A graph representation framework for encrypted network traffic classification

被引:0
作者
Okonkwo, Zulu [1 ]
Foo, Ernest [1 ]
Hou, Zhe [1 ]
Li, Qinyi [1 ]
Jadidi, Zahra [1 ]
机构
[1] Griffith Univ, Brisbane, Qld, Australia
关键词
Network traffic classification; Neural Networks; Internet security; Encryption; Graphs;
D O I
10.1016/j.cose.2024.104134
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network Traffic Classification (NTC) is crucial for ensuring internet security, but encryption presents significant challenges to this task. While Machine Learning (ML) and Deep Learning (DL) methods have shown promise, issues such as limited representativeness leading to sub-optimal generalizations and performance remain prevalent. These problems become more pronounced with advanced obfuscation, network security, and privacy technologies, indicating a need for improved model robustness. To address these issues, we focus on feature extraction and representation in NTC by leveraging the expressive power of graphs to represent network traffic at various granularity levels. By modeling network traffic as interconnected graphs, we can analyze both flow-level and packet-level data. Our graph representation method for encrypted NTC effectively preserves crucial information despite encryption and obfuscation. We enhance the robustness of our approach by using cosine similarity to exploit correlations between encrypted network flows and packets, defining relationships between abstract entities. This graph structure enables the creation of structural embeddings that accurately define network traffic across different encryption levels. Our end-to-end process demonstrates significant improvements where traditional NTC methods struggle, such as in Tor classification, which employs anonymization to further obfuscate traffic. Our packet-level classification approach consistently outperforms existing methods, achieving accuracies exceeding 96%.
引用
收藏
页数:17
相关论文
共 51 条
  • [11] Huoh TL, 2021, 2021 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM 2021), P376
  • [12] Jacobs Arthur S., 2022, CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, P1537, DOI 10.1145/3548606.3560609
  • [13] Characterization of Tor Traffic using Time based Features
    Lashkari, Arash Habibi
    Gil, Gerard Draper
    Mamun, Mohammad Saiful Islam
    Ghorbani, Ali A.
    [J]. ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, : 253 - 262
  • [14] ET-BERT: A Contextualized Datagram Representation with Pre-training Transformers for Encrypted Traffic Classification
    Lin, Xinjie
    Gang Xiong
    Gou, Gaopeng
    Zhen Li
    Shi, Junzheng
    Jing Yu
    [J]. PROCEEDINGS OF THE ACM WEB CONFERENCE 2022 (WWW'22), 2022, : 633 - 642
  • [15] Application classification using packet size distribution and port association
    Lin, Ying-Dar
    Lu, Chun-Nan
    Lai, Yuan-Cheng
    Peng, Wei-Hao
    Lin, Po-Ching
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2009, 32 (05) : 1023 - 1030
  • [16] Liu C, 2019, IEEE INFOCOM SER, P1171
  • [17] Fast Application Activity Recognition with Encrypted Traffic
    Liu, Xue
    Zhang, Shigeng
    Li, Huihui
    Wang, Weiping
    [J]. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2021, PT II, 2021, 12938 : 314 - 325
  • [18] Deep packet: a novel approach for encrypted traffic classification using deep learning
    Lotfollahi, Mohammad
    Siavoshani, Mahdi Jafari
    Zade, Ramin Shirali Hossein
    Saberian, Mohammdsadegh
    [J]. SOFT COMPUTING, 2020, 24 (03) : 1999 - 2012
  • [19] Loukas Andreas, 2020, Advances in Neural Information Processing Systems, V33
  • [20] ICLSTM: Encrypted Traffic Service Identification Based on Inception-LSTM Neural Network
    Lu, Bei
    Luktarhan, Nurbol
    Ding, Chao
    Zhang, Wenhui
    [J]. SYMMETRY-BASEL, 2021, 13 (06):