Ing 4
Ing 4
Encrypted Traffic
M.A.K.Sudozai, Shahzad Saleem
School of Electrical Engineering and Computer Science
National University of Sciences and Technology
Islamabad, Pakistan
{asad.khan,shahzad.saleem}@seecs.edu.pk
Abstract—Increased use of secure chat and voice/ video apps stored contents (device forensics) [5] and (ii) study of network
has transformed the social life. While the benefits and facilitations traffic of these apps (network forensics) [6]. The study of
are seemingly limitless, so are the asscoiacted vulnerabilities network traffic of these apps can further be classified into
and threats. Besides ensuring confidentiality requirements for
common users, known facts of non-readable contents over the two different perspectives, (i) to find vulnerabilities in the
network make these apps more attractive for criminals. Though security architecture of these apps (ii) by carrying out the
access to contents of cryptograhically secure sessions is not behaviour analysis of traffic, find out fixed patterns which
possible, network forensics of secure apps can provide interesting lead to draw useful information about the users and identify
information which can be of great help during criminal invetiga- different events. Breaking cryptographic primitives is indeed
tions. In this paper, we presented a novel framework of profiling
the secure chat and voice/ video calling apps which can be a hard domain so as the underlying security protocols but
employed to extract hidden patterns about the app, information extensive studies of number of secure apps [7] have revealed
of involved parties, activities of chatting, voice/ video calls, status that quiet a useful information about the users and related
indications and notifications while having no information of events can still be extracted from these apps.
communication protocol of the app and its security architecture. In this paper, we presented a fundamental framework
Signatures of any secure app can be developed though our
framework and can become base of a large scale solution. Our comprising of number of techniques which can be used to
methodology is considered very important for different cases of profile the social media apps from their encrypted contents
criminal investigations and bussiness intelligence solutions for through extensive network traffic analysis. Our focus was
service provider networks. Our results are applicable to any not to highlight the vulnerabilities of cryptographic primitives
mobile platform of iOS, android and windows. used in different social media apps, rather we outlined the
Index Terms—Confidentiality, cryptography, chat and voice/ combination of techniques which can characterize their unique
video app, network forensic, iOS, android, windows. patterns based on which classification of different social media
apps can be made. Our results are based on study of traffic
I. I NTRODUCTION behaviour of client server communications of secure apps
After observing repeated connections on UDP port 7985, D. Identification of User IPs in Peer to Peer Scenerio
we imposed restrictions on UDP port 7985 through firewall. A very important finding of traffic analysis of chat and
This rule on firewall forced the viber server-client connectivity calling apps is determination of involved parties through their
mechanism to shift to alternate ports kept in the deisgn. We IPs. Knowing the server ranges of a particular app as discussed
observed that the Viber client established the connection with in Section IV-C, one can identify one user atleast from tarffic
its server on new destination UDP port of 7987 now as shown analysis activity. Let we re-consider the case study of profiling
in Figure 3. Through this method, we verified that viber Viber voice call as discussed in Section IV-B, it is evident
from Figure 2 that IP of one user is clearly identifiable. For
voice/ video calls, it was observed that multiple sessions are
attempted from server to client in parallel to get the traffic off-
Fig. 3. Viber Connection on Server UDP port 7987 loaded from servers. This feature seems logical for facilitating
real time processing, however P2P connections are attempted
establishes the voice calls on UDP ports of 7985, 7987 , 5243 depending upon few conditions of bandwidth capacity of the
and 9785. client. This phenemenon is very common in many of the secure
Step wise triggering the events like messaging, voice calls, chat and voice/ video calling apps. During the study of their
video calls, group activities and file sharing followed by traffic dumps, IPs of both the calling and caller parties can be
recording the progressive flow of observations can help to identifed. This can be a very critical finding for any criminal
define the firewall rule sets. The progressive flow of firewall investigation where both the involved parties are identified.
rule sets in relation to Viber traffic sniffing scenerio is outlined For our case study of Viber voice call, Figure 4 demonstrates
3URFHHGLQJVRIWK,QWHUQDWLRQDO%KXUEDQ&RQIHUHQFHRQ$SSOLHG6FLHQFHV 7HFKQRORJ\ ,%&$67
Authorized licensed use limited to: ULAKBIM-UASL - Abant Izzet Baysal Univ Library. Downloaded on November 18,2023 at 17:34:03 UTC from IEEE Xplore. Restrictions apply.
