CETAnalytics: Comprehensive effective traffic information analytics for encrypted traffic classification

被引:45
作者
Dong, Cong [1 ,2 ]
Zhang, Chen [1 ]
Lu, Zhigang [1 ,2 ]
Liu, Baoxu [1 ,2 ]
Jiang, Bo [1 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
Encrypted traffic; Traffic classification; Deep learning; Payload analytics; Statistical analytics; SYSTEM;
D O I
10.1016/j.comnet.2020.107258
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Encrypted traffic classification is of great significance for advanced network services. Though encryption methods seem unbroken in protecting users' privacy, existing studies have demonstrated that with sophisticated designed approaches utilizing the methods of machine learning or deep learning, the traffic can be identified as generated from which application type or even the specific application. However, most of the previous approaches either lack the generalization ability in different tasks or can hardly achieve the precise performance. One of the reasons is that they perform the classification from an incomplete perspective. To our best knowledge, none of which consider combing the payload content and payload statistics for encrypted traffic classification. Hence, in this paper, we propose the comprehensive effective traffic information analytics (CETAnalytics) framework to tackle the problem. Firstly, the comprehensive effective traffic information is specified and the motivation for combing the two aspects of the traffic is introduced. Based on the specification, the CETAnalytics framework utilizing the consolidated information and its devising implementation details are elaborated. Briefly, the implementation is totally built on the neural network for its high flexibility and powerful functionality to integrate the two dimensional analytics. Among the challenges tackled in the implementation, a substructure network Attract designed with the purpose of matching the traffic structure is proposed to realize the payload content analytics, which is one of the highlights of our work. For evaluation, several solid experiments are conducted using three designed tasks originated from the ISCXVPN2016 dataset. The experiment results show that (i) the effectiveness of the framework design for encrypted traffic classification; (ii) our implementation can achieve both high precision and robust generalization performance at the same time.
引用
收藏
页数:15
相关论文
共 55 条
[1]   MIMETIC: Mobile encrypted traffic classification using multimodal deep learning [J].
Aceto, Giuseppe ;
Ciuonzo, Domenico ;
Montieri, Antonio ;
Pescape, Antonio .
COMPUTER NETWORKS, 2019, 165
[2]  
Afzal MZ, 2015, PROC INT CONF DOC, P1111, DOI 10.1109/ICDAR.2015.7333933
[3]   How Robust Can a Machine Learning Approach Be for Classifying Encrypted VoIP? [J].
Alshammari, Riyad ;
Zincir-Heywood, A. Nur .
JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2015, 23 (04) :830-869
[4]   Can encrypted traffic be identified without port numbers, IP addresses and payload inspection? [J].
Alshammari, Riyad ;
Zincir-Heywood, A. Nur .
COMPUTER NETWORKS, 2011, 55 (06) :1326-1350
[5]   Identifying Encrypted Malware Traffic with Contextual Flow Data [J].
Anderson, Blake ;
McGrew, David .
AISEC'16: PROCEEDINGS OF THE 2016 ACM WORKSHOP ON ARTIFICIAL INTELLIGENCE AND SECURITY, 2016, :35-46
[6]  
[Anonymous], 2020, WIK CONTR
[7]  
[Anonymous], 2014, 2014 USENIX ANN TECH
[8]  
[Anonymous], 2017, P NIPS
[9]  
[Anonymous], 2007, P 24 INT C MACH LEAR, DOI 10.1145/1273496.1273523
[10]  
[Anonymous], PROC CVPR IEEE