Recognition of Abnormal Proxy Voice Traffic in 5G Environment Based on Deep Learning*

被引:0
作者
Zhao, Hongce [1 ]
Zhang, Shunliang [1 ]
Huang, Xianjin [1 ]
Qiao, Zhuang [1 ]
Zhang, Xiaohui [1 ]
Wu, Guanglei [1 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
来源
2022 18TH INTERNATIONAL CONFERENCE ON MOBILITY, SENSING AND NETWORKING, MSN | 2022年
关键词
5G OTT; proxy voice traffic; encryption validity; deep learning; identify proxy traffic; IDENTIFICATION;
D O I
10.1109/MSN57253.2022.00070
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the commercial use of the fifth generation (5G), the rapid popularization of mobile Over-The-Top (OTT) voice applications has brought high-quality voice communication methods to users. The intelligent Internet in the 5G era makes communication terminals not limited to mobile phones. The complex communication environment has higher requirements for the security of data transmission between various terminals to prevent the system from being monitored or breached. At present, many OTT users use encrypted proxy technology to get rid of certain restrictions of network operators, prevent their private information from leaking, and ensure communication security. However, in some cases the encryption proxy may be subject to configuration error or maliciously attacked makes the encryption ineffective. The resulting abnormal proxy traffic may cause privacy leakage when users use voice services. However, little effort has been put on fingerprint the effectiveness of encryption for proxy voice traffic in a 5G environment. To this end, we adopt the VGG deep learning method to identify agent speech traffic, compare it with common deep learning methods, and study the impact on model performance with less abnormal traffic. Extensive experimental results show that the deep learning method we use can identify abnormal encrypted proxy voice traffic with the accuracy up to 99.77%. Moreover, VGG outperform other DL methods on indentifying the encryption algorithms of normal encrypted proxy traffic.
引用
收藏
页码:391 / 397
页数:7
相关论文
共 22 条
  • [1] MIMETIC: Mobile encrypted traffic classification using multimodal deep learning
    Aceto, Giuseppe
    Ciuonzo, Domenico
    Montieri, Antonio
    Pescape, Antonio
    [J]. COMPUTER NETWORKS, 2019, 165
  • [2] Identification of VoIP encrypted traffic using a machine learning approach
    Alshammari, Riyad
    Zincir-Heywood, A. Nur
    [J]. JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2015, 27 (01) : 77 - 92
  • [3] Impossible differential attack on seven-round AES-128
    Bahrok, B.
    Aref, M. R.
    [J]. IET INFORMATION SECURITY, 2008, 2 (02) : 28 - 32
  • [4] Draper-Gil Gerard, 2016, ICISSP 2016. 2nd International Conference on Information Systems Security and Privacy. Proceedings, P407
  • [5] Hussain I, 2011, INT WIREL COMMUN, P430, DOI 10.1109/IWCMC.2011.5982572
  • [6] VoIP Traffic Detection in Tunneled and Anonymous Networks Using Deep Learning
    Islam, Faiz Ul
    Liu, Guangjie
    Zhai, Jiangtao
    Liu, Weiwei
    [J]. IEEE ACCESS, 2021, 9 : 59783 - 59799
  • [7] Ma X., 2021, IEEE Transactions on Neural Networks and Learning Systems, DOI [10.1109/tkde.2021.3118815, 10.1109/TKDE.2021.3118815]
  • [8] Detection of DoH Tunnels using Time-series Classification of Encrypted Traffic
    MontazeriShatoori, Mohammadreza
    Davidson, Logan
    Kaur, Gurdip
    Lashkari, Arash Habibi
    [J]. 2020 IEEE INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, INTL CONF ON CLOUD AND BIG DATA COMPUTING, INTL CONF ON CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/CBDCOM/CYBERSCITECH), 2020, : 63 - 70
  • [9] Moradi A, 2006, LECT NOTES COMPUT SC, V4249, P91
  • [10] Nan Zliang, 2020, 2020 International Conference on Information Science and Education (ICISE-IE), P480, DOI 10.1109/ICISE51755.2020.00109