SlideShare a Scribd company logo
1 of 36
Encrypted Traffic Mining (TM)   e.g.  Leaks in Skype Benoit DuPasquier, Stefan Burschka
Contents ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ﺤﺮﺐ Who: Since Feb 2011 @ Torben Sebastian Antonino Francesco Noe Stefan Mischa ? Fabian Dago ©  Rouxel ©  Rouxel Antonio, Patrick, Hugo, Pascal, K-Pascal, Mehdi, Javier, Seili, Flo, Frederic, Markus, ...  Nur & Malcolm Ulrich, Ernst, ... Sakir, Benoit, Antonio Wurst ©  NASA
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],What: Apollo Projects
WTF is in it?
Traffic Mining:    Hidden Knowledge: Listen | See, Understand, Invariants    Model ,[object Object],[object Object],[object Object],[object Object],[object Object]
Traffic Mining: Encrypted Content Guessing ,[object Object],[object Object],[object Object]
If you plainly start listening to this 22:06:51.410006 IP 193.5.230.58.3910 > 193.5.238.12.80: P 1499:1566(67) ack 2000 win 64126 0x0000:  0000 0c07 ac0d 000f 1fcf 7c45 0800 4500  ..........|E..E. 0x0010:  006b 9634 4000 8006 0e06 c105 e63a c105  .k.4@........:.. 0x0020:  ee0c 0f46 0050 1b03 ae44 faba ef9e 5018  ...F.P...D....P. 0x0030:  fa7e 9c0a 0000  28d8 f103 e595 8451 ea09  .~....(......Q.. 0x0040:  ba2c 8e91 9139 55bf df8d 1e07 e701 7a09  .,...9U.......z. 0x0050:  cf96 8f05 84c2 58a8 d66b d52b 0a56 e480  ......X..k.+.V.. 0x0060:  472d e34b 87d2 5c64 695a 580f f649 5385  G-.K..iZX..IS. 0x0070 :  ea31 721f d699 f905 e7  .1r...... Payload Header You will end like that
Distinguish  from  by listening Gap in tracks So, what is the Task? Packet Length Packet Fire Rate (Interdistance) Sound   ~
Why Skype? ,[object Object],[object Object],[object Object],[object Object],EPFL
TM Exercise: See the features? Burschka  (Fischkopp) Linux Dominic  (Student) Windows Codec training Ping min l =3 SN
Hypotheses ,[object Object],[object Object],[object Object]
Parameters influencing IP output ,[object Object],[object Object],[object Object],[object Object]
Assumptions ,[object Object],[object Object],[object Object]
Basic Lab setup Phonem DB from Voice Recognition Project  with different speakers MS Windoof XP Pro Ver 2002 SP3 Intel(R) Core(TM) 2  E6750 @ 2.66 GHz 2.99 Gz RAM 2.00 GB Skype Version 4.0.0.224 Skype’s audio codec SILK
1. Engineering Approach: Influencing Parameters ,[object Object],[object Object],[object Object],[object Object],[object Object]
Derive the Transfer Function H
Example: Frequency sweep
Result: Skype Transfer Model Desync  packet generation process and codec output Speeds unsyncronized codec Ip layer
2. Mining Approach ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Attack, Comb, Decay, Sustain, Release Phoneme /  /, e.g. in word pleasure Find Homomorphism between 44 Phonems Commutativity f (a * b) = f (b * a) Additivity f (a * b) = f (a) * f (b)
Results: Signal Invariant Analysis ,[object Object],[object Object],[object Object],[object Object],[object Object]
Sentence Signals Same sentences, similar output     
Different Sentences same Speaker 
Signal Differentiation: Dynamic Time Warping (DTW) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Young children should avoid exposure to contagious diseases Matching DTW map path Optimal Path
Non-matching DTW map path Young children should avoid exposure to contagious diseases  The fog prevented them from arriving on time
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Results: Speaker dependent
[object Object],[object Object],[object Object],[object Object],Noise & Speaker Resilience  The Kalman Filter  (‘60ies) © Greg Welsh, Gary Bishop Our case: k = 0    F,H,Q,R const in time
[object Object],[object Object],[object Object],[object Object],[object Object],X,t1 Y,t2 Z,t3 Kalman Filter Functionality Average Estimator, Predictor
Example: Constant Line Estimation Estimation Goal Data Kalman Filter Estimation
Kalman Model for one Sentence
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Mitigation Techniques
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Conclusions
Next: All IP Signal Processing
Science is a way of thinking much more than it is a body of knowledge.  Carl Sagan Questions / Comments [email_address] http://sourceforge.net/projects/tranalyzer/ V0.57

