Multilayer Perceptron Neural Network for Detection of Encrypted VPN Network Traffic

被引:0
作者
Miller, Shane [1 ]
Curran, Kevin [1 ]
Lunney, Tom [1 ]
机构
[1] Ulster Univ, Fac Comp & Engn, Coleraine, Londonderry, North Ireland
来源
2018 INTERNATIONAL CONFERENCE ON CYBER SITUATIONAL AWARENESS, DATA ANALYTICS AND ASSESSMENT (CYBER SA) | 2018年
关键词
classification; flow statistics; neural networks; VPN; Networking;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
There has been a growth in popularity of privacy in the personal computing space and this has influenced the IT industry. There is more demand for websites to use more secure and privacy focused technologies such as HTTPS and TLS. This has had a knock-on effect of increasing the popularity of Virtual Private Networks (VPNs). There are now more VPN offerings than ever before and some are exceptionally simple to setup. Unfortunately, this ease of use means that businesses will have a need to be able to classify whether an incoming connection to their network is from an original IP address or if it is being proxied through a VPN. A method to classify an incoming connection is to make use of machine learning to learn the general patterns of VPN and non-VPN traffic in order to build a model capable of distinguishing between the two in real time. This paper outlines a framework built on a multilayer perceptron neural network model capable of achieving this goal.
引用
收藏
页数:8
相关论文
共 21 条
[1]  
Aceto G., 2010, Proceedings of INFOCOM IEEE Conference on Computer Communications Workshops, P1
[2]   A Proxy Identifier based on Patterns in Traffic Flows [J].
Aghaei-Foroushani, Vahid ;
Zincir-Heywood, A. Nur .
2015 IEEE 16TH INTERNATIONAL SYMPOSIUM ON HIGH ASSURANCE SYSTEMS ENGINEERING (HASE), 2015, :118-125
[3]  
Arndt D.., 2011, NETMATE FLOWCALC D A
[4]  
Draper-Gil Gerard, 2016, ICISSP 2016. 2nd International Conference on Information Systems Security and Privacy. Proceedings, P407
[5]  
Geetha S.., 2016, COMBATING SECURITY B
[6]   Benchmarking the Effect of Flow Exporters and Protocol Filters on Botnet Traffic Classification [J].
Haddadi, Fariba ;
Zincir-Heywood, A. Nur .
IEEE SYSTEMS JOURNAL, 2016, 10 (04) :1390-1401
[7]  
Handelman S, 1999, 2724 INT ENG TASK FO
[8]  
Harmening J.T., 2017, Computer and Information Security Handbook, P843
[9]  
Hunt T., 2016, OBSERVATIONS THOUGHT
[10]   Efficient application identification and the temporal and spatial stability of classification schema [J].
Li, Wei ;
Canini, Marco ;
Moore, Andrew W. ;
Bolla, Raffaele .
COMPUTER NETWORKS, 2009, 53 (06) :790-809