
the dictionary. We found that we need a dictionary of about
300 cipher suite lists with assigned User-Agents. Therefore,
the dictionary which was created using the host-based method
was not sufficient to cover all the distinct cipher suite lists
which appear in network traffic. On the other hand, only a
1-hour sample of the HTTPS traffic contained almost all the
cipher suite lists which were observed over the week-long
measurement. This led us to use the dictionary created via
the flow-based method. However, many cipher suite lists were
paired with more than one User-Agent. We were able to assign
a User-Agent to almost every observed cipher suite list with a
certain level of probability. Fortunately, in many cases a lot of
User-Agents which corresponded to a single cipher suite list
share the same client identifier, and differ only in their version
or a similarly attainable value.
In conclusion, our work enhances the capabilities of network
forensics by introducing the network-based identification of
HTTPS clients. Our network-based approach is lightweight,
not limited to a single server, and does not approach the en-
crypted data. Therefore, we can identify clients while preserv-
ing the communication’s privacy. Our results are applicable for
identifying clients in the network, detecting the activity of a
specific client, and breaking down the structure of HTTPS
traffic in a whole network. This was demonstrated in the
experiment and two case studies of network forensics.
ACK NOW LE DG EM EN T
This material is based on work supported by the Security
Research for the Needs of the State 2010–2015 programme
funded by the Ministry of the Interior of the Czech Republic.
REFERENCES
[1] M. Majkowski, “SSL fingerprinting for p0f,” Web page, June 2012,
accessed 2015-01-28. [Online]. Available: https://idea.popcount.org/
2012-06- 17-ssl- fingerprinting-for-p0f/
[2] B. M¨
oller, T. Duong, and K. Kotowicz, “This POODLE Bites:
Exploiting The SSL 3.0 Fallback,” PDF online, 2014, accessed
2015-01-12. [Online]. Available: https://poodlebleed.com/ssl-poodle.pdf
[3] T. Dierks and E. Rescorla, “The Transport Layer Security (TLS) Protocol
Version 1.2,” RFC 5246 (Proposed Standard), Internet Engineering Task
Force, Aug. 2008, updated by RFCs 5746, 5878, 6176.
[4] A. Freier, P. Karlton, and P. Kocher, “The Secure Sockets Layer (SSL)
Protocol Version 3.0,” RFC 6101 (Historic), Internet Engineering Task
Force, Aug. 2011.
[5] E. Rescorla, “HTTP Over TLS,” RFC 2818 (Informational), Internet
Engineering Task Force, May 2000, updated by RFCs 5785, 7230.
[6] IANA – Internet Assigned Numbers Authority, “Protocol Registries,”
Web page, 2014, accessed 2015-01-28. [Online]. Available: http:
//www.iana.org/protocols
[7] D. Cooper, S. Santesson, S. Farrell, S. Boeyen, R. Housley, and W. Polk,
“Internet X.509 Public Key Infrastructure Certificate and Certificate
Revocation List (CRL) Profile,” RFC 5280 (Proposed Standard), Internet
Engineering Task Force, May 2008, updated by RFC 6818.
[8] C. Meyer, “20 Years of SSL/TLS Research: An Analysis of
the Internet’s Security Foundation,” Ph.D. dissertation, Ruhr-
University Bochum, February 2014, accessed 2015-01-15. [Online].
Available: http://www-brs.ub.ruhr-uni- bochum.de/netahtml/HSS/Diss/
MeyerChristopher/diss.pdf
[9] O. Levillain, A. ´
Ebalard, B. Morin, and H. Debar, “One Year of SSL
Internet Measurement,” in Proceedings of the 28th Annual Computer
Security Applications Conference, ser. ACSAC ’12. New York, NY,
USA: ACM, 2012, pp. 11–20.
[10] R. Holz, L. Braun, N. Kammenhuber, and G. Carle, “The SSL Land-
scape: A Thorough Analysis of the x.509 PKI Using Active and
Passive Measurements,” in Proceedings of the 2011 ACM SIGCOMM
Conference on Internet Measurement Conference, ser. IMC ’11. New
York, NY, USA: ACM, 2011, pp. 427–444.
[11] Z. Durumeric, J. Kasten, M. Bailey, and J. A. Halderman, “Analysis
of the HTTPS Certificate Ecosystem,” in Proceedings of the 2013
Conference on Internet Measurement Conference, ser. IMC ’13. New
York, NY, USA: ACM, 2013, pp. 291–304.
[12] Qualys SSL Lab, “HTTP Client Fingerprinting Using SSL Handshake
Analysis,” Web page, 2014, accessed 2015-01-23. [Online]. Available:
https://www.ssllabs.com/projects/client-fingerprinting/
[13] I. Risti´
c, “Passive SSL client fingerprinting using handshake analysis,”
GitHub repository, 2014, accessed 2015-01-30. [Online]. Available:
https://github.com/ssllabs/sslhaf
[14] L. Bernaille and R. Teixeira, “Early Recognition of Encrypted Applica-
tions,” in Passive and Active Network Measurement, ser. Lecture Notes
in Computer Science, S. Uhlig, K. Papagiannaki, and O. Bonaventure,
Eds. Springer Berlin Heidelberg, 2007, vol. 4427, pp. 165–175.
[15] E. Raftopoulos and X. Dimitropoulos, “Understanding network foren-
sics analysis in an operational environment,” in Security and Privacy
Workshops (SPW), 2013 IEEE. IEEE, 2013, pp. 111–118.
[16] Y. Gokcen, V. A. Foroushani, and A. Heywood, “Can we identify
NAT behavior by analyzing Traffic Flows?” in Security and Privacy
Workshops (SPW), 2014 IEEE. IEEE, 2014, pp. 132–139.
[17] V. Krm´
ıˇ
cek, J. Vykopal, and R. Krejˇ
c´
ı, “Netflow Based System for NAT
Detection,” in Proceedings of the 5th International Student Workshop
on Emerging Networking Experiments and Technologies, ser. Co-Next
Student Workshop ’09. New York, NY, USA: ACM, 2009, pp. 23–24.
[18] R. Hofstede, P. ˇ
Celeda, B. Trammell, I. Drago, R. Sadre, A. Sperotto,
and A. Pras, “Flow Monitoring Explained: From Packet Capture to Data
Analysis with NetFlow and IPFIX,” Communications Surveys Tutorials,
IEEE, vol. 16, no. 4, pp. 2037–2064, Fourthquarter 2014.
[19] P. Velan, T. Jirs´
ık, and P. ˇ
Celeda, “Design and Evaluation of HTTP Pro-
tocol Parsers for IPFIX Measurement,” in Advances in Communication
Networking, T. Bauschert, Ed., vol. 8115. Heidelberg: Springer Berlin
Heidelberg, 2013, pp. 136–147.
[20] cURL Contributors, “cURL - command line tool and library for
transferring data with URL syntax,” 2015, accessed 2015-01-25.
[Online]. Available: http://curl.haxx.se/
[21] R. Beverly, “A Robust Classifier for Passive TCP/IP Fingerprinting,”
in Passive and Active Network Measurement, ser. Lecture Notes in
Computer Science, C. Barakat and I. Pratt, Eds. Springer Berlin
Heidelberg, 2004, vol. 3015, pp. 158–167.
8