet Traffic Classification Using a Supervised Spiking Neural Network. arXiv preprint arXiv:2101.09818. 2022. URL: https://arxiv.org/pdf/2101.09818 [Accessed 07.01.2022]</mixed-citation></citation-alternatives></ref><ref id="cit2"><label>2</label><citation-alternatives><mixed-citation xml:lang="ru">Gupta N., Jindal V., Bedi P. Encrypted Traffic Classification Using eXtreme Gradient Boosting Algorithm // Proceedings of the International Conference on Innovative Computing and Communications (ICICC 2021, Delhi, India, February 2021). Advances in Intelligent Systems and Computing (AISC). Vol. 1394. Singapore: Springer, 2022. PP. 225‒232. DOI:10.1007/978-981-16-3071-2_20</mixed-citation><mixed-citation xml:lang="en">Gupta N., Jindal V., Bedi P. Encrypted Traffic Classification Using eXtreme Gradient Boosting Algorithm. Proceedings of the International Conference on Innovative Computing and Communications, ICICC 2021, February 2021, Delhi, India. Advances in Intelligent Systems and Computing (AISC). Singapore: Springer; 2022. vol.1394. p.225‒232. DOI:10.1007/978-981-16-3071-2_20</mixed-citation></citation-alternatives></ref><ref id="cit3"><label>3</label><citation-alternatives><mixed-citation xml:lang="ru">Draper-Gil G., Lashkari A.H., Mamun M., Ghorbani A. Characterization of Encrypted and VPN Traffic Using Time-Related // Proceedings of the 2nd International Conference on Information Systems Security and Privacy (ICISSP, Rome, Italy, 19‒21 February 2016). 2016. PP. 407‒414. DOI:10.5220/0005740704070414</mixed-citation><mixed-citation xml:lang="en">Draper-Gil G., Lashkari A.H., Mamun M., Ghorbani A. Characterization of Encrypted and VPN Traffic Using Time-Related. Proceedings of the 2nd International Conference on Information Systems Security and Privacy, ICISSP, 19‒21 February 2016, Rome, Italy. 2016. p.407‒414. DOI:10.5220/0005740704070414</mixed-citation></citation-alternatives></ref><ref id="cit4"><label>4</label><citation-alternatives><mixed-citation xml:lang="ru">Islam F.U., Liu G., Liu W. Identifying VoIP traffic in VPN tunnel via Flow Spatio-Temporal Features // Mathematical Biosciences and Engineering. 2020. Vol. 17. Iss. 5. PP. 4747‒4772. DOI:10.3934/mbe.2020260</mixed-citation><mixed-citation xml:lang="en">Islam F.U., Liu G., Liu W. Identifying VoIP traffic in VPN tunnel via Flow Spatio-Temporal Features. Mathematical Biosciences and Engineering. 2020;17(5):4747‒4772. DOI:10.3934/mbe.2020260</mixed-citation></citation-alternatives></ref><ref id="cit5"><label>5</label><citation-alternatives><mixed-citation xml:lang="ru">Kent S., Seo K. Security Architecture for the Internet Protocol. No. rfc4301. 2005.</mixed-citation><mixed-citation xml:lang="en">Kent S., Seo K. Security Architecture for the Internet Protocol. No. rfc4301. 2005.</mixed-citation></citation-alternatives></ref><ref id="cit6"><label>6</label><citation-alternatives><mixed-citation xml:lang="ru">Atkinson R. IP Encapsulating Security Payload (ESP). No. rfc1827. 1995.</mixed-citation><mixed-citation xml:lang="en">Atkinson R. IP Encapsulating Security Payload (ESP). No. rfc1827. 1995.</mixed-citation></citation-alternatives></ref><ref id="cit7"><label>7</label><citation-alternatives><mixed-citation xml:lang="ru">Xenakis C., Laoutaris N., Merakos L., Stavrakakis I. A generic characterization of the overheads imposed by IPsec and associated cryptographic algorithms // Computer Networks. 2006. Vol. 50. Iss. 17. PP. 3225‒3241. DOI:10.1016/j.comnet.2005.12.005</mixed-citation><mixed-citation xml:lang="en">Xenakis C., Laoutaris N., Merakos L., Stavrakakis I. A generic characterization of the overheads imposed by IPsec and associated cryptographic algorithms. Computer Networks. 2006;50(17):3225‒3241. DOI:10.1016/j.comnet.2005.12.005</mixed-citation></citation-alternatives></ref><ref id="cit8"><label>8</label><citation-alternatives><mixed-citation xml:lang="ru">Дмитренко А. Изучаем и выявляем уязвимости протокола IPsec // Хакер. 2015 URL: https://xakep.ru/2015/05/13/ipsec-security-flaws (дата обращения 06.04.2022)</mixed-citation><mixed-citation xml:lang="en">Dmitrenko A. Studying and identifying IPsec protocol vulnerabilities. Khaker. 