On Learning Hierarchical Embeddings from Encrypted Network Traffic

被引:4
作者
Wehner, Nikolas [1 ]
Ring, Markus [2 ]
Schueler, Joshua [1 ]
Hotho, Andreas [1 ]
Hossfeld, Tobias [1 ]
Seufert, Michael [1 ]
机构
[1] Univ Wurzburg, Wurzburg, Germany
[2] Coburg Univ Appl Sci & Arts, Coburg, Germany
来源
PROCEEDINGS OF THE IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM 2022 | 2022年
关键词
Internet Traffic; Encrypted Traffic; Embedding;
D O I
10.1109/NOMS54207.2022.9789896
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This work presents a novel concept for learning embeddings from encrypted network traffic. In contrast to existing approaches, we evaluate the feasibility of hierarchical embeddings by iteratively aggregating packet embeddings to flow embeddings, and flow embeddings to trace embeddings. The hierarchical embedding concept was designed to especially consider complex dependencies of Internet traffic on different time scales. We describe this novel embedding concept for the domain of network traffic in full detail, and evaluate its performance for the downstream task of website fingerprinting, i.e., identifying websites from encrypted traffic, which is relevant for network management, e.g., as a prerequisite for QoE monitoring or for intrusion detection. Our evaluation reveals that embeddings are a promising solution for website fingerprinting as our model correctly labels up to 99.8% of traces from 500 target websites.
引用
收藏
页数:7
相关论文
共 29 条
[1]  
Aggarwal Vaneet, 2014, P 15 WORKSH MOB COMP, P1
[2]  
Bojanowski P., 2017, Transactions of the association for computational linguistics, V5, P135, DOI [10.1162/tacl_a_00051, 10.1162/tacla00051, DOI 10.1162/TACL_A_00051]
[3]   Programming Protocol-Independent Packet Processors [J].
Bosshart, Pat ;
Daly, Dan ;
Gibb, Glen ;
Izzard, Martin ;
McKeown, Nick ;
Rexford, Jennifer ;
Schlesinger, Cole ;
Talayco, Dan ;
Vahdat, Amin ;
Varghese, George ;
Walker, David .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2014, 44 (03) :87-95
[4]   A comprehensive survey on machine learning for networking: evolution, applications and research opportunities [J].
Boutaba, Raouf ;
Salahuddin, Mohammad A. ;
Limam, Noura ;
Ayoubi, Sara ;
Shahriar, Nashid ;
Estrada-Solano, Felipe ;
Caicedo, Oscar M. .
JOURNAL OF INTERNET SERVICES AND APPLICATIONS, 2018, 9 (09)
[5]  
Casas Pedro, 2013, Performance Evaluation Review, V41, P44
[6]   Fast Packet Processing: A Survey [J].
Cerovi, Danilo ;
Del Piccolo, Valentin ;
Amamou, Ahmed ;
Haddadou, Kamel ;
Pujolle, Guy .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (04) :3645-3676
[7]  
Check Point Research, 2020, CYB SEC REP 2020
[8]   Multi-layer Representation Learning for Medical Concepts [J].
Choi, Edward ;
Bahadori, Mohammad Taha ;
Searles, Elizabeth ;
Coffey, Catherine ;
Thompson, Michael ;
Bost, James ;
Tejedor-Sojo, Javier ;
Sun, Jimeng .
KDD'16: PROCEEDINGS OF THE 22ND ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2016, :1495-1504
[9]  
Devlin J, 2019, 2019 CONFERENCE OF THE NORTH AMERICAN CHAPTER OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS: HUMAN LANGUAGE TECHNOLOGIES (NAACL HLT 2019), VOL. 1, P4171
[10]  
Devo, 2019, TCP FLAGS