A Novel Lightweight Anonymous Proxy Traffic Detection Method Based on Spatio-Temporal Features

被引:7
作者
He, Yanjie [1 ]
Li, Wei [1 ]
机构
[1] Xi An Jiao Tong Univ, Sch Comp Sci & Technol, Xian 710049, Peoples R China
基金
中国国家自然科学基金;
关键词
Shadowsocks traffic detection; VPN traffic detection; spatio-temporal features; CNN; CLASSIFICATION;
D O I
10.3390/s22114216
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Anonymous proxies are used by criminals for illegal network activities due to their anonymity, such as data theft and cyber attacks. Therefore, anonymous proxy traffic detection is very essential for network security. In recent years, detection based on deep learning has become a hot research topic, since deep learning can automatically extract and select traffic features. To make (heterogeneous) network traffic adapt to the homogeneous input of typical deep learning algorithms, a major branch of existing studies convert network traffic into images for detection. However, such studies are commonly subject to the limitation of large-sized image representation of network traffic, resulting in very large storage and computational resource overhead. To address this limitation, a novel method for anonymous proxy traffic detection is proposed. The method is one of the solutions to reduce storage and computational resource overhead. Specifically, it converts the sequences of the size and inter-arrival time of the first N packets of a flow into images, and then categorizes the converted images using the one-dimensional convolutional neural network. Both proprietary and public datasets are used to validate the proposed method. The experimental results show that the converted images of the method are at least 90% smaller than that of existing image-based deep learning methods. With substantially smaller image sizes, the method can still achieve F1 scores up to 98.51% in Shadowsocks traffic detection and 99.8% in VPN traffic detection.
引用
收藏
页数:15
相关论文
共 30 条
[1]  
Akter H., 2021, P TCCE ANN C 2021
[2]  
[Anonymous], IDX FILE FORMAT SPEC
[3]   ACER: detecting Shadowsocks server based on active probe technology [J].
Cheng, Jiaxing ;
Li, Ying ;
Huang, Cheng ;
Yu, Ailing ;
Zhang, Tao .
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2020, 16 (03) :217-227
[4]   MATEC: A lightweight neural network for online encrypted traffic classification [J].
Cheng, Jin ;
Wu, Yulei ;
Yuepeng, E. ;
You, Junling ;
Li, Tong ;
Li, Hui ;
Ge, Jingguo .
COMPUTER NETWORKS, 2021, 199
[5]   The Random Forest based Detection of Shadowsock's Traffic [J].
Deng, Ziye ;
Liu, Zihan ;
Chen, Zhouguo ;
Guo, Yubin .
2017 NINTH INTERNATIONAL CONFERENCE ON INTELLIGENT HUMAN-MACHINE SYSTEMS AND CYBERNETICS (IHMSC 2017), VOL 2, 2017, :75-78
[6]  
Draper-Gil Gerard, 2016, ICISSP 2016. 2nd International Conference on Information Systems Security and Privacy. Proceedings, P407
[7]   Deep learning-based real-time VPN encrypted traffic identification methods [J].
Guo, Lulu ;
Wu, Qianqiong ;
Liu, Shengli ;
Duan, Ming ;
Li, Huijie ;
Sun, Jianwen .
JOURNAL OF REAL-TIME IMAGE PROCESSING, 2020, 17 (01) :103-114
[8]   Network traffic application identification based on message size analysis [J].
Hajjar, Amjad ;
Khalife, Jawad ;
Diaz-Verdejo, Jesus .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2015, 58 :130-143
[9]   RETRACTED: CLD-Net: A Network Combining CNN and LSTM for Internet Encrypted Traffic Classification (Retracted Article) [J].
Hu, Xinyi ;
Gu, Chunxiang ;
Wei, Fushan .
SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
[10]   Security Analysis of Shadowsocks(R) Protocol [J].
Ji, Qingbing ;
Rao, Zhihong ;
Chen, Man ;
Luo, Jie .
SECURITY AND COMMUNICATION NETWORKS, 2022, 2022