{"title":"Insights into Encrypted Network Connections: Analyzing Remote Desktop Protocol Traffic","authors":"M. Ussath, Feng Cheng, C. Meinel","doi":"10.1109/PDP.2016.38","DOIUrl":null,"url":null,"abstract":"An increasing number of network connections are encrypted to protect the confidentiality of the transferred data. Also attackers make greater use of encrypted protocols to hide from detection and to hinder investigations. Currently, most security systems (e.g., Intrusion Detection Systems (IDSs) and firewalls) cannot effectively analyze encrypted traffic. This results in \"blind spots\", which can put the security of a whole environment at risk. In this paper, we propose a system that is capable of investigating encrypted Remote Desktop Protocol (RDP) connections. In the first step the private RSA key of the RDP server is used to decrypt the TLS/SSL layer of the RDP stream. In the second step our system extracts all relevant information (e.g., keystrokes and transferred files) from the RDP connection. This information makes it possible to reconstruct the behavior and the activities of an attacker with a high accuracy. For the evaluation of our approach we performed a scan of 231,025 internet facing RDP systems and revealed that over 95 % of the RDP connections to these systems can be decrypted with our system.","PeriodicalId":192273,"journal":{"name":"2016 24th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (PDP)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 24th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (PDP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PDP.2016.38","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
An increasing number of network connections are encrypted to protect the confidentiality of the transferred data. Also attackers make greater use of encrypted protocols to hide from detection and to hinder investigations. Currently, most security systems (e.g., Intrusion Detection Systems (IDSs) and firewalls) cannot effectively analyze encrypted traffic. This results in "blind spots", which can put the security of a whole environment at risk. In this paper, we propose a system that is capable of investigating encrypted Remote Desktop Protocol (RDP) connections. In the first step the private RSA key of the RDP server is used to decrypt the TLS/SSL layer of the RDP stream. In the second step our system extracts all relevant information (e.g., keystrokes and transferred files) from the RDP connection. This information makes it possible to reconstruct the behavior and the activities of an attacker with a high accuracy. For the evaluation of our approach we performed a scan of 231,025 internet facing RDP systems and revealed that over 95 % of the RDP connections to these systems can be decrypted with our system.