A Heuristic Statistical Testing Based Approach for Encrypted Network Traffic Identification

被引:20
|
作者
Niu, Weina [1 ,2 ]
Zhuo, Zhongliu [2 ]
Zhang, Xiaosong [2 ]
Du, Xiaojiang [3 ]
Yang, Guowu [4 ]
Guizani, Mohsen [5 ]
机构
[1] Sichuan Univ, Coll Cybersecur, Chengdu 610065, Sichuan, Peoples R China
[2] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Ctr Cyber Secur, Chengdu 611731, Sichuan, Peoples R China
[3] Temple Univ, Dept Comp & Informat Sci, Philadelphia, PA 19122 USA
[4] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Big Data Res Ctr, Chengdu 611731, Sichuan, Peoples R China
[5] Qatar Univ, Coll Engn, Doha 2713, Qatar
基金
中国国家自然科学基金;
关键词
Encrypted traffic identification; protocol-independent; statistical testing; machine learning; handshake skipping; KEY MANAGEMENT SCHEME; SENSOR; SECURITY; ATTACKS;
D O I
10.1109/TVT.2019.2894290
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In recent years, malware with strong concealment uses encrypted protocol to evade detection. Thus, encrypted traffic identification can help security analysts to be more effective in narrowing down those encrypted network traffic. Existing methods are protocol independent, such as statistical-based and machine-learning- based approaches. Statistical-based approaches, however, are confined to payload length and machine-learning-based approaches have a low recognition rate for encrypted traffic using undisclosed protocols. In this paper, we proposed a heuristic statistical testing (HST) approach that combines both statistics and machine learning and has been proved to alleviate their respective deficiencies. We manually selected four randomness tests to extract small payload features for machine learning to improve real-time performances. We also proposed a simple handshake skipping method called HST-R to increase the classification accuracy. We compared our approach with other identification approaches on a testing dataset consisting of traffic that uses two known, two undisclosed, and one custom cryptographic protocols. Experimental results showed that HST-R performs better than other traditional coding-based, entropy-based, and ML-based approaches. We also showed that our handshake skipping method could generalize better for unknown cryptographic protocols. Finally, we also conducted experimental comparisons among different classification algorithms. The results showed that C4.5, with our method, has the highest identification accuracy for secure sockets layer and secure shell traffic.
引用
收藏
页码:3843 / 3853
页数:11
相关论文
共 50 条
  • [41] Research And Improvement of Encrypted Traffic Classification Based on Convolutional Neural Network
    Zhou, Yansen
    Cui, Jianquan
    [J]. 2020 IEEE 8TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), 2020, : 150 - 154
  • [42] On the Perfect Privacy: A Statistical Analysis of Network Traffic Approach
    RezaeiTabar, Amir Hossein
    Diyanat, Abolfazl
    Khonsari, Ahmad
    [J]. IEEE COMMUNICATIONS LETTERS, 2016, 20 (07) : 1357 - 1360
  • [43] Identification of Smartphone Applications by Encrypted Traffic Analysis
    Sawabe, Anan
    Iwai, Takanori
    Satoda, Kozo
    [J]. 2019 16TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2019,
  • [44] Generalization of Signatures for SSH Encrypted Traffic Identification
    Alshammari, Riyad
    Zincir-Heywood, A. Nur
    [J]. IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE IN CYBER SECURITY, 2009, : 167 - 174
  • [45] An Encrypted Traffic Classification Approach Based on Path Signature Features and LSTM
    Mei, Yihe
    Luktarhan, Nurbol
    Zhao, Guodong
    Yang, Xiaotong
    [J]. ELECTRONICS, 2024, 13 (15)
  • [46] Identifying Mobile Applications for Encrypted Network Traffic
    He, Gaofeng
    Xu, Bingfeng
    Zhu, Haiting
    [J]. 2017 FIFTH INTERNATIONAL CONFERENCE ON ADVANCED CLOUD AND BIG DATA (CBD), 2017, : 279 - 284
  • [47] Techniques for Policy Enforcement on Encrypted Network Traffic
    Hanay, Y. Sinan
    Wolf, Tilman
    [J]. MILCOM 2009 - 2009 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-4, 2009, : 1410 - 1416
  • [48] Semantic and Heuristic Based Approach for Paraphrase Identification
    Mohamed, Muhidin A.
    Oussalah, Mourad
    [J]. 2018 14TH INTERNATIONAL CONFERENCE ON SEMANTICS, KNOWLEDGE AND GRIDS (SKG), 2018, : 203 - 210
  • [49] A survey of methods for encrypted network traffic fingerprinting
    Yu, Sunghyun
    Won, Yoojae
    [J]. MATHEMATICAL BIOSCIENCES AND ENGINEERING, 2023, 20 (02) : 2183 - 2202
  • [50] A novel traffic identification approach based on multifractal analysis and combined neural network
    Hongtao Shi
    Gang Liang
    Hai Wang
    [J]. annals of telecommunications - annales des télécommunications, 2014, 69 : 155 - 169