A Heuristic Statistical Testing Based Approach for Encrypted Network Traffic Identification

被引:20
|
作者
Niu, Weina [1 ,2 ]
Zhuo, Zhongliu [2 ]
Zhang, Xiaosong [2 ]
Du, Xiaojiang [3 ]
Yang, Guowu [4 ]
Guizani, Mohsen [5 ]
机构
[1] Sichuan Univ, Coll Cybersecur, Chengdu 610065, Sichuan, Peoples R China
[2] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Ctr Cyber Secur, Chengdu 611731, Sichuan, Peoples R China
[3] Temple Univ, Dept Comp & Informat Sci, Philadelphia, PA 19122 USA
[4] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Big Data Res Ctr, Chengdu 611731, Sichuan, Peoples R China
[5] Qatar Univ, Coll Engn, Doha 2713, Qatar
基金
中国国家自然科学基金;
关键词
Encrypted traffic identification; protocol-independent; statistical testing; machine learning; handshake skipping; KEY MANAGEMENT SCHEME; SENSOR; SECURITY; ATTACKS;
D O I
10.1109/TVT.2019.2894290
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In recent years, malware with strong concealment uses encrypted protocol to evade detection. Thus, encrypted traffic identification can help security analysts to be more effective in narrowing down those encrypted network traffic. Existing methods are protocol independent, such as statistical-based and machine-learning- based approaches. Statistical-based approaches, however, are confined to payload length and machine-learning-based approaches have a low recognition rate for encrypted traffic using undisclosed protocols. In this paper, we proposed a heuristic statistical testing (HST) approach that combines both statistics and machine learning and has been proved to alleviate their respective deficiencies. We manually selected four randomness tests to extract small payload features for machine learning to improve real-time performances. We also proposed a simple handshake skipping method called HST-R to increase the classification accuracy. We compared our approach with other identification approaches on a testing dataset consisting of traffic that uses two known, two undisclosed, and one custom cryptographic protocols. Experimental results showed that HST-R performs better than other traditional coding-based, entropy-based, and ML-based approaches. We also showed that our handshake skipping method could generalize better for unknown cryptographic protocols. Finally, we also conducted experimental comparisons among different classification algorithms. The results showed that C4.5, with our method, has the highest identification accuracy for secure sockets layer and secure shell traffic.
引用
收藏
页码:3843 / 3853
页数:11
相关论文
共 50 条
  • [1] Protocol identification of encrypted network traffic
    Gebski, Matthew
    Penev, Alex
    Wong, Raymond K.
    [J]. 2006 IEEE/WIC/ACM International Conference on Web Intelligence, (WI 2006 Main Conference Proceedings), 2006, : 957 - 960
  • [2] Statistical identification of encrypted web browsing traffic
    Sun, QX
    Simon, DR
    Wang, YM
    Russell, W
    Padmanabhan, VN
    Qiu, L
    [J]. 2002 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2002, : 19 - 30
  • [3] DSCA: An Inline and Adaptive Application Identification Approach in Encrypted Network Traffic
    Nazari, Ziaeddin
    Noferesti, Morteza
    Jalili, Rasool
    [J]. PROCEEDINGS OF 2019 THE 3RD INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY (ICCSP 2019) WITH WORKSHOP 2019 THE 4TH INTERNATIONAL CONFERENCE ON MULTIMEDIA AND IMAGE PROCESSING (ICMIP 2019), 2019, : 39 - 43
  • [4] FLOWGAN:Unbalanced network encrypted traffic identification method based on GAN
    Wang, ZiXuan
    Wang, Pan
    Zhou, Xiaokang
    Li, ShuHang
    Zhang, MoXuan
    [J]. 2019 IEEE INTL CONF ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, BIG DATA & CLOUD COMPUTING, SUSTAINABLE COMPUTING & COMMUNICATIONS, SOCIAL COMPUTING & NETWORKING (ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM 2019), 2019, : 975 - 983
  • [5] Traffic Pattern Plot: Video Identification in Encrypted Network Traffic
    Kamal, Ali S.
    Bukhari, Syed M. A. H.
    Khan, Muhammad U. S.
    Maqsood, Tahir
    Fayyaz, Muhammad A. B.
    [J]. INTELLIGENT SUSTAINABLE SYSTEMS, WORLDS4 2022, VOL 2, 2023, 579 : 77 - 84
  • [6] Browser Identification Based on Encrypted Traffic
    Liu, Changjiang
    Han, Jiesi
    Wei, Qiang
    [J]. PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, INFORMATION MANAGEMENT AND NETWORK SECURITY, 2016, 47 : 360 - 363
  • [7] Semisupervised Encrypted Traffic Identification Based on Auxiliary Classification Generative Adversarial Network
    Mao, Jiaming
    Zhang, Mingming
    Chen, Mu
    Chen, Lu
    Xia, Fei
    Fan, Lei
    Wang, ZiXuan
    Zhao, Wenbing
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2021, 39 (03): : 373 - 390
  • [8] PPS: A Packets Pattern-based Video Identification in Encrypted Network Traffic
    Bukhari, Syed M. A. H.
    Afaq, Muhammad
    Song, Wang-Cheol
    [J]. 16TH IEEE/ACM INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING, UCC 2023, 2023,
  • [9] Source identification of encrypted video traffic in the presence of heterogeneous network traffic
    Shi, Yan
    Ross, Arun
    Biswas, Subir
    [J]. COMPUTER COMMUNICATIONS, 2018, 129 : 101 - 110
  • [10] FPGA-based encrypted network traffic identification at 100 Gbit/s
    Ruiz, Mario
    Sutter, Gustavo
    Lopez-Buedo, Sergio
    Lopez de Vergara, Jorge E.
    [J]. 2016 INTERNATIONAL CONFERENCE ON RECONFIGURABLE COMPUTING AND FPGAS (RECONFIG16), 2016,