,VODPDEDG3DNLVWDQWK±WK-DQXDU\
Step Protocol Source Port Dest Port Action Observation
I Any Any Any Any Server UDP port connections on 7985
II UDP 7985 Any Block
UDP Any 7985 Block UDP port connections on 7987
III UDP 7985, 7987 Any Block
UDP Any 7985, 7987 Block UDP port connection on 5243
IV UDP 7985, 7987, 5243 Any Block
UDP Any 7985, 7987,5243 Block UDP port connection on 9785
V UDP 7985, 7987, 5243, 9785 Any Block
UDP Any 7985, 7987, 5243, 9785 Block UDP connection failed
TABLE I
P ROGRESSIVE FIREWALL RULE SETS FOR V IBER
16) File sharing scenerio of different sizes, for example from server to client and from client to server for
images of different sizes, voice and video transmissions. different events. The fixed ports, if maintained during the
17) User closes the app. sessions, can be utilized to extract reliable information
After listing the possible events against different services through filtering the traffic flows.
offered by secure chat and voice/ video calling apps, one must The complete framework of profiling a secure chat/ calling
trigger each of the event in a controlled setup as described mobile app is depicted in a flow diagram as shown in Figure 6.
in Section IV-B and analyze the traffic behaviour. To carry Starting from traffic capture after accessing the app, deter-
out this extensive work of deep traffic analysis and point out mining server ranges is done through employment of strict
fixed patterns, many techniques are applied as a standalone policy control mechanism. This is then followed by source
or in combination with others depending upon the observed and destination ports identification for chat and call events
patterns of the target app. Starting with observing the general again in a adaptive firewall environment. Analysis of peer to
patterns of traffic flows, increased reliability and accuracy can peer connections and their used ports can lead to information
be achieved by carrying out behaviour analysis of exchanged about the caller and calling parties. Finally, the number of
bytes in consonance to triggered events. Based on our research events of chat and calling services including their notifications
on number of secure chat and voice/ video calling apps, few of can be profiled by carrying out the extensive traffic behaviour
the techniques are listed which can be employed in number of analysis.
different combinations depending upon the designs of target Let we correlate the typical case scenerio of WhatsApp
apps: with our framework of profiling it while the app provides end
1) Inspection of byte patterns is carried out by repeating to end encryption features over the network. Based on our
the forced events in a firewalled controlled scenerio. methodolgy, detection of WhatsApp traffic over the network
2) Frequency of bytes exchanged for different events. is possible due to step-wise determination of WhatsApp server
3) Acks and responses between server and client. ranges, identification of IPs of possible cases of P2P and
4) Payload sizes for different services and their uniqueness finding out the UDP ports used during the voice/ video
with respect to different events. calls. Further classification of activities of a WhatsApp user
5) Tracking/ monitoring the state changes within control can be established through intense behaviour analysis of
and data traffic for different triggered events to extract encrypted traffic. Against the possible events of WhatsApp
useful information which can leas to correct identifica- like chat, voice messages, voice calls, video calls, media and
tion of a particular event. file sharings, user status notifications including online and
6) Duration of voice and video calls vs bytes being ex- last seen, message delivered and message read, group mes-
changed with their sizes and frequency measurements. sages and their status, message deletion activities and location
7) Byte patterns during the events of shifting from voice sharing, complete signatures of WhatsApp can be developed.
to video or vise-versa and typing and sending the text Comprehensive account of our results on profiling WhatsApp
during the call. and IMO calling and chat applications are being published
8) Counts of events for each triggered service. separately. However, partial demonstration of application of
9) Following the flows of traffic through protocol analyzers these techniques without the context of control policy enforced
3URFHHGLQJVRIWK,QWHUQDWLRQDO%KXUEDQ&RQIHUHQFHRQ$SSOLHG6FLHQFHV 7HFKQRORJ\ ,%&$67
Authorized licensed use limited to: ULAKBIM-UASL - Abant Izzet Baysal Univ Library. Downloaded on November 18,2023 at 17:34:03 UTC from IEEE Xplore. Restrictions apply.
