Real-time Application Identification of RTC Media Streams via Encrypted Traffic Analysis

被引:2
作者
Wu, Hua [1 ,2 ,3 ,4 ]
Zhu, Chengfei [1 ,3 ]
Cheng, Guang [1 ,3 ,4 ]
Hu, Xiaoyan [1 ,3 ,4 ]
机构
[1] Southeast Univ, Sch Cyber Sci & Engn, Nanjing, Peoples R China
[2] Purple Mt Labs Network & Commun Secur, Nanjing, Peoples R China
[3] Southeast Univ, Key Lab Comp Network & Informat Integrat, Nanjing, Peoples R China
[4] Jiangsu Prov Engn Res Ctr Secur Ubiquitous Networ, Nanjing, Peoples R China
来源
2022 31ST INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN 2022) | 2022年
基金
国家重点研发计划;
关键词
Social Networks; Media Streams; Real-time Communication; Application Identification; Deep Learning; CLASSIFICATION; NETWORK;
D O I
10.1109/ICCCN54977.2022.9868928
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The globalization of the economy and the increase in network bandwidth have contributed significantly to the development and popularity of real-time communication (RTC) social applications. RTC media streams, such as video meetings and calls, require more network resources and real-time performance than other services. In order to meet the requirements of RTC application providers to offer a higher level of service to their subscribers, Internet Service Providers (ISPs) need to identify the application to which the RTC media stream belongs. There are already some studies on traffic identification. However, the extant work is not yet able to distinguish the corresponding applications from the same type of media streams in real time. In addition, most of the work is not validated with actual data containing massive background traffic. Hence, we propose a real-time application identification method for meeting and calling RTC media streams in social networks. By analyzing the encrypted traffic, the method extracts features from the unit-time traffic aggregation without using payload and related information fields. The generated feature sequences are fed to our lightweight model. Our proposed method does not depend on initial packets or whole flows, and only an arbitrary 3-second traffic block is needed to achieve over 99% accuracy. Moreover, experiments using high-speed network traffic reflect that our approach can identify corresponding applications from RTC media streams in real time. Besides, comparisons with similar work show that this method requires only 1/160th of the memory and 1/10th of the processing time.
引用
收藏
页数:10
相关论文
共 30 条
  • [1] Aceto G., 2010, Proceedings of INFOCOM IEEE Conference on Computer Communications Workshops, P1
  • [2] Mobile Encrypted Traffic Classification Using Deep Learning: Experimental Evaluation, Lessons Learned, and Challenges
    Aceto, Giuseppe
    Ciuonzo, Domenico
    Montieri, Antonio
    Pescape, Antonio
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2019, 16 (02): : 445 - 458
  • [3] Revealing Skype traffic: When randomness plays with you
    Bonfiglio, Dario
    Mellia, Marco
    Meo, Michela
    Rossi, Dario
    Tofanelli, Paolo
    [J]. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2007, 37 (04) : 37 - 48
  • [4] Buyukkayhan AS, 2013, 2013 INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTER AND COMPUTATION (ICECCO), P76, DOI 10.1109/ICECCO.2013.6718232
  • [5] Real-Time Encrypted Traffic Classification via Lightweight Neural Networks
    Cheng, Jin
    He, Runkang
    Yuepeng, E.
    Wu, Yulei
    You, Junling
    Li, Tong
    [J]. 2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2020,
  • [6] Choudhury P, 2013, 2013 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), P90, DOI 10.1109/ICACCI.2013.6637152
  • [7] An innovative approach for real-time network traffic classification
    Dias, Klenilmar Lopes
    Pongelupe, Mateus Almeida
    Caminhas, Walmir Matos
    de Errico, Luciano
    [J]. COMPUTER NETWORKS, 2019, 158 : 143 - 157
  • [8] On the Stability of the Information Carried by Traffic Flow Features at the Packet Level
    Este, Alice
    Gringoli, Francesco
    Salgarelli, Luca
    [J]. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2009, 39 (03) : 13 - 18
  • [9] A Survey of Payload-Based Traffic Classification Approaches
    Finsterbusch, Michael
    Richter, Chris
    Rocha, Eduardo
    Mueller, Jean-Alexander
    Haenssgen, Klaus
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (02) : 1135 - 1156
  • [10] Fontugne R., 2010, P ACM C EM NETW EXPE