2015. (in Russ.) URL: https://xakep.ru/2015/05/13/ipsec-security-flaws [Accessed 06th April 2022]</mixed-citation></citation-alternatives></ref><ref id="cit9"><label>9</label><citation-alternatives><mixed-citation xml:lang="ru">Akhter A. IPSec Packet Size Calculator // Cisco Community. URL: https://community.cisco.com/legacyfs/online/legacy/4/8/7/27784-IPSec_Calculator_NAT_GRE-Key.htm (дата обращения 24.01.2022)</mixed-citation><mixed-citation xml:lang="en">Akhter A. IPSec Packet Size Calculator. Cisco Community. URL: https://community.cisco.com/legacyfs/online/legacy/4/8/7/27784-IPSec_Calculator_NAT_GRE-Key.htm [Accessed 24th January 2022]</mixed-citation></citation-alternatives></ref><ref id="cit10"><label>10</label><citation-alternatives><mixed-citation xml:lang="ru">encapcalc // GitHub. URL: http://github.com/dmbaturin/encapcalc (дата обращения 09.06.2022)</mixed-citation><mixed-citation xml:lang="en">GitHub. encapcalc. URL: http://github.com/dmbaturin/encapcalc [Accessed 09th June 2022]</mixed-citation></citation-alternatives></ref><ref id="cit11"><label>11</label><citation-alternatives><mixed-citation xml:lang="ru">Pérez J.A., Cabrera V.Z.C., Jenecek J. Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic // Advanced Int’l Conference on Telecommunications and Int’l Conference on Internet and Web Applications and Services (AICT-ICIW’06, Guadelope, French Caribbean, 19‒25 February 2006). 2006. URL: https://www.its.bldrdoc.gov/media/33388/per_j_slides1.pdf [Accessed 16th January 2022]</mixed-citation><mixed-citation xml:lang="en">Pérez J.A., Cabrera V.Z.C., Jenecek J. Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic. Advanced Int’l Conference on Telecommunications and Int’l Conference on Internet and Web Applications and Services AICT-ICIW’06, 19‒25 February 2006, Guadelope, French Caribbean. 2006. URL: https://www.its.bldrdoc.gov/media/33388/per_j_slides1.pdf [Accessed 16th January 2022]</mixed-citation></citation-alternatives></ref><ref id="cit12"><label>12</label><citation-alternatives><mixed-citation xml:lang="ru">Ишкуватов С.М., Комаров И.И. Анализ аутентичности трафика на основании данных цифровых отпечатков реализаций сетевых протоколов // Научно-технический вестник информационных технологий, механики и оптики. 2020. Т. 20. № 5. С. 747‒754. DOI:10.17586/2226-1494-2020-20-5-747-754</mixed-citation><mixed-citation xml:lang="en">Ishkuvatov S.M., Komarov I.I. Traffic Authenticity Analysis Based on Digital fingerprint Data of Network Protocol Implementations. Scientific and Technical Journal of Information Technologies, Mechanics and Optics. 2020;20(5):747‒754. DOI:10.17586/2226-1494-2020-20-5-747-754</mixed-citation></citation-alternatives></ref><ref id="cit13"><label>13</label><citation-alternatives><mixed-citation xml:lang="ru">Lapczyk L., Skillicorn D.B. Activity Detection from Encrypted Remote Desktop Protocol Traffic // arXiv preprint arXiv:2008.02685. 2020. DOI:10.48550/arXiv.2008.02685</mixed-citation><mixed-citation xml:lang="en">Lapczyk L., Skillicorn D.B. Activity Detection from Encrypted Remote Desktop Protocol Traffic. arXiv preprint arXiv:2008.02685. 2020. DOI:10.48550/arXiv.2008.02685</mixed-citation></citation-alternatives></ref><ref id="cit14"><label>14</label><citation-alternatives><mixed-citation xml:lang="ru">Urdaneta G., Pierre G., Steen M.V. A survey of DHT security techniques // ACM Computing Surveys. 2011. Vol. 43. Iss. 2. PP. 1‒49. DOI:10.1145/1883612.1883615</mixed-citation><mixed-citation xml:lang="en">Urdaneta G., Pierre G., Steen M.V. A survey of DHT security techniques. ACM Computing Surveys. 2011;43(2):1‒49. DOI:10.1145/1883612.1883615</mixed-citation></citation-alternatives></ref><ref id="cit15"><label>15</label><citation-alternatives><mixed-citation xml:lang="ru">Kiraly C., Teofili S., Bianchi G., Cigno R.L., Nardelli M., Delzeri E. Traffic Flow Confidentiality in IPsec: Protocol and Implementation // Proceedings of the 3rd IFIP WG 9.2, 9.6/11.6, 11.7/FIDIS International Summer School on the Future of Identity in the Information Society (Karlstad University, Sweden, 4‒10 August 2007). The International Federation for Information Processing. Vol. 262. Boston: Springer, 2007. PP. 311‒324. DOI:10.1007/978-0-387-79026-8_22</mixed-citation><mixed-citation xml:lang="en">Kiraly C., Teofili S., Bianchi G., Cigno R.L., Nardelli M., Delzeri E. Traffic Flow Confidentiality in IPsec: Protocol and Implementation. Proceedings of the 3rd IFIP WG 9.2, 9.6/11.6, 11.7/FIDIS International Summer School on the Future of Identity in the Information Society, 4‒10 August 2007, Karlstad University, Sweden. The International Federation for Information Processing. vol. 262. Boston: Springer; 2007. p.311‒324. DOI:10.1007/978-0-387-79026-8_22</mixed-citation></citation-alternatives></ref></ref-list><fn-group><fn fn-type="conflict"><p>The authors declare that there are no conflicts of interest present.</p></fn></fn-group></back></article>