More Related Content

What's hot

SPEKER RECOGNITION UNDER LIMITED DATA CODITION
SPEKER RECOGNITION UNDER LIMITED DATA CODITIONSPEKER RECOGNITION UNDER LIMITED DATA CODITION
SPEKER RECOGNITION UNDER LIMITED DATA CODITION
niranjan kumar
 

What's hot (6)

thesis_presentation
thesis_presentationthesis_presentation
thesis_presentation
 
1 AUDIO SIGNAL PROCESSING
1 AUDIO SIGNAL PROCESSING1 AUDIO SIGNAL PROCESSING
1 AUDIO SIGNAL PROCESSING
 
Audio Steganography synopsis
Audio Steganography synopsisAudio Steganography synopsis
Audio Steganography synopsis
 
T he SPL - IT Query by Example Search on Speech system for MediaEval 2014
T he SPL - IT Query by Example Search on Speech system for MediaEval 2014T he SPL - IT Query by Example Search on Speech system for MediaEval 2014
T he SPL - IT Query by Example Search on Speech system for MediaEval 2014
 
Text independent speaker recognition system
Text independent speaker recognition systemText independent speaker recognition system
Text independent speaker recognition system
 
SPEKER RECOGNITION UNDER LIMITED DATA CODITION
SPEKER RECOGNITION UNDER LIMITED DATA CODITIONSPEKER RECOGNITION UNDER LIMITED DATA CODITION
SPEKER RECOGNITION UNDER LIMITED DATA CODITION
 

Similar to Encrypted Traffic Mining

USRP Project Final Report
USRP Project Final ReportUSRP Project Final Report
USRP Project Final Report
Arjan Gupta
 
Optimal Communication Of Real Time Data On Secure Cdma Ip...
Optimal Communication Of Real Time Data On Secure Cdma Ip...Optimal Communication Of Real Time Data On Secure Cdma Ip...
Optimal Communication Of Real Time Data On Secure Cdma Ip...
Stefanie Yang
 
"An adaptive modular approach to the mining of sensor network ...
"An adaptive modular approach to the mining of sensor network ..."An adaptive modular approach to the mining of sensor network ...
"An adaptive modular approach to the mining of sensor network ...
butest
 
Lecture 2- Practical AD and DA Conveters (Online Learning).pptx
Lecture 2- Practical AD and DA Conveters (Online Learning).pptxLecture 2- Practical AD and DA Conveters (Online Learning).pptx
Lecture 2- Practical AD and DA Conveters (Online Learning).pptx
HamzaJaved306957
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 

Similar to Encrypted Traffic Mining (20)

Real-time Implementation of Sphere Decoder-based MIMO Wireless System (EUSIPC...
Real-time Implementation of Sphere Decoder-based MIMO Wireless System (EUSIPC...Real-time Implementation of Sphere Decoder-based MIMO Wireless System (EUSIPC...
Real-time Implementation of Sphere Decoder-based MIMO Wireless System (EUSIPC...
 
