Encrypted Data Stream Identification Based on Pattern Recognition

被引:0
|
作者
Lu, You-Li [1 ]
Zhou, Yu-Huan [2 ]
Pan, Zhi-Song [2 ]
Hu, Gu-Yu [2 ]
Cui, Nan [3 ]
Meng, Juan [2 ]
机构
[1] Navy Command Acad, Nanjing, Jiangsu, Peoples R China
[2] PLA Univ Sci & Technol, Nanjing, Jiangsu, Peoples R China
[3] PLA, Unit 94865, Sub Unit 89, Hangzhou, Zhejiang, Peoples R China
关键词
Encrypted data; Pattern recognition; NIST randomness test; GMM; SVDD;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In order to get the encrypted data stream type information without decrypting the encrypted data, this paper presents the identification method of encrypted data stream based on pattern recognition. First, the randomness test method NIST is used to analyze the data stream, getting the 15 kinds of randomness test values as the classification feature, then create classification models for different types of data streams; finally, using the trained model to identify the unknown data stream. Simulation results show that after optimizing the 15 kinds of features, the proposed method can effectively classify the different types of data stream, and the average recognition rate is about 85%.
引用
收藏
页码:914 / 919
页数:6
相关论文
共 50 条
  • [11] An Approach Enabling Various Queries on Encrypted Industrial Data Stream
    Wang, Tao
    Yang, Bo
    Qiu, Guoyong
    Zhang, Lina
    Yu, Yong
    Zhou, Yanwei
    Guo, Juncai
    SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [12] Sliding window based weighted erasable stream pattern mining for stream data applications
    Yun, Unil
    Lee, Gangin
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 59 : 1 - 20
  • [13] Bayesian Classifier Algorithm Based on Emerging Pattern for Data Stream
    Du C.
    Wang Z.-H.
    Jiang J.-J.
    Sun Y.-G.
    Wang, Zhi-Hai (zhhwang@bjtu.edu.cn), 1600, Chinese Academy of Sciences (28): : 2891 - 2904
  • [14] Pattern Matching over Encrypted Data with a Short Ciphertext
    Kim, Jongkil
    Susilo, Willy
    Chow, Yang-Wai
    Baek, Joonsang
    Kim, Intae
    INFORMATION SECURITY APPLICATIONS, 2021, 13009 : 132 - 143
  • [15] Privacy preserving pattern matching on remote encrypted data
    Oleshchuk, Vladimir
    IDAACS 2007: PROCEEDINGS OF THE 4TH IEEE WORKSHOP ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS, 2007, : 609 - 613
  • [16] Reversible Data Hiding in Encrypted Image using Checkerboard Pattern based Pixel Inversion
    Korivi, Nikhila K.
    Manikandan, V. M.
    PROCEEDINGS OF THE 2020 5TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND SECURITY (ICCCS-2020), 2020,
  • [17] Discrimination and identification of different amines by pattern recognition of kinetic spectral data
    Hasani, Masoumeh
    Emami, Fereshteh
    ANALYTICAL METHODS, 2012, 4 (05) : 1339 - 1349
  • [18] Identification of cheese species origin by pattern recognition processing of elemental data
    Suhaj, Milan
    Korenovska, Maria
    JOURNAL OF FOOD AND NUTRITION RESEARCH, 2007, 46 (04): : 174 - 180
  • [19] Identification of cloudiness by nonparametric pattern recognition algorithm from AVHRR data
    Pushkareva, TG
    Protasov, KT
    EIGHTH INTERNATIONAL SYMPOSIUM ON ATMOSPHERIC AND OCEAN OPTICS: ATMOSPHERIC PHYSICS, 2002, 4678 : 230 - 236
  • [20] Traffic Pattern Plot: Video Identification in Encrypted Network Traffic
    Kamal, Ali S.
    Bukhari, Syed M. A. H.
    Khan, Muhammad U. S.
    Maqsood, Tahir
    Fayyaz, Muhammad A. B.
    INTELLIGENT SUSTAINABLE SYSTEMS, WORLDS4 2022, VOL 2, 2023, 579 : 77 - 84