A New Encrypted Traffic Identification Model Based on VAE-LSTM-DRN

被引:1
|
作者
Wang, Haizhen [1 ,2 ]
Yan, Jinying [1 ]
Jia, Na [1 ]
机构
[1] Qiqihar Univ, Coll Comp & Control Engn, Qiqihar 161006, Peoples R China
[2] Qiqihar Univ, Heilongjiang Key Lab Big Data Network Secur Detect, Qiqihar, Peoples R China
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2024年 / 78卷 / 01期
关键词
Data enhancement; LSTM; deep residual network; VAE; CLASSIFICATION;
D O I
10.32604/cmc.2023.046055
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Encrypted traffic identification pertains to the precise acquisition and categorization of data from traffic datasets containing imbalanced and obscured content. The extraction of encrypted traffic attributes and their subsequent identification presents a formidable challenge. The existing models have predominantly relied on direct extraction of encrypted traffic data from imbalanced datasets, with the dataset's imbalance significantly affecting the model's performance. In the present study, a new model, referred to as UD -VLD (Unbalanced Dataset-VAE-LSTM-DRN), was proposed to address above problem. The proposed model is an encrypted traffic identification model for handling unbalanced datasets. The encoder of the variational autoencoder (VAE) is combined with the decoder and Long -short term Memory (LSTM) in UD -VLD model to realize the data enhancement processing of the original unbalanced datasets. The enhanced data is processed by transforming the deep residual network (DRN) to address neural network gradient-related issues. Subsequently, the data is classified and recognized. The UD -VLD model integrates the related techniques of deep learning into the encrypted traffic recognition technique, thereby solving the processing problem for unbalanced datasets. The UD -VLD model was tested using the publicly available Tor dataset and VPN dataset. The UD -VLD model is evaluated against other comparative models in terms of accuracy, loss rate, precision, recall, F1 -score, total time, and ROC curve. The results reveal that the UD -VLD model exhibits better performance in both binary and multi classification, being higher than other encrypted traffic recognition models that exist for unbalanced datasets. Furthermore, the evaluation performance indicates that the UD -VLD model effectively mitigates the impact of unbalanced data on traffic classification. and can serve as a novel solution for encrypted traffic identification.
引用
收藏
页码:569 / 588
页数:20
相关论文
共 50 条
  • [41] Research on Traffic Crash Prediction Based on CNN-LSTM Model
    Wang, Shaohua
    Zhang, Sinan
    Lu, Lei
    Zhang, Keke
    Liu, Xia
    Chen, Ning
    CICTP 2023: INNOVATION-EMPOWERED TECHNOLOGY FOR SUSTAINABLE, INTELLIGENT, DECARBONIZED, AND CONNECTED TRANSPORTATION, 2023, : 1185 - 1193
  • [42] A New Way of Airline Traffic Prediction Based on GCN-LSTM
    Yu, Jiangni
    FRONTIERS IN NEUROROBOTICS, 2021, 15
  • [43] Identification of encrypted and malicious network traffic based on one-dimensional convolutional neural network
    Yan Zhou
    Huiling Shi
    Yanling Zhao
    Wei Ding
    Jing Han
    Hongyang Sun
    Xianheng Zhang
    Chang Tang
    Wei Zhang
    Journal of Cloud Computing, 12
  • [44] An IoT Device Identification Method over Encrypted Traffic Based on t-SNE Dimensionality
    Chen, Jiayun
    Zeng, Yong
    Liu, Zhihong
    Ma, Jianfeng
    Zhou, Tianci
    Liu, Jiale
    2022 IEEE 21ST INTERNATIONAL CONFERENCE ON UBIQUITOUS COMPUTING AND COMMUNICATIONS, IUCC/CIT/DSCI/SMARTCNS, 2022, : 67 - 72
  • [45] Deep learning-based real-time VPN encrypted traffic identification methods
    Lulu Guo
    Qianqiong Wu
    Shengli Liu
    Ming Duan
    Huijie Li
    Jianwen Sun
    Journal of Real-Time Image Processing, 2020, 17 : 103 - 114
  • [46] Deep learning-based real-time VPN encrypted traffic identification methods
    Guo, Lulu
    Wu, Qianqiong
    Liu, Shengli
    Duan, Ming
    Li, Huijie
    Sun, Jianwen
    JOURNAL OF REAL-TIME IMAGE PROCESSING, 2020, 17 (01) : 103 - 114
  • [47] Identification of encrypted and malicious network traffic based on one-dimensional convolutional neural network
    Zhou, Yan
    Shi, Huiling
    Zhao, Yanling
    Ding, Wei
    Han, Jing
    Sun, Hongyang
    Zhang, Xianheng
    Tang, Chang
    Zhang, Wei
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2023, 12 (01):
  • [48] Mathematical model based traffic violations identification
    Mehboob, Fozia
    Abbas, Muhammad
    Rauf, Abdul
    COMPUTATIONAL AND MATHEMATICAL ORGANIZATION THEORY, 2019, 25 (03) : 302 - 318
  • [49] Mathematical model based traffic violations identification
    Fozia Mehboob
    Muhammad Abbas
    Abdul Rauf
    Computational and Mathematical Organization Theory, 2019, 25 : 302 - 318
  • [50] Malicious encrypted traffic features extraction model based on unsupervised feature adaptive learning
    Zhou, Zhihong
    Bin, Hu
    Li, Jianhua
    Yin, Ying
    Chen, Xiuzhen
    Ma, Jin
    Yao, Lihong
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2022, 18 (04) : 453 - 463