,VODPDEDG3DNLVWDQWK±WK-DQXDU\
by firewall can be found in [24]. [11] N. Al Mutawa, I. Baggili, and A. Marrington, “Forensic analysis of
As each app has its peculiar design and underlying platform social networking applications on mobile devices,” Digital Investigation,
vol. 9, pp. S24–S33, 2012.
with varied protocols used, the proposed methodology can be [12] Y.-C. Tso, S.-J. Wang, C.-T. Huang, and W.-J. Wang, “iphone social
employed to develop large scale solution to identify the events networking for evidence investigations using itunes forensics,” in Pro-
and their respective apps on variety of network monitoring ceedings of the 6th International Conference on Ubiquitous Information
Management and Communication. ACM, 2012, p. 62.
scenerios. Moreover, solutions of bussiness intelligence can [13] A. Dainotti, A. Pescape, and K. C. Claffy, “Issues and future directions
also utilize our methodology to get hueristics of different apps in traffic classification,” IEEE network, vol. 26, no. 1, pp. 35–40, 2012.
and improve the efficiency of their deployed solutions in terms [14] B. Dupasquier, S. Burschka, K. McLaughlin, and S. Sezer, “Analysis of
information leakage from encrypted skype conversations,” International
of network performance and optimizations. Journal of Information Security, vol. 9, no. 5, pp. 313–325, 2010.
[15] S. Molnár and M. Perényi, “On the identification and analysis of skype
traffic,” International Journal of communication systems, vol. 24, no. 1,
V. C ONCLUSION pp. 94–117, 2011.
In this paper, we presented a framework of profiling the [16] C. Anglano, M. Canonico, and M. Guazzone, “Forensic analysis of
the chatsecure instant messaging application on android smartphones,”
secure chat and calling apps from encrypted contents which is Digital Investigation, vol. 19, pp. 44–59, 2016.
considered a facet of network forensics. Our methodology of [17] S. Wu, Y. Zhang, X. Wang, X. Xiong, and L. Du, “Forensic analysis of
employing firewall in traffic sniffing and analysis applications wechat on android smartphones,” Digital Investigation, vol. 21, pp. 3 –
10, 2017.
conducts different experiments in a controlled environment [18] C. Anglano, “Forensic analysis of whatsapp messenger on android
and forces the client of target app to try all options of smartphones,” Digital Investigation, vol. 11, no. 3, pp. 201–213, 2014.
connectivity with its servers. In this way, one can identify the [19] F. Karpisek, I. Baggili, and F. Breitinger, “Whatsapp network forensics:
Decrypting and understanding the whatsapp call signaling messages,”
hidden patterns of communication protocol and extract useful Digital Investigation, vol. 15, pp. 110–118, 2015.
information about users and their activities. Starting from [20] A. Majeed, H. Zia, R. Imran, and S. Saleem, “Forensic analysis of three
correct detection of target app from encrypted network traffic, social media apps in windows 10,” in High-Capacity Optical Networks
and Enabling/Emerging Technologies (HONET), 2015 12th International
our results of traffic behaviour classify different activities of Conference on. IEEE, 2015, pp. 1–5.
the users like messaging, stauts identifications, notifications, [21] M. Appelman, J. Bosma, and G. Veerman, “Viber communication
file sharing ,voice and video calls. It is important to note security,” System and network of engineering, university of Amsterdam,
Netherlands, 2011.
that our proposed techniques may be used in any combination [22] R. Marik, P. Bezpalec, J. Kucerak, and L. Kencl, “Revealing viber
depending upon the design of the target app and its security communication patterns to assess protocol vulnerability,” in 2015 In-
architecture. Solutions at large scale can be developed to ternational Conference on Computing and Network Communications
(CoCoNet). IEEE, 2015, pp. 496–504.
embed signatures of different apps and can be utilized in [23] I. Rakuten, “Viber Encryption Overview,”
criminal investigations and bussiness itelligence solutions for http://www.viber.com/en/security-overview, 1997 (accessed 30-August-
networks. It is important to note that our methodology is 2016).
[24] M. Sudozai, N. Habib, S. Saleem, and A. Khan, “Signatures of viber
not only applicable to chat and voice/ video calling apps but security traffic,” Journal of Digital Forensics, Security and Law, vol. 12,
can be generalized to other social media applications with no. 2, p. 11, 2017.
slight variations for any mobile platform of Android, iOS and [25] O. Gasser, Q. Scheitle, S. Gebhard, and G. Carle, “Scanning
the ipv6 internet: towards a comprehensive hitlist,” arXiv preprint
windows. arXiv:1607.05179, 2016.
