Encrypted Traffic Classification Using Graph Convolutional Networks

被引:6
作者
Mo, Shuang [1 ]
Wang, Yifei [2 ]
Xiao, Ding [1 ]
Wu, Wenrui [1 ]
Fan, Shaohua [1 ]
Shi, Chuan [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Beijing, Peoples R China
[2] State Grid Jibei Informat & Telecommun Co, Beijing, Peoples R China
来源
ADVANCED DATA MINING AND APPLICATIONS | 2020年 / 12447卷
关键词
Traffic classification; Encrypted traffic classification; Graph convolutional networks; Convolutional neural networks;
D O I
10.1007/978-3-030-65390-3_17
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Traffic classification plays a vital role in the field of network management and network security. Because of the continuous evolution of new applications and services and the widespread use of encrypted communication technologies, it has become a difficult task. In this paper, we study the classification of encrypted traffic, where the purpose is to firstly distinguish betweenVirtual Private Networks (VPN) and regular encrypted traffic, and then classify the traffic into different traffic categories, such as file, email, etc. The available information in encrypted traffic classification is composed of two parts: the complex traffic-level features and the diverse network-side behaviors. To fully utilize these two parts of information, we propose an approach, called Encrypted Traffic Classification using Graph Convolutional Networks (ETC-GCN), which incorporates traffic-level characteristics with convolutional neural networks (CNN) and network-wide behavior with graph convolutional networks (GCN) in the communication network. We compare the proposed approach with existing start-of-the-art methods on four experiment scenarios, and the results demonstrate that ETC-GCN can improve the classification performance by considering the information of neighbor endpoints that communicated, and the internal features of the traffic together.
引用
收藏
页码:207 / 219
页数:13
相关论文
共 21 条
[1]   A Proxy Identifier based on Patterns in Traffic Flows [J].
Aghaei-Foroushani, Vahid ;
Zincir-Heywood, A. Nur .
2015 IEEE 16TH INTERNATIONAL SYMPOSIUM ON HIGH ASSURANCE SYSTEMS ENGINEERING (HASE), 2015, :118-125
[2]   Investigating Two Different Approaches for Encrypted Traffic Classification [J].
Alshammari, Riyad ;
Zincir-Heywood, A. Nur .
SIXTH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, PROCEEDINGS, 2008, :156-166
[3]  
Alshammari Riyad, 2009, 2009 IEEE S COMP INT, P1
[4]  
Bremler-Barr A, 2012, IEEE INFOCOM SER, P1987, DOI 10.1109/INFCOM.2012.6195576
[5]  
Cao ZG, 2014, COMM COM INF SC, V490, P73
[6]  
Chen ZT, 2017, IEEE INT CONF BIG DA, P1271, DOI 10.1109/BigData.2017.8258054
[7]  
Deri L, 2014, INT WIREL COMMUN, P617, DOI 10.1109/IWCMC.2014.6906427
[8]  
Draper-Gil Gerard, 2016, ICISSP 2016. 2nd International Conference on Information Systems Security and Privacy. Proceedings, P407
[9]  
Dusi M, 2010, IEEE ICC
[10]  
Hamilton WL, 2017, ADV NEUR IN, V30