Discrete-Time Signal Processing
Discrete-Time Signal ProcessingDiscrete-Time Signal Processing
Discrete-Time Signal Processing
 
USRP Project Final Report
USRP Project Final ReportUSRP Project Final Report
USRP Project Final Report
 
Wireshark Basics
Wireshark BasicsWireshark Basics
Wireshark Basics
 
Mind the (Air)Gap: Checkmarx Research into NFC and Smart Bulb Data Exfiltration
Mind the (Air)Gap: Checkmarx Research into NFC and Smart Bulb Data ExfiltrationMind the (Air)Gap: Checkmarx Research into NFC and Smart Bulb Data Exfiltration
Mind the (Air)Gap: Checkmarx Research into NFC and Smart Bulb Data Exfiltration
 
Optimal Communication Of Real Time Data On Secure Cdma Ip...
Optimal Communication Of Real Time Data On Secure Cdma Ip...Optimal Communication Of Real Time Data On Secure Cdma Ip...
Optimal Communication Of Real Time Data On Secure Cdma Ip...
 
Titan X Research Paper
Titan X Research PaperTitan X Research Paper
Titan X Research Paper
 
FEC & File Multicast
FEC & File MulticastFEC & File Multicast
FEC & File Multicast
 
"An adaptive modular approach to the mining of sensor network ...
"An adaptive modular approach to the mining of sensor network ..."An adaptive modular approach to the mining of sensor network ...
"An adaptive modular approach to the mining of sensor network ...
 
Robust Speech Recognition Technique using Mat lab
Robust Speech Recognition Technique using Mat labRobust Speech Recognition Technique using Mat lab
Robust Speech Recognition Technique using Mat lab
 
Audio Steganography Coding Using the Discreet Wavelet Transforms
Audio Steganography Coding Using the Discreet Wavelet TransformsAudio Steganography Coding Using the Discreet Wavelet Transforms
Audio Steganography Coding Using the Discreet Wavelet Transforms
 
Performance Analysis of MIMO–OFDM for PCHBF , RELAY Technique with MMSE For T...
Performance Analysis of MIMO–OFDM for PCHBF , RELAY Technique with MMSE For T...Performance Analysis of MIMO–OFDM for PCHBF , RELAY Technique with MMSE For T...
Performance Analysis of MIMO–OFDM for PCHBF , RELAY Technique with MMSE For T...
 
Course report-islam-taharimul (1)
Course report-islam-taharimul (1)Course report-islam-taharimul (1)
Course report-islam-taharimul (1)
 
Lecture 2- Practical AD and DA Conveters (Online Learning).pptx
Lecture 2- Practical AD and DA Conveters (Online Learning).pptxLecture 2- Practical AD and DA Conveters (Online Learning).pptx
Lecture 2- Practical AD and DA Conveters (Online Learning).pptx
 
Asr
AsrAsr
Asr
 
Using Transcendental Number to Encrypt BlackBerry Video
Using Transcendental Number to Encrypt BlackBerry VideoUsing Transcendental Number to Encrypt BlackBerry Video
Using Transcendental Number to Encrypt BlackBerry Video
 
Erlang For Five Nines
Erlang For Five NinesErlang For Five Nines
Erlang For Five Nines
 
Realization and design of a pilot assist decision making system based on spee...
Realization and design of a pilot assist decision making system based on spee...Realization and design of a pilot assist decision making system based on spee...
Realization and design of a pilot assist decision making system based on spee...
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Plan_design and FPGA implement of MIMO OFDM SDM systems
Plan_design and FPGA implement of MIMO OFDM SDM systemsPlan_design and FPGA implement of MIMO OFDM SDM systems
Plan_design and FPGA implement of MIMO OFDM SDM systems
 

More from Henry Huang (7)

Exploring Docker in CI/CD
Exploring Docker in CI/CDExploring Docker in CI/CD
Exploring Docker in CI/CD
 
A Summary about Hykes' Keynote on Dockercon 2015
A Summary about Hykes' Keynote on Dockercon 2015A Summary about Hykes' Keynote on Dockercon 2015
A Summary about Hykes' Keynote on Dockercon 2015
 
Advanced Discussion on Cloud Formation
Advanced Discussion on Cloud FormationAdvanced Discussion on Cloud Formation
Advanced Discussion on Cloud Formation
 
DevOps, we need you.
DevOps, we need you.DevOps, we need you.
DevOps, we need you.
 
