Abstract
Decentralized applications (DApps) are growing rapidly with the prevalence of blockchain, but security and performance issues plague network managers and developers. Encrypted network traffic classification (ETC) plays a fundamental role in application management, security detection, and QoS improvement and requires different granularity for different scenarios. Existing work focuses on a single scenario, and objects of them are traditional centralized applications (Apps). Since DApps use similar encrypted traffic settings and the same communication interface, the traffic is more complex than Apps. Under the premise of manual-design features, sophisticated architecture, or lots of training data, existing methods have good results, otherwise suffering from low accuracy. In this paper, we propose Wrapper-based Stacking Network (WSNet). According to traffic characteristics of different scenarios, WSNet adaptively selects optimal features for different algorithms to filter out irrelevant and redundant features without human intervention, thereby improving classification efficiency. Combining with stacking technology to integrate advantages of primary learners, hence it has good performance in complex traffic scenarios. Our comprehensive experiments on two real-world datasets show that WSNet adapts to and outperforms the state-of-the-art methods.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
State of the DApps 2022. https://www.stateofthedapps.com/
Alan, H.F., Kaur, J.: Can android applications be identified using only TCP/IP headers of their launch time traffic? In: Proceedings of the 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 61–66 (2016)
Cai, X., Zhang, X.C., Joshi, B., Johnson, R.: Touching from a distance: website fingerprinting attacks and defenses. In: Proceedings of the ACM Conference on Computer and Communications Security (CCS), pp. 605–616 (2012)
Conti, M., Mancini, L.V., Spolaor, R., Verde, N.V.: Analyzing android encrypted network traffic to identify user actions. IEEE Trans. Inf. Forensics Secur. 11(1), 114–125 (2016)
Coull, S.E., Dyer, K.P.: Traffic analysis of encrypted messaging services: apple imessage and beyond. Comput. Commun. Rev. 44(5), 5–11 (2014)
Draper-Gil, G., Lashkari, A.H., Mamun, M.S.I.: Characterization of encrypted and VPN traffic using time-related features. In: Proceedings of the 2nd International Conference on Information Systems Security and Privacy, pp. 407–414 (2016)
Liu, C., He, L., Xiong, G.: FS-Net: a flow sequence network for encrypted traffic classification. In: IEEE INFOCOM 2019 - IEEE Conference on Computer Communications (INFOCOM), pp. 1171–1179 (2019)
Shen, M., Wei, M., Zhu, L., Wang, M.: Classification of encrypted traffic with second-order markov chains and application attribute bigrams. IEEE Trans. Inf. Forensics Secur. 12(8), 1830–1843 (2017)
Shen, M., Zhang, J., Zhu, L., Xu, K., Du, X.: Accurate decentralized application identification via encrypted traffic analysis using graph neural networks. IEEE Trans. Inf. Forensics Secur. 16, 2367–2380 (2021)
Shen, M., Zhang, J., Zhu, L., Xu, K., Du, X., Liu, Y.: Encrypted traffic classification of decentralized applications on ethereum using feature fusion. In: Proceedings of the International Symposium on Quality of Service. IWQoS, pp. 18:1–18:10 (2019)
Sirinam, P., Imani, M., Juárez, M., Wright, M.: Deep fingerprinting: undermining website fingerprinting defenses with deep learning. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (CCS), pp. 1928–1943 (2018)
Taylor, V.F., Spolaor, R., Conti, M., Martinovic, I.: AppScanner: automatic fingerprinting of smartphone apps from encrypted network traffic. In: IEEE European Symposium on Security and Privacy, EuroS &P, pp. 439–454 (2016)
Wang, Y., Li, Z., Gou, G.: Identifying DApps and user behaviors on ethereum via encrypted traffic. In: Security and Privacy in Communication Networks (2020)
Wang, Y., Xiong, G., Liu, C.: CQNet: a clustering-based quadruplet network for decentralized application classification via encrypted traffic. In: Machine Learning and Knowledge Discovery in Databases, pp. 518–534 (2021)
Yan, F., et al.: Identifying wechat red packets and fund transfers via analyzing encrypted network traffic. In: TrustCom/BigDataSE, pp. 1426–1432 (2018)
Zhou, X., Demetriou, S., He, D., Naveed, M., Pan, X.: Identity, location, disease and more: inferring your secrets from android public resources. In: ACM SIGSAC Conference on Computer and Communications Security. (CCS), pp. 1017–1028 (2013)
Acknowledgements
This work is supported by The National Key Research and Development Program of China (No.2020YFB1006100, No.2020YFE0200500 and No.2018YFB1800200) and Key research and Development Program for Guangdong Province under grant No. 2019B010137003.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Wang, Y., Xiong, G., Li, Z., Cui, M., Gou, G., Hou, C. (2023). WSNet: A Wrapper-Based Stacking Network for Multi-scenes Classification of DApps. In: Li, B., Yue, L., Tao, C., Han, X., Calvanese, D., Amagasa, T. (eds) Web and Big Data. APWeb-WAIM 2022. Lecture Notes in Computer Science, vol 13421. Springer, Cham. https://doi.org/10.1007/978-3-031-25158-0_13
Download citation
DOI: https://doi.org/10.1007/978-3-031-25158-0_13
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-25157-3
Online ISBN: 978-3-031-25158-0
eBook Packages: Computer ScienceComputer Science (R0)