A graph representation framework for encrypted network traffic classification

被引:0
作者
Okonkwo, Zulu [1 ]
Foo, Ernest [1 ]
Hou, Zhe [1 ]
Li, Qinyi [1 ]
Jadidi, Zahra [1 ]
机构
[1] Griffith Univ, Brisbane, Qld, Australia
关键词
Network traffic classification; Neural Networks; Internet security; Encryption; Graphs;
D O I
10.1016/j.cose.2024.104134
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network Traffic Classification (NTC) is crucial for ensuring internet security, but encryption presents significant challenges to this task. While Machine Learning (ML) and Deep Learning (DL) methods have shown promise, issues such as limited representativeness leading to sub-optimal generalizations and performance remain prevalent. These problems become more pronounced with advanced obfuscation, network security, and privacy technologies, indicating a need for improved model robustness. To address these issues, we focus on feature extraction and representation in NTC by leveraging the expressive power of graphs to represent network traffic at various granularity levels. By modeling network traffic as interconnected graphs, we can analyze both flow-level and packet-level data. Our graph representation method for encrypted NTC effectively preserves crucial information despite encryption and obfuscation. We enhance the robustness of our approach by using cosine similarity to exploit correlations between encrypted network flows and packets, defining relationships between abstract entities. This graph structure enables the creation of structural embeddings that accurately define network traffic across different encryption levels. Our end-to-end process demonstrates significant improvements where traditional NTC methods struggle, such as in Tor classification, which employs anonymization to further obfuscate traffic. Our packet-level classification approach consistently outperforms existing methods, achieving accuracies exceeding 96%.
引用
收藏
页数:17
相关论文
共 51 条
  • [31] Rahman MS, 2020, Arxiv, DOI arXiv:1902.06421
  • [32] Exploiting Diversity in Android TLS Implementations for Mobile App Traffic Classification
    Sengupta, Satadal
    Ganguly, Niloy
    De, Pradipta
    Chakraborty, Sandip
    [J]. WEB CONFERENCE 2019: PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE (WWW 2019), 2019, : 1657 - 1668
  • [33] Shapira T, 2019, IEEE CONF COMPUT, P680, DOI [10.1109/INFCOMW.2019.8845315, 10.1109/infcomw.2019.8845315]
  • [34] Accurate Decentralized Application Identification via Encrypted Traffic Analysis Using Graph Neural Networks
    Shen, Meng
    Zhang, Jinpeng
    Zhu, Liehuang
    Xu, Ke
    Du, Xiaojiang
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 2367 - 2380
  • [35] Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning
    Sirinam, Payap
    Imani, Mohsen
    Juarez, Marc
    Wright, Matthew
    [J]. PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 1928 - 1943
  • [36] AppScanner: Automatic Fingerprinting of Smartphone Apps From Encrypted Network Traffic
    Taylor, Vincent F.
    Spolaor, Riccardo
    Conti, Mauro
    Martinovic, Ivan
    [J]. 1ST IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY, 2016, : 439 - 454
  • [37] FLOWPRINT: Semi-Supervised Mobile-App Fingerprinting on Encrypted Network Traffic
    van Ede, Thijs
    Bortolameotti, Riccardo
    Continella, Andrea
    Ren, Jingjing
    Dubois, Daniel J.
    Lindorfer, Martina
    Choffnes, David
    van Steen, Maarten
    Peter, Andreas
    [J]. 27TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2020), 2020,
  • [38] HAST-IDS: Learning Hierarchical Spatial-Temporal Features Using Deep Neural Networks to Improve Intrusion Detection
    Wang, Wei
    Sheng, Yiqiang
    wang, Jinlin
    Zeng, Xuewen
    Ye, Xiaozhou
    Huang, Yongzhong
    Zhu, Ming
    [J]. IEEE ACCESS, 2018, 6 : 1792 - 1806
  • [39] Wang W, 2017, 2017 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), P43, DOI 10.1109/ISI.2017.8004872
  • [40] Wang W, 2017, 2017 31ST INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), P712, DOI 10.1109/ICOIN.2017.7899588