I am not a workaholic
I am not a workaholicI am not a workaholic
I am not a workaholic
 
New Way, New Truth
New Way, New TruthNew Way, New Truth
New Way, New Truth
 
Elastic cloud
Elastic cloudElastic cloud
Elastic cloud
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

Encrypted Traffic Mining

  • 1. Encrypted Traffic Mining (TM) e.g. Leaks in Skype Benoit DuPasquier, Stefan Burschka
  • 2.
  • 3. ﺤﺮﺐ Who: Since Feb 2011 @ Torben Sebastian Antonino Francesco Noe Stefan Mischa ? Fabian Dago © Rouxel © Rouxel Antonio, Patrick, Hugo, Pascal, K-Pascal, Mehdi, Javier, Seili, Flo, Frederic, Markus, ... Nur & Malcolm Ulrich, Ernst, ... Sakir, Benoit, Antonio Wurst © NASA
  • 4.
  • 5. WTF is in it?
  • 6.
  • 7.
  • 8. If you plainly start listening to this 22:06:51.410006 IP 193.5.230.58.3910 > 193.5.238.12.80: P 1499:1566(67) ack 2000 win 64126 0x0000: 0000 0c07 ac0d 000f 1fcf 7c45 0800 4500 ..........|E..E. 0x0010: 006b 9634 4000 8006 0e06 c105 e63a c105 .k.4@........:.. 0x0020: ee0c 0f46 0050 1b03 ae44 faba ef9e 5018 ...F.P...D....P. 0x0030: fa7e 9c0a 0000 28d8 f103 e595 8451 ea09 .~....(......Q.. 0x0040: ba2c 8e91 9139 55bf df8d 1e07 e701 7a09 .,...9U.......z. 0x0050: cf96 8f05 84c2 58a8 d66b d52b 0a56 e480 ......X..k.+.V.. 0x0060: 472d e34b 87d2 5c64 695a 580f f649 5385 G-.K..iZX..IS. 0x0070 : ea31 721f d699 f905 e7 .1r...... Payload Header You will end like that
  • 9. Distinguish from by listening Gap in tracks So, what is the Task? Packet Length Packet Fire Rate (Interdistance) Sound ~
  • 10.
  • 11. TM Exercise: See the features? Burschka (Fischkopp) Linux Dominic (Student) Windows Codec training Ping min l =3 SN
  • 12.
  • 13.
  • 14.
  • 15. Basic Lab setup Phonem DB from Voice Recognition Project with different speakers MS Windoof XP Pro Ver 2002 SP3 Intel(R) Core(TM) 2 E6750 @ 2.66 GHz 2.99 Gz RAM 2.00 GB Skype Version 4.0.0.224 Skype’s audio codec SILK
  • 16.
  • 17. Derive the Transfer Function H
  • 19. Result: Skype Transfer Model Desync packet generation process and codec output Speeds unsyncronized codec Ip layer
  • 20.
  • 21. Attack, Comb, Decay, Sustain, Release Phoneme / /, e.g. in word pleasure Find Homomorphism between 44 Phonems Commutativity f (a * b) = f (b * a) Additivity f (a * b) = f (a) * f (b)
  • 22.
  • 23. Sentence Signals Same sentences, similar output  
  • 25.
  • 26. Young children should avoid exposure to contagious diseases Matching DTW map path Optimal Path
  • 27. Non-matching DTW map path Young children should avoid exposure to contagious diseases The fog prevented them from arriving on time
  • 28.
  • 29.
  • 30.
  • 31. Example: Constant Line Estimation Estimation Goal Data Kalman Filter Estimation
  • 32. Kalman Model for one Sentence
  • 33.
  • 34.
  • 35. Next: All IP Signal Processing
  • 36. Science is a way of thinking much more than it is a body of knowledge. Carl Sagan Questions / Comments [email_address] http://sourceforge.net/projects/tranalyzer/ V0.57