A Heuristic Statistical Testing Based Approach for Encrypted Network Traffic Identification

被引:20
|
作者
Niu, Weina [1 ,2 ]
Zhuo, Zhongliu [2 ]
Zhang, Xiaosong [2 ]
Du, Xiaojiang [3 ]
Yang, Guowu [4 ]
Guizani, Mohsen [5 ]
机构
[1] Sichuan Univ, Coll Cybersecur, Chengdu 610065, Sichuan, Peoples R China
[2] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Ctr Cyber Secur, Chengdu 611731, Sichuan, Peoples R China
[3] Temple Univ, Dept Comp & Informat Sci, Philadelphia, PA 19122 USA
[4] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Big Data Res Ctr, Chengdu 611731, Sichuan, Peoples R China
[5] Qatar Univ, Coll Engn, Doha 2713, Qatar
基金
中国国家自然科学基金;
关键词
Encrypted traffic identification; protocol-independent; statistical testing; machine learning; handshake skipping; KEY MANAGEMENT SCHEME; SENSOR; SECURITY; ATTACKS;
D O I
10.1109/TVT.2019.2894290
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In recent years, malware with strong concealment uses encrypted protocol to evade detection. Thus, encrypted traffic identification can help security analysts to be more effective in narrowing down those encrypted network traffic. Existing methods are protocol independent, such as statistical-based and machine-learning- based approaches. Statistical-based approaches, however, are confined to payload length and machine-learning-based approaches have a low recognition rate for encrypted traffic using undisclosed protocols. In this paper, we proposed a heuristic statistical testing (HST) approach that combines both statistics and machine learning and has been proved to alleviate their respective deficiencies. We manually selected four randomness tests to extract small payload features for machine learning to improve real-time performances. We also proposed a simple handshake skipping method called HST-R to increase the classification accuracy. We compared our approach with other identification approaches on a testing dataset consisting of traffic that uses two known, two undisclosed, and one custom cryptographic protocols. Experimental results showed that HST-R performs better than other traditional coding-based, entropy-based, and ML-based approaches. We also showed that our handshake skipping method could generalize better for unknown cryptographic protocols. Finally, we also conducted experimental comparisons among different classification algorithms. The results showed that C4.5, with our method, has the highest identification accuracy for secure sockets layer and secure shell traffic.
引用
收藏
页码:3843 / 3853
页数:11
相关论文
共 50 条
  • [31] Research on Encrypted Malicious 5G Access Network Traffic Identification Based on Deep Learning
    Gao, Zongning
    Zhang, Shunliang
    [J]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2023, 14299 LNCS : 496 - 512
  • [32] Encrypted Traffic Classification Using Statistical Features
    Mahdavi, Ehsan
    Fanian, Ali
    Hassannejad, Homa
    [J]. ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2018, 10 (01): : 29 - 43
  • [33] Research on malicious traffic identification technology in encrypted traffic
    Zeng, Yong
    Wu, Zhengyuan
    Dong, Lihua
    Liu, Zhihong
    Ma, Jianfeng
    Li, Zan
    [J]. Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2021, 48 (03): : 170 - 187
  • [34] Heuristic Intrusion Detection Based on Traffic Flow Statistical Analysis
    Szczepanik, Wojciech
    Niemiec, Marcin
    [J]. ENERGIES, 2022, 15 (11)
  • [35] Heuristic traffic identification method based on trusted list
    Wang, Jiao
    Zhou, Ya-Jian
    Yang, Yi-Xian
    [J]. Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2008, 31 (02): : 95 - 98
  • [36] Network Intrusion Detection in Encrypted Traffic
    Papadogiannaki, Eva
    Tsirantonakis, Giorgos
    Ioannidis, Sotiris
    [J]. 2022 5TH IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (IEEE DSC 2022), 2022,
  • [37] Accurate Encrypted Malicious Traffic Identification via Traffic Interaction Pattern Using Graph Convolutional Network
    Ren, Guoqiang
    Cheng, Guang
    Fu, Nan
    [J]. APPLIED SCIENCES-BASEL, 2023, 13 (03):
  • [38] A network fault diagnostic approach based on a statistical traffic normality prediction algorithm
    Jiang, J
    Papavassiliou, S
    [J]. GLOBECOM'03: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-7, 2003, : 2918 - 2922
  • [39] A VPN-Encrypted Traffic Identification Method Based on Ensemble Learning
    Cao, Jie
    Yuan, Xing-Liang
    Cui, Ying
    Fan, Jia-Cheng
    Chen, Chin-Ling
    [J]. APPLIED SCIENCES-BASEL, 2022, 12 (13):
  • [40] Edge Intelligence Based Identification and Classification of Encrypted Traffic of Internet of Things
    Zhao, Yue
    Yang, Yarang
    Tian, Bo
    Yang, Jin
    Zhang, Tianyi
    Hu, Ning
    [J]. IEEE ACCESS, 2021, 9 : 21895 - 21903