A New Encrypted Traffic Identification Model Based on VAE-LSTM-DRN

被引:1
|
作者
Wang, Haizhen [1 ,2 ]
Yan, Jinying [1 ]
Jia, Na [1 ]
机构
[1] Qiqihar Univ, Coll Comp & Control Engn, Qiqihar 161006, Peoples R China
[2] Qiqihar Univ, Heilongjiang Key Lab Big Data Network Secur Detect, Qiqihar, Peoples R China
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2024年 / 78卷 / 01期
关键词
Data enhancement; LSTM; deep residual network; VAE; CLASSIFICATION;
D O I
10.32604/cmc.2023.046055
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Encrypted traffic identification pertains to the precise acquisition and categorization of data from traffic datasets containing imbalanced and obscured content. The extraction of encrypted traffic attributes and their subsequent identification presents a formidable challenge. The existing models have predominantly relied on direct extraction of encrypted traffic data from imbalanced datasets, with the dataset's imbalance significantly affecting the model's performance. In the present study, a new model, referred to as UD -VLD (Unbalanced Dataset-VAE-LSTM-DRN), was proposed to address above problem. The proposed model is an encrypted traffic identification model for handling unbalanced datasets. The encoder of the variational autoencoder (VAE) is combined with the decoder and Long -short term Memory (LSTM) in UD -VLD model to realize the data enhancement processing of the original unbalanced datasets. The enhanced data is processed by transforming the deep residual network (DRN) to address neural network gradient-related issues. Subsequently, the data is classified and recognized. The UD -VLD model integrates the related techniques of deep learning into the encrypted traffic recognition technique, thereby solving the processing problem for unbalanced datasets. The UD -VLD model was tested using the publicly available Tor dataset and VPN dataset. The UD -VLD model is evaluated against other comparative models in terms of accuracy, loss rate, precision, recall, F1 -score, total time, and ROC curve. The results reveal that the UD -VLD model exhibits better performance in both binary and multi classification, being higher than other encrypted traffic recognition models that exist for unbalanced datasets. Furthermore, the evaluation performance indicates that the UD -VLD model effectively mitigates the impact of unbalanced data on traffic classification. and can serve as a novel solution for encrypted traffic identification.
引用
收藏
页码:569 / 588
页数:20
相关论文
共 50 条
  • [1] Hybrid compression for LSTM-based encrypted traffic classification model
    Mu Q.
    Zhang M.
    International Journal of Wireless and Mobile Computing, 2024, 26 (01) : 61 - 73
  • [2] ICLSTM: Encrypted Traffic Service Identification Based on Inception-LSTM Neural Network
    Lu, Bei
    Luktarhan, Nurbol
    Ding, Chao
    Zhang, Wenhui
    SYMMETRY-BASEL, 2021, 13 (06):
  • [3] VPN Encrypted Traffic Identification for Joint Capsule and Bidirectional LSTM Networks
    Yang, Zhongfu
    Chang, Jun
    Xu, Yan
    Luo, Jinyan
    Wu, Peng
    Computer Engineering and Applications, 2023, 59 (23) : 246 - 253
  • [4] Browser Identification Based on Encrypted Traffic
    Liu, Changjiang
    Han, Jiesi
    Wei, Qiang
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, INFORMATION MANAGEMENT AND NETWORK SECURITY, 2016, 47 : 360 - 363
  • [5] Caps-LSTM: A Novel Hierarchical Encrypted VPN Network Traffic Identification Using CapsNet and LSTM
    Tang, Jiyue
    Yang, Le
    Liu, Song
    Liu, Wenmao
    Wang, Meng
    Wang, Chonghua
    Jiang, Bo
    Lu, Zhigang
    SCIENCE OF CYBER SECURITY, SCISEC 2021, 2021, 13005 : 139 - 153
  • [6] An Encrypted Traffic Classification Approach Based on Path Signature Features and LSTM
    Mei, Yihe
    Luktarhan, Nurbol
    Zhao, Guodong
    Yang, Xiaotong
    ELECTRONICS, 2024, 13 (15)
  • [7] Encrypted Network Traffic Identification Based on 2D-CNN Model
    Zhou, Yan
    Shi, Huiling
    Zhao, Yuhan
    Gao, Wei
    Zhang, Wei
    2021 22ND ASIA-PACIFIC NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (APNOMS), 2021, : 238 - 241
  • [8] Identification method of encrypted traffic based on support vector machine
    Cheng G.
    Chen Y.
    Dongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Southeast University (Natural Science Edition), 2017, 47 (04): : 655 - 659
  • [9] Constructing Attention-LSTM-VAE Power Load Model Based on Multiple Features
    Ma, Chaoyue
    Wang, Ying
    Li, Feng
    Zhang, Huiyan
    Zhang, Yong
    Zhang, Haiyan
    ADVANCES IN MATHEMATICAL PHYSICS, 2024, 2024
  • [10] A Heuristic Statistical Testing Based Approach for Encrypted Network Traffic Identification
    Niu, Weina
    Zhuo, Zhongliu
    Zhang, Xiaosong
    Du, Xiaojiang
    Yang, Guowu
    Guizani, Mohsen
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2019, 68 (04) : 3843 - 3853