TGPrint: Attack fingerprint classification on encrypted network traffic based graph convolution attention networks

被引:2
|
作者
Wang, Leiqi [1 ,2 ]
Ma, Xiu [1 ,2 ]
Li, Ning [1 ]
Lv, Qiujian [1 ]
Wang, Yan [1 ,2 ]
Huang, Weiqing [1 ,2 ]
Chen, Haiyan [3 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
[3] Chinese Res Inst Environm Sci, Beijing, Peoples R China
关键词
Attack classification; Encrypted network traffic; Unseen attack; Attack graph; Graph neural networks;
D O I
10.1016/j.cose.2023.103466
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, most network traffic is encrypted, which protects user privacy but hides attack traces, further hindering identifying attacks to inspect traffic packages. Machine Learning (ML) methods are widely applied to attack classification on encrypted traffic owing to no need for manual analysis. However, existing studies only concentrate on basic statistical features and cannot obtain the crucial attack behaviors hiding in the encrypted traffic. Worse still, attackers constantly update attack vectors to evade detection, which means outdated features extracted from historical traffic fail to recognize unseen attacks. As a solution, we propose an attack classification approach, attack fingerprint based on graphs of time-window (TGPrint). We first filter normal traffic flows using ML models to eliminate the impact of useless, noisy data for attack classification and maintain suspicious traffic. Then, we create attack graphs to depict interaction behaviors of attack-victim hosts from suspicious traffic containing crucial attack behaviors. Besides, we divide a specific duration for each attack to precisely elaborate attack graphs, where temporal, statistical, and aggregate features are extracted to portray attack behaviors. Finally, we utilize Graph Neural Networks (GNNs) to mine and grasp the crucial behavior patterns from attack graphs to generate fingerprints and classify attacks, even unseen attacks. Extensive experiments are conducted on well-known datasets to verify our approach. It achieves a precision of 99% in attack classification on encrypted traffic, an average higher than other ML methods of 50%. Meanwhile, it classifies unseen attacks with an average accuracy of over 80% and has a strong robustness to false positives.
引用
收藏
页数:12
相关论文
共 50 条
  • [1] Flow-Based Encrypted Network Traffic Classification With Graph Neural Networks
    Huoh, Ting-Li
    Luo, Yan
    Li, Peilong
    Zhang, Tong
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2023, 20 (02): : 1224 - 1237
  • [2] Encrypted Traffic Classification Based on Text Convolution Neural Networks
    Song, Mingze
    Ran, Jing
    Li, Shulan
    PROCEEDINGS OF 2019 IEEE 7TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2019), 2019, : 432 - 436
  • [3] MAppGraph: Mobile-App Classification on Encrypted Network Traffic using Deep Graph Convolution Neural Networks
    Thai-Dien Pham
    Thien-Lac Ho
    Tram Truong-Huu
    Tien-Dung Cao
    Hong-Linh Truong
    37TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, ACSAC 2021, 2021, : 1025 - 1038
  • [4] SAT-Net: A staggered attention network using graph neural networks for encrypted traffic classification
    Li, Zhiyuan
    Zhao, Hongyi
    Zhao, Jingyu
    Jiang, Yuqi
    Bu, Fanliang
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2025, 233
  • [5] EC-GCN: A encrypted traffic classification framework based on multi-scale graph convolution networks
    Diao, Zulong
    Xie, Gaogang
    Wang, Xin
    Ren, Rui
    Meng, Xuying
    Zhang, Guangxing
    Xie, Kun
    Qiao, Mingyu
    COMPUTER NETWORKS, 2023, 224
  • [6] A Network Traffic Classification Method Based on Graph Convolution and LSTM
    Pan, Yang
    Zhang, Xiao
    Jiang, Hui
    Li, Cong
    IEEE ACCESS, 2021, 9 (09): : 158261 - 158272
  • [7] A novel and effective encrypted traffic classification method based on channel attention and deformable convolution
    Zou, Aobo
    Yang, Wen
    Tang, Chaowei
    Lu, Jingwen
    Guo, Jiayuan
    COMPUTERS & ELECTRICAL ENGINEERING, 2024, 118
  • [8] TB-Graph: Enhancing Encrypted Malicious Traffic Classification through Relational Graph Attention Networks
    Liu, Ming
    Yang, Qichao
    Wang, Wenqing
    Liu, Shengli
    CMC-COMPUTERS MATERIALS & CONTINUA, 2025, 82 (02): : 2985 - 3004
  • [9] Encrypted Traffic Classification Using Graph Convolutional Networks
    Mo, Shuang
    Wang, Yifei
    Xiao, Ding
    Wu, Wenrui
    Fan, Shaohua
    Shi, Chuan
    ADVANCED DATA MINING AND APPLICATIONS, 2020, 12447 : 207 - 219
  • [10] A graph representation framework for encrypted network traffic classification
    Okonkwo, Zulu
    Foo, Ernest
    Hou, Zhe
    Li, Qinyi
    Jadidi, Zahra
    COMPUTERS & SECURITY, 2025, 148