Encrypted traffic classification method based on parallel traffic graph and graph neural network

被引:0
作者
Liu, Taotao [1 ]
Fu, Yu [1 ]
Yu, Yihan [2 ]
An, Yishuai [1 ]
机构
[1] Department of Information Security, Naval University of Engineering, Wuhan
[2] Department of Operational Operations and Planning, Naval University of Engineering, Wuhan
来源
Tongxin Xuebao/Journal on Communications | 2025年 / 46卷 / 06期
基金
中国国家自然科学基金;
关键词
deep learning; encrypted traffic classification; feature fusion; graph neural network;
D O I
10.11959/j.issn.1000-436x.2025095
中图分类号
学科分类号
摘要
Aiming at the problems of traditional encrypted traffic classification methods limited by the imbalance of data-set classes and the unreliability of the features used in complex network environments, an encrypted traffic classification method based on parallel traffic graph and graph neural network was proposed. Firstly, the traffic graphs were constructed from the packet header and payload perspectives to emphasize their differences. Then, an improved graph attention network was introduced to extract effective information from the parallel traffic graphs. Next, a feature cross-fusion attention module was used to fuse the extracted information, achieving a more robust feature representation. Finally, classification was performed using fully connected layers and a Softmax layer. Experiments show that the proposed method achieves better results on the ISCX-VPN, ISCX-nonVPN, ISCX-Tor, and ISCX-nonTor datasets, with accuracies of 96.88%, 90.62%, 99.24%, and 98.13%, respectively, significantly enhancing encrypted traffic classification performance. © 2025 Editorial Board of Journal on Communications. All rights reserved.
引用
收藏
页码:45 / 59
页数:14
相关论文
共 33 条
[1]  
ZHAO J J, LI Q, HONG Y P, Et al., MetaRockETC: adaptive encrypted traffic classification in complex network environments via time series analysis and meta-learning, IEEE Transactions on Network and Service Management, 21, 2, pp. 2460-2476, (2024)
[2]  
LIU Y, WANG X, QU B, Et al., ATVITSC: A novel encrypted traffic classification method based on deep learning, IEEE Transactions on Information Forensics and Security, 19, pp. 9374-9389, (2024)
[3]  
ERMAN J, MAHANTI A, ARLITT M, Et al., Identifying and discriminating between web and peer-to-peer traffic in the network core, Proceedings of the 16th International Conference on World Wide Web, pp. 883-892, (2007)
[4]  
YAN H N, LI H, XIAO M C, Et al., PGSM-DPI: precisely guided signature matching of deep packet inspection for traffic analysis, Proceedings of the 2019 IEEE Global Communications Conference (GLOBECOM), pp. 1-6, (2019)
[5]  
TAYLOR V F, SPOLAOR R, CONTI M, Et al., AppScanner: automatic fingerprinting of smartphone apps from encrypted network traffic, Proceedings of the 2016 IEEE European Symposium on Security and Privacy (EuroS&P), pp. 439-454, (2016)
[6]  
KOUMAR J, HYNEK K, CEJKA T., Network traffic classification based on single flow time series analysis, Proceedings of the 2023 19th International Conference on Network and Service Management (CNSM), pp. 1-7, (2023)
[7]  
ZAKI F, AFIFI F, ABD RAZAK S, Et al., GRAIN: Granular multi-label encrypted traffic classification using classifier chain, Computer Networks, 213, (2022)
[8]  
SHEN M, LIU Y T, ZHU L H, Et al., Fine-grained webpage fingerprinting using only packet length information of encrypted traffic, IEEE Transactions on Information Forensics and Security, 16, pp. 2046-2059, (2020)
[9]  
WANG W, ZHU M, WANG J L, Et al., End-to-end encrypted traffic classification with one-dimensional convolution neural networks, Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics (ISI), pp. 43-48, (2017)
[10]  
LIN K D, XU X L, GAO H H., TSCRNN: A novel classification scheme of encrypted traffic based on flow spatiotemporal features for efficient management of IIoT, Computer Networks, 190, (2021)