Reinterpreting Usability of Semantic Segmentation Approach for Darknet Traffic Analysis

被引:2
作者
Mezina, Anzhelika [1 ]
Burget, Radim [1 ]
Ometov, Aleksandr [2 ]
机构
[1] Brno Univ Technol, Dept Telecommun, FEEC, Tech 12, Brno 61600, Czech Republic
[2] Tampere Univ, Fac Informat Technol & Commun Sci, Elect Engn Unit, Tampere 33720, Finland
关键词
Deep learning; Darknet detection; UNet plus plus; Feature analysis; Traffic classification; CLASSIFICATION;
D O I
10.1016/j.comnet.2024.110493
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With a growing number of smart interconnected devices and services, managing and controlling network traffic is getting more complicated. Among the network traffic, the Darknet-related one is particularly interesting, as it is often used for anonymous and illicit activities that pose cyber security threats. Therefore, designing and developing methods for detecting and categorizing Darknet traffic is essential. Applying Deep Learning (DL) is one of the most suitable options in this case. The main reasons are the ability to process a large amount of data and detect the hidden patterns and relationships in these data. This work proposes a DL architecture based on UNet++, which can detect and categorize anonymous traffic. The core idea of this model is semantic segmentation, which can identify meaningful segments that share some common patterns in given data. Hereby, semantic segmentation is postulated as a possible way to investigate Darknet traffic to find some common and related features instead of widely used Convolutional Neural Network (CNN) and Long Short-Term Memory (LSTM). According to the results on comparison with other Machine Learning (ML) and DL models, the UNet++ model outperforms the methods with a higher accuracy of 98.19% and 87.27% for Darknet detection and traffic categorization. Our work shows the potential of using UNet++ for network traffic analysis and Darknet traffic detection. We have also demonstrated that more advanced architecture with skip connections and trainable blocks provides more accurate results than pure U -Net, CNN, and other evaluated models.
引用
收藏
页数:17
相关论文
共 53 条
[1]   Machine-Learning-Based Darknet Traffic Detection System for IoT Applications [J].
Abu Al-Haija, Qasem ;
Krichen, Moez ;
Abu Elhaija, Wejdan .
ELECTRONICS, 2022, 11 (04)
[2]   A Look Behind the Curtain: Traffic Classification in an Increasingly Encrypted Web [J].
Akbari, Iman ;
Salahuddin, Mohammad A. ;
Ven, Leni ;
Limam, Noura ;
Boutaba, Raouf ;
Mathieu, Bertrand ;
Moteau, Stephanie ;
Tuffin, Stephane .
PROCEEDINGS OF THE ACM ON MEASUREMENT AND ANALYSIS OF COMPUTING SYSTEMS, 2021, 5 (01)
[3]   Detection of obfuscated Tor traffic based on bidirectional generative adversarial networks and vision transform [J].
Al-E'mari, Salam ;
Sanjalawe, Yousef ;
Fraihat, Salam .
COMPUTERS & SECURITY, 2023, 135
[4]  
[Anonymous], 2017, Drugs and the darknet: Perspectives for enforcement, research and policy (Catalog Number TD-04-17-834-EN-N)
[5]   Detection and classification of sensor anomalies for simulating urban traffic scenarios [J].
Bachechi, Chiara ;
Rollo, Federica ;
Po, Laura .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (04) :2793-2817
[6]  
Briner N., 2023, IEEE Access
[7]  
Chainalysis, 2023, The Chainalysis 2023 Crypto Crime Report
[8]  
Chen XN, 2023, Arxiv, DOI arXiv:2302.06675
[9]   MATEC: A lightweight neural network for online encrypted traffic classification [J].
Cheng, Jin ;
Wu, Yulei ;
Yuepeng, E. ;
You, Junling ;
Li, Tong ;
Li, Hui ;
Ge, Jingguo .
COMPUTER NETWORKS, 2021, 199
[10]   The choice of scaling technique matters for classification performance [J].
de Amorim, Lucas B., V ;
Cavalcanti, George D. C. ;
Cruz, Rafael M. O. .
APPLIED SOFT COMPUTING, 2023, 133