Network Encryption Traffic Anomaly Detection Based on Integrated Machine Learning

被引:0
作者
Yang, Xiaoqing [1 ]
Angkawisittpan, Niwat [2 ]
机构
[1] Shanxi Vocat Univ Engn Sci & Technol, Fac Comp Engn, 369 Wenhua St, Jinzhong 030619, Shanxi, Peoples R China
[2] Mahasarakham Univ, Res Unit Elect & Comp Engn Technol RECENT, 41-20 Kantarawichai Dist, Maha Sarakham 44150, Thailand
来源
TEHNICKI VJESNIK-TECHNICAL GAZETTE | 2025年 / 32卷 / 02期
关键词
anomaly detection; flow characteristics; improved Bagging method; integrated; machine learning; network encryption traffic;
D O I
10.17559/TV-20240223001345
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
This paper presents an anomaly detection method for encrypted network traffic using integrated machine learning. A stream feature extraction technique is employed to extract key features such as the median value of stream packets, median value of stream bytes, contrast stream, port growth rate, and source IP growth rate from the encrypted traffic. These features are then fed into an anomaly detection model that combines a collaborative neural network and a random forest classifier. An improved Bagging method is used to fuse and identify the anomalous characteristics of the encrypted traffic by weighted summation. Experimental results using the Trace dataset demonstrate that the proposed method achieves high precision and zero false positives in detecting various types of anomalies under different attack scenarios. The proposed approach offers a promising solution for ensuring network security and protecting against threats in encrypted communication channels.
引用
收藏
页码:713 / 722
页数:10
相关论文
共 20 条
  • [1] Akbari Iman, 2022, ACM SIGMETRICS Performance Evaluation Review, V49, P23, DOI 10.1145/3543516.3453921
  • [2] Nearest cluster-based intrusion detection through convolutional neural networks
    Andresini, Giuseppina
    Appice, Annalisa
    Malerba, Donato
    [J]. KNOWLEDGE-BASED SYSTEMS, 2021, 216
  • [3] A method for vulnerability detection by IoT network traffic analytics
    Brezolin, Uelinton
    Vergutz, Andressa
    Nogueira, Michele
    [J]. AD HOC NETWORKS, 2023, 149
  • [4] Towards practical intrusion detection system over encrypted traffic*
    Canard, Sebastien
    Li, Chaoyun
    [J]. IET INFORMATION SECURITY, 2021, 15 (03) : 231 - 246
  • [5] Novel approach for detection of IoT generated DDoS traffic
    Cvitic, Ivan
    Perakovic, Dragan
    Perisa, Marko
    Botica, Mate
    [J]. WIRELESS NETWORKS, 2021, 27 (03) : 1573 - 1586
  • [6] Towards AI-Based Traffic Counting System with Edge Computing
    Duc-Liem Dinh
    Hong-Nam Nguyen
    Huy-Tan Thai
    Kim-Hung Le
    [J]. JOURNAL OF ADVANCED TRANSPORTATION, 2021, 2021
  • [7] Bandwidth Efficient IoT Traffic Shaping Technique for Protecting Smart Home Privacy from Data Breaches in Wireless LAN
    Dziubinski, Kiana
    Bandai, Masaki
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2021, E104B (08) : 961 - 973
  • [8] Multicast on-route cluster propagation using to identify the network intrusion detection system in mobile ad hoc network
    Gracy Theresa, W.
    Prakash, M.
    Betina Antony, J.
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2021, 34 (11)
  • [9] Characterizing Privacy Leakage in Encrypted DNS Traffic
    Hu, Guannan
    Fukuda, Kensuke
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2023, E106B (02) : 156 - 165
  • [10] KeyClass: Efficient keyword matching for network traffic classification
    Hubballi, Neminath
    Khandait, Pratibha
    [J]. COMPUTER COMMUNICATIONS, 2022, 185 : 79 - 91