Traffic Pattern Plot: Video Identification in Encrypted Network Traffic

被引:0
|
作者
Kamal, Ali S. [1 ]
Bukhari, Syed M. A. H. [1 ]
Khan, Muhammad U. S. [1 ]
Maqsood, Tahir [1 ]
Fayyaz, Muhammad A. B. [2 ]
机构
[1] COMSATS Univ Islamabad, Dept Comp Sci, Abbottabad, Pakistan
[2] Manchester Metropolitan Univ Manchester, OTEHM, Manchester, Lancs, England
关键词
Traffic pattern; VPN traffic classification; YouTube video identification; Image classification; NEURAL-NETWORKS; CLASSIFICATION; INTERNET;
D O I
10.1007/978-981-19-7663-6_8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Most of the Internet traffic is encrypted, and the challenge is its ability to recognize the streaming videos from the Internet traffic. In this paper, we present a methodology named traffic pattern plot (TPP) to identify video streams in encrypted network traffic. The proposed methodology plots the video traffic flows and uses a convolutional neural network (CNN) to detect the videos. The results show that the traffic pattern plot generated from 120 s of sniffing network traffic is enough to identify the video even in the encrypted network traffic with 94% accuracy.
引用
收藏
页码:77 / 84
页数:8
相关论文
共 50 条
  • [31] Encrypted Voice Traffic Fingerprinting: An Adaptive Network Traffic Feature Encoding Model
    Zhou, Tianci
    Zeng, Yong
    Chen, Yitao
    Liu, Zhihong
    Ma, Jianfeng
    [J]. ICC 2023-IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2023, : 3768 - 3773
  • [32] Statistical Pattern Recognition Based Content Analysis on Encrypted Network Traffic for the TeamViewer Application
    Altschaffel, Robert
    Clausing, Robert
    Kraetzer, Christian
    Hoppe, Tobias
    Kiltz, Stefan
    Dittmann, Jana
    [J]. 2013 SEVENTH INTERNATIONAL CONFERENCE ON IT SECURITY INCIDENT MANAGEMENT AND IT FORENSICS (IMF 2013), 2013, : 113 - 121
  • [33] Identification of encrypted and malicious network traffic based on one-dimensional convolutional neural network
    Yan Zhou
    Huiling Shi
    Yanling Zhao
    Wei Ding
    Jing Han
    Hongyang Sun
    Xianheng Zhang
    Chang Tang
    Wei Zhang
    [J]. Journal of Cloud Computing, 12
  • [34] Identification of encrypted and malicious network traffic based on one-dimensional convolutional neural network
    Zhou, Yan
    Shi, Huiling
    Zhao, Yanling
    Ding, Wei
    Han, Jing
    Sun, Hongyang
    Zhang, Xianheng
    Tang, Chang
    Zhang, Wei
    [J]. JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2023, 12 (01):
  • [35] eMIMIC: Estimating HTTP-based Video QoE Metrics from Encrypted Network Traffic
    Mangla, Tarun
    Halepovic, Emir
    Ammar, Mostafa
    Zegura, Ellen
    [J]. 2018 NETWORK TRAFFIC MEASUREMENT AND ANALYSIS CONFERENCE (TMA), 2018,
  • [36] ICLSTM: Encrypted Traffic Service Identification Based on Inception-LSTM Neural Network
    Lu, Bei
    Luktarhan, Nurbol
    Ding, Chao
    Zhang, Wenhui
    [J]. SYMMETRY-BASEL, 2021, 13 (06):
  • [37] Silhouette - Identifying YouTube Video Flows from Encrypted Traffic
    Li, Feng
    Chung, Jae Won
    Claypool, Mark
    [J]. PROCEEDINGS OF THE 28TH ACM WORKSHOP ON NETWORK AND OPERATING SYSTEMS SUPPORT FOR DIGITAL AUDIO AND VIDEO (NOSSDAV'18), 2018, : 19 - 24
  • [38] Identification of Malicious Encrypted Traffic Through Feature Fusion
    Zheng, Xianchun
    Li, Hui
    [J]. IEEE ACCESS, 2023, 11 : 80072 - 80080
  • [39] Social Software User Behavior Identification for Encrypted Traffic
    Wu, Hua
    Wang, Lei
    Huang, Ruiqi
    Cheng, Guang
    Hu, Xiaoyan
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2024, 61 (09): : 2321 - 2333
  • [40] A Survey on Internet Encrypted Traffic Detection, Classification and Identification
    Chen, Zi-Han
    Cheng, Guang
    Xu, Zi-Heng
    Xu, Ke-Ya
    Qiu, Xing
    Niu, Dan-Dan
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2023, 46 (05): : 1060 - 1085