Behavior-Based Method for Real-Time Identification of Encrypted Proxy Traffic

被引:5
|
作者
Luo, Ping [1 ]
Wang, Fei [1 ]
Chen, Shuhui [1 ]
Li, Zhenxing [1 ]
机构
[1] Natl Univ Def Technol, Coll Comp, Changsha, Peoples R China
关键词
encrypted proxy; traffic identification; behavior feature; CLASSIFICATION;
D O I
10.1109/ICCSN52437.2021.9463594
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Encrypted proxy is often used to hide malicious behavior or criminal activity on the Internet. Therefore, identifying encrypted proxy traffic is essential for network management and communication security. Existing researches usually use statistical features to profile network flows, which only have limited effects on encrypted proxy traffic, and are not suitable for real-time identification. In this paper, a novel behavior-based approach for encrypted proxy traffic detection is proposed. Two unique behavior features, IP proxy and data encryption behaviors, which are highly related to the activity of accessing network through encrypted proxies, are defined as learning features. Machine learning techniques are adopted for encrypted proxy traffic identification. The experiments on a real V2Ray traffic dataset demonstrate that the behavior-based method can identify encrypted proxy traffic with high accuracy, up to 99.86%. Besides, the method can timely seek out target flows, as all those behavior features can be obtained in the first packet.
引用
收藏
页码:289 / 295
页数:7
相关论文
共 50 条
  • [1] Towards Real-time Processing for Application Identification of Encrypted Traffic
    Kumano, Yuichi
    Ata, Shingo
    Nakamura, Nobuyuki
    Nakahira, Yoshihiro
    Oka, Ikuo
    [J]. 2014 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2014, : 136 - 140
  • [2] Real-time behavior-based robot control
    Woolley, Brian G.
    Peterson, Gilbert L.
    Kresge, Jared T.
    [J]. AUTONOMOUS ROBOTS, 2011, 30 (03) : 233 - 242
  • [3] Real-time behavior-based robot control
    Brian G. Woolley
    Gilbert L. Peterson
    Jared T. Kresge
    [J]. Autonomous Robots, 2011, 30 : 233 - 242
  • [4] Deep learning-based real-time VPN encrypted traffic identification methods
    Guo, Lulu
    Wu, Qianqiong
    Liu, Shengli
    Duan, Ming
    Li, Huijie
    Sun, Jianwen
    [J]. JOURNAL OF REAL-TIME IMAGE PROCESSING, 2020, 17 (01) : 103 - 114
  • [5] Deep learning-based real-time VPN encrypted traffic identification methods
    Lulu Guo
    Qianqiong Wu
    Shengli Liu
    Ming Duan
    Huijie Li
    Jianwen Sun
    [J]. Journal of Real-Time Image Processing, 2020, 17 : 103 - 114
  • [6] Entropy Estimation for Real-Time Encrypted Traffic Identification (Short Paper)
    Dorfinger, Peter
    Panholzer, Georg
    John, Wolfgang
    [J]. TRAFFIC MONITORING AND ANALYSIS: THIRD INTERNATIONAL WORKSHOP, TMA 2011, 2011, 6613 : 164 - +
  • [7] A behavior-based flame detection method for a real-time video surveillance system
    Kuo, Jong-Yih
    Lai, Tai-Yu
    Fanjiang, Yong-Yi
    Huang, Fu-Chu
    Liao, Yi-Han
    [J]. JOURNAL OF THE CHINESE INSTITUTE OF ENGINEERS, 2015, 38 (07) : 947 - 958
  • [8] Real-time Application Identification of RTC Media Streams via Encrypted Traffic Analysis
    Wu, Hua
    Zhu, Chengfei
    Cheng, Guang
    Hu, Xiaoyan
    [J]. 2022 31ST INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN 2022), 2022,
  • [9] Real-time behavior-based assessment and control of swine thermal comfort
    Xin, H.
    Shao, B.
    [J]. Livestock Environment VII, Proceedings, 2005, : 694 - 702
  • [10] Requet: Real-Time QoE Detection for Encrypted YouTube Traffic
    Gutterman, Craig
    Guo, Katherine
    Arora, Sarthak
    Wang, Xiaoyang
    Wu, Les
    Katz-Bassett, Ethan
    Zussman, Gil
    [J]. PROCEEDINGS OF THE 10TH ACM MULTIMEDIA SYSTEMS CONFERENCE (ACM MMSYS'19), 2019, : 48 - 59