Encrypted traffic classification based on fusion of vision transformer and temporal features

被引:0
|
作者
Wang L. [1 ]
Hu W. [2 ]
Liu J. [1 ]
Pang J. [2 ]
Gao Y. [2 ]
Xue J. [1 ]
Zhang J. [3 ]
机构
[1] School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing
[2] State Grid Information and Telecommunication Branch, Beijing
[3] Information and Telecommunication Company, State Grid Shandong Electric Power Corporation, Jinan
关键词
encrypted traffic classification; temporal feature; vision transformer;
D O I
10.19682/j.cnki.1005-8885.2023.0002
中图分类号
学科分类号
摘要
Aiming at the problem that the current encrypted traffic classification methods only use the single network framework such as convolutional neural network (CNN), recurrent neural network (RNN), and stacked autoencoder (SAE), and only construct a shallow network to extract features, which leads to the low accuracy of encrypted traffic classification, an encrypted traffic classification framework based on the fusion of vision transformer and temporal features was proposed. Bottleneck transformer network (BoTNet) was used to extract spatial features and bi-directional long short-term memory (BiLSTM) was used to extract temporal features. After the two subnetworks are parallelized, the feature fusion method of early fusion was used in the framework to perform feature fusion. Finally, the encrypted traffic was identified through the fused features. The experimental results show that the BiLSTM and BoTNet fusion transformer (BTFT) model can enhance the performance of encrypted traffic classification by fusing multi-dimensional features. The accuracy rate of a virtual private network (VPN) and non-VPN binary classification is 99.9%, and the accuracy rate of fine-grained encrypted traffic twelve-classification can also reach 97%. © 2023, Beijing University of Posts and Telecommunications. All rights reserved.
引用
收藏
页码:73 / 82
页数:9
相关论文
共 50 条
  • [1] Encrypted traffic classification based on fusion of vision transformer and temporal features
    Wang Lanting
    Hu Wei
    Liu Jianyi
    Pang Jin
    Gao Yating
    Xue Jingyao
    Zhang Jie
    The Journal of China Universities of Posts and Telecommunications, 2023, 30 (02) : 73 - 82
  • [2] Multi-granularity Mobile Encrypted Traffic Classification Based on Fusion Features
    Zhang, Hui
    Gou, Gaopeng
    Xiong, Gang
    Liu, Chang
    Tan, Yuewen
    Ye, Ke
    SCIENCE OF CYBER SECURITY, SCISEC 2021, 2021, 13005 : 154 - 170
  • [3] CoTNeT: Contextual transformer network for encrypted traffic classification
    Huang, Hong
    Lu, Ye
    Zhou, Shaohua
    Zhang, Xingxing
    Li, Ze
    EGYPTIAN INFORMATICS JOURNAL, 2024, 26
  • [4] Vision Transformer Features-Based Leukemia Classification
    Ben-Suliman, Karima
    Krzyzak, Adam
    ARTIFICIAL NEURAL NETWORKS IN PATTERN RECOGNITION, ANNPR 2024, 2024, 15154 : 111 - 120
  • [5] Encrypted Traffic Classification Using Statistical Features
    Mahdavi, Ehsan
    Fanian, Ali
    Hassannejad, Homa
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2018, 10 (01): : 29 - 43
  • [6] TransECA-Net: A Transformer-Based Model for Encrypted Traffic Classification
    Liu, Ziao
    Xie, Yuanyuan
    Luo, Yanyan
    Wang, Yuxin
    Ji, Xiangmin
    APPLIED SCIENCES-BASEL, 2025, 15 (06):
  • [7] An Encrypted Traffic Classification Approach Based on Path Signature Features and LSTM
    Mei, Yihe
    Luktarhan, Nurbol
    Zhao, Guodong
    Yang, Xiaotong
    ELECTRONICS, 2024, 13 (15)
  • [8] Payload Encoding Representation from Transformer for Encrypted Traffic Classification
    HE Hongye
    YANG Zhiguo
    CHEN Xiangning
    ZTE Communications, 2021, 19 (04) : 90 - 97
  • [9] Fusion Dilated CNN for Encrypted Web Traffic Classification
    Appiah, Benjamin
    Sackey, Anthony Kingsley
    Kwabena, Owusu-Agyemang
    Kanpogninge, Ansuura JohnBosco Aristotle
    Buah, Peter Antwi
    International Journal of Network Security, 2022, 24 (04) : 733 - 740
  • [10] Seeing Traffic Paths: Encrypted Traffic Classification With Path Signature Features
    Xu, Shi-Jie
    Geng, Guang-Gang
    Jin, Xiao-Bo
    Liu, Dong-Jie
    Weng, Jian
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 2166 - 2181