Real-time Application Identification of RTC Media Streams via Encrypted Traffic Analysis

被引:2
|
作者
Wu, Hua [1 ,2 ,3 ,4 ]
Zhu, Chengfei [1 ,3 ]
Cheng, Guang [1 ,3 ,4 ]
Hu, Xiaoyan [1 ,3 ,4 ]
机构
[1] Southeast Univ, Sch Cyber Sci & Engn, Nanjing, Peoples R China
[2] Purple Mt Labs Network & Commun Secur, Nanjing, Peoples R China
[3] Southeast Univ, Key Lab Comp Network & Informat Integrat, Nanjing, Peoples R China
[4] Jiangsu Prov Engn Res Ctr Secur Ubiquitous Networ, Nanjing, Peoples R China
基金
国家重点研发计划;
关键词
Social Networks; Media Streams; Real-time Communication; Application Identification; Deep Learning; CLASSIFICATION; NETWORK;
D O I
10.1109/ICCCN54977.2022.9868928
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The globalization of the economy and the increase in network bandwidth have contributed significantly to the development and popularity of real-time communication (RTC) social applications. RTC media streams, such as video meetings and calls, require more network resources and real-time performance than other services. In order to meet the requirements of RTC application providers to offer a higher level of service to their subscribers, Internet Service Providers (ISPs) need to identify the application to which the RTC media stream belongs. There are already some studies on traffic identification. However, the extant work is not yet able to distinguish the corresponding applications from the same type of media streams in real time. In addition, most of the work is not validated with actual data containing massive background traffic. Hence, we propose a real-time application identification method for meeting and calling RTC media streams in social networks. By analyzing the encrypted traffic, the method extracts features from the unit-time traffic aggregation without using payload and related information fields. The generated feature sequences are fed to our lightweight model. Our proposed method does not depend on initial packets or whole flows, and only an arbitrary 3-second traffic block is needed to achieve over 99% accuracy. Moreover, experiments using high-speed network traffic reflect that our approach can identify corresponding applications from RTC media streams in real time. Besides, comparisons with similar work show that this method requires only 1/160th of the memory and 1/10th of the processing time.
引用
收藏
页数:10
相关论文
共 50 条
  • [1] Towards Real-time Processing for Application Identification of Encrypted Traffic
    Kumano, Yuichi
    Ata, Shingo
    Nakamura, Nobuyuki
    Nakahira, Yoshihiro
    Oka, Ikuo
    [J]. 2014 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2014, : 136 - 140
  • [2] Effective and Real-time In-App Activity Analysis in Encrypted Internet Traffic Streams
    Liu, Junming
    Fu, Yanjie
    Ming, Jingci
    Ren, Yong
    Sun, Leilei
    Xiong, Hui
    [J]. KDD'17: PROCEEDINGS OF THE 23RD ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2017, : 335 - 344
  • [3] Entropy Estimation for Real-Time Encrypted Traffic Identification (Short Paper)
    Dorfinger, Peter
    Panholzer, Georg
    John, Wolfgang
    [J]. TRAFFIC MONITORING AND ANALYSIS: THIRD INTERNATIONAL WORKSHOP, TMA 2011, 2011, 6613 : 164 - +
  • [4] Real-Time Encrypted Traffic Classification via Lightweight Neural Networks
    Cheng, Jin
    He, Runkang
    Yuepeng, E.
    Wu, Yulei
    You, Junling
    Li, Tong
    [J]. 2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2020,
  • [5] Behavior-Based Method for Real-Time Identification of Encrypted Proxy Traffic
    Luo, Ping
    Wang, Fei
    Chen, Shuhui
    Li, Zhenxing
    [J]. 2021 13TH INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN 2021), 2021, : 289 - 295
  • [6] Acceleration of Feature Extraction for Real-Time Analysis of Encrypted Network Traffic
    Vrana, Roman
    Korenek, Jan
    Novak, David
    [J]. 2019 IEEE 22ND INTERNATIONAL SYMPOSIUM ON DESIGN AND DIAGNOSTICS OF ELECTRONIC CIRCUITS & SYSTEMS (DDECS), 2019,
  • [7] Deep learning-based real-time VPN encrypted traffic identification methods
    Lulu Guo
    Qianqiong Wu
    Shengli Liu
    Ming Duan
    Huijie Li
    Jianwen Sun
    [J]. Journal of Real-Time Image Processing, 2020, 17 : 103 - 114
  • [8] Deep learning-based real-time VPN encrypted traffic identification methods
    Guo, Lulu
    Wu, Qianqiong
    Liu, Shengli
    Duan, Ming
    Li, Huijie
    Sun, Jianwen
    [J]. JOURNAL OF REAL-TIME IMAGE PROCESSING, 2020, 17 (01) : 103 - 114
  • [9] Delay analysis for real-time and non real-time traffic streams under a priority cell scheduling
    Ishizaki, F
    Takine, T
    Oie, Y
    [J]. GLOBECOM 98: IEEE GLOBECOM 1998 - CONFERENCE RECORD, VOLS 1-6: THE BRIDGE TO GLOBAL INTEGRATION, 1998, : 3007 - 3012
  • [10] Requet: Real-Time QoE Detection for Encrypted YouTube Traffic
    Gutterman, Craig
    Guo, Katherine
    Arora, Sarthak
    Wang, Xiaoyang
    Wu, Les
    Katz-Bassett, Ethan
    Zussman, Gil
    [J]. PROCEEDINGS OF THE 10TH ACM MULTIMEDIA SYSTEMS CONFERENCE (ACM MMSYS'19), 2019, : 48 - 59