DSCA: An Inline and Adaptive Application Identification Approach in Encrypted Network Traffic

被引:6
|
作者
Nazari, Ziaeddin [1 ]
Noferesti, Morteza [1 ]
Jalili, Rasool [1 ]
机构
[1] Sharif Univ Technol, Dept Comp Engn, Tehran, Iran
关键词
Application Identification; Network Traffic Classification; Data Stream Classification;
D O I
10.1145/3309074.3309102
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Adaptive application detection in today's high-bandwidth networks is resource consuming and inaccurate due to the high volume, velocity, and variety characteristics of the networks traffic. To generate a robust classifier for identifying applications over encrypted traffic, we proposed DSCA as a DPI-based Stream Classification Algorithm. DSCA utilizes applications detected by the DPI, Deep Packet Inspection technique, as ground truth data and updates the classification model accordingly. To reduce the classification algorithms overhead without accuracy reduction, a feature selection method, named CfsSubsetEval, is deployed in DSCA. The proposed approach is implemented via the MOA tool and the performance is evaluated through UNB ISCX VPN-nonVPN and UNB ISCX Tor-nonTor datasets. 10 different stream and traditional classification algorithms are integrated with DSCA. The simulation results represent DSCA with Adaptive Random Forest stream classification algorithm has the best performance over UNB ISCX VPN-nonVPN which processed the dataset in 8.63 seconds with 96.75% accuracy. About UNB ISCX Tor-nonTor dataset, DSCA and Knn with PAW classification algorithm have the best performance (86.92% accuracy and 12.05 seconds execution time).
引用
收藏
页码:39 / 43
页数:5
相关论文
共 50 条
  • [1] Protocol identification of encrypted network traffic
    Gebski, Matthew
    Penev, Alex
    Wong, Raymond K.
    [J]. 2006 IEEE/WIC/ACM International Conference on Web Intelligence, (WI 2006 Main Conference Proceedings), 2006, : 957 - 960
  • [2] A Heuristic Statistical Testing Based Approach for Encrypted Network Traffic Identification
    Niu, Weina
    Zhuo, Zhongliu
    Zhang, Xiaosong
    Du, Xiaojiang
    Yang, Guowu
    Guizani, Mohsen
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2019, 68 (04) : 3843 - 3853
  • [3] Traffic Pattern Plot: Video Identification in Encrypted Network Traffic
    Kamal, Ali S.
    Bukhari, Syed M. A. H.
    Khan, Muhammad U. S.
    Maqsood, Tahir
    Fayyaz, Muhammad A. B.
    [J]. INTELLIGENT SUSTAINABLE SYSTEMS, WORLDS4 2022, VOL 2, 2023, 579 : 77 - 84
  • [4] Source identification of encrypted video traffic in the presence of heterogeneous network traffic
    Shi, Yan
    Ross, Arun
    Biswas, Subir
    [J]. COMPUTER COMMUNICATIONS, 2018, 129 : 101 - 110
  • [5] Identification of Application in Encrypted Traffic by Using Machine Learning
    Pektas, Abdurrahman
    Acarman, Tankut
    [J]. MAN-MACHINE INTERACTIONS 5, ICMMI 2017, 2018, 659 : 545 - 554
  • [6] Encrypted Voice Traffic Fingerprinting: An Adaptive Network Traffic Feature Encoding Model
    Zhou, Tianci
    Zeng, Yong
    Chen, Yitao
    Liu, Zhihong
    Ma, Jianfeng
    [J]. ICC 2023-IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2023, : 3768 - 3773
  • [7] On inferring application protocol Behaviors in encrypted network traffic
    Wright, Charles V.
    Monrose, Fabian
    Masson, Gerald M.
    [J]. JOURNAL OF MACHINE LEARNING RESEARCH, 2006, 7 : 2745 - 2769
  • [8] Encrypted Network Traffic Classification: A data driven approach
    Zhang, Zhongkai
    Liu, Lei
    Lu, Xudong
    Yan, Zhongmin
    Li, Hui
    [J]. 2020 IEEE INTL SYMP ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, INTL CONF ON BIG DATA & CLOUD COMPUTING, INTL SYMP SOCIAL COMPUTING & NETWORKING, INTL CONF ON SUSTAINABLE COMPUTING & COMMUNICATIONS (ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM 2020), 2020, : 706 - 712
  • [9] Mobile app identification for encrypted network flows by traffic correlation
    He, Gaofeng
    Xu, Bingfeng
    Zhang, Lu
    Zhu, Haiting
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2018, 14 (12):
  • [10] Identification of VoIP encrypted traffic using a machine learning approach
    Alshammari, Riyad
    Zincir-Heywood, A. Nur
    [J]. JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2015, 27 (01) : 77 - 92