[26] P. Saint-Andre, K. Smith, and R. Tronçon, XMPP: the definitive guide.
R EFERENCES ” O’Reilly Media, Inc.”, 2009.
[27] A. Hornsby and R. Walsh, “From instant messaging to cloud computing,
[1] T. Barot and E. Oren, “Guide to chat apps,” Tow Center for Digital an xmpp review,” in Consumer Electronics (ISCE), 2010 IEEE 14th
Journalism, 2015. International Symposium on. IEEE, 2010, pp. 1–6.
[2] M. S. Melara, A. Blankstein, J. Bonneau, E. W. Felten, and M. J. [28] K. Cohn-Gordon, C. Cremers, B. Dowling, L. Garratt, and D. Stebila, “A
Freedman, “Coniks: Bringing key transparency to end users.” in USENIX formal security analysis of the signal messaging protocol,” in Security
Security Symposium, 2015, pp. 383–398. and Privacy (EuroS&P), 2017 IEEE European Symposium on. IEEE,
[3] T. B. Tan, “Rebalancing encrypted messaging apps,” 2016. 2017, pp. 451–466.
[4] D. Walnycky, I. Baggili, A. Marrington, J. Moore, and F. Breitinger, [29] Y. S. Yilmaz, B. I. Aydin, and M. Demirbas, “Google cloud messaging
“Network and device forensic analysis of android social-messaging (gcm): An evaluation,” in Global Communications Conference (GLOBE-
applications,” Digital Investigation, vol. 14, pp. S77–S84, 2015. COM), 2014 IEEE. IEEE, 2014, pp. 2807–2812.
[5] F. Norouzizadeh Dezfouli, A. Dehghantanha, B. Eterovic-Soric, and K.- [30] Y. Yang, J. Zhang, and T. Wang, “How to make android updating
K. R. Choo, “Investigating social networking applications on smart- securer?: A new android updating model,” in Proceedings of the 2016
phones detecting facebook, twitter, linkedin and google+ artefacts on International Conference on Communication and Information Systems.
android and ios platforms,” Australian journal of forensic sciences, ACM, 2016, pp. 69–72.
vol. 48, no. 4, pp. 469–488, 2016. [31] C. Vogt, M. J. Werner, and T. C. Schmidt, “Leveraging webrtc for p2p
[6] T. V. Lillard, Digital forensics for network, Internet, and cloud comput- content distribution in web browsers,” in Network Protocols (ICNP),
ing: a forensic evidence guide for moving targets and data. Syngress 2013 21st IEEE International Conference on. IEEE, 2013, pp. 1–2.
Publishing, 2010. [32] E. Rescorla, SSL and TLS: designing and building secure systems.
[7] J. Brunty, L. Miller, and K. Helenek, Social media investigation for law Addison-Wesley Reading, 2001, vol. 1.
enforcement. Routledge, 2014. [33] S. C. Landers and M. D. Doyle, “Automated communications response
[8] R. W. Taylor, E. J. Fritsch, and J. Liederbach, Digital crime and digital system,” Aug. 4 2015, uS Patent 9,100,465.
terrorism. Prentice Hall Press, 2014. [34] A. Callado, C. Kamienski, G. Szabó, B. P. Gero, J. Kelner, S. Fernan-
[9] K. C. Seigfried-Spellar and S. C. Leshney, “The intersection between so- des, and D. Sadok, “A survey on internet traffic identification,” IEEE
cial media, crime, and digital forensics:# whodunit?” Digital Forensics: communications surveys & tutorials, vol. 11, no. 3, 2009.
Threatscape and Best Practices, p. 59, 2015. [35] GitHub, “XMPP — Instant Messaging,” https://xmpp.org/uses/instant-
[10] M. Huber, M. Mulazzani, M. Leithner, S. Schrittwieser, G. Wondracek, messaging.html, 2017 [accessed 3-june-2017].
and E. Weippl, “Social snapshots: Digital forensics for online social
networks,” in Proceedings of the 27th annual computer security appli-
cations conference. ACM, 2011, pp. 113–122.