Skip to main content

WSNet: A Wrapper-Based Stacking Network for Multi-scenes Classification of DApps

  • Conference paper
  • First Online:
Web and Big Data (APWeb-WAIM 2022)

Abstract

Decentralized applications (DApps) are growing rapidly with the prevalence of blockchain, but security and performance issues plague network managers and developers. Encrypted network traffic classification (ETC) plays a fundamental role in application management, security detection, and QoS improvement and requires different granularity for different scenarios. Existing work focuses on a single scenario, and objects of them are traditional centralized applications (Apps). Since DApps use similar encrypted traffic settings and the same communication interface, the traffic is more complex than Apps. Under the premise of manual-design features, sophisticated architecture, or lots of training data, existing methods have good results, otherwise suffering from low accuracy. In this paper, we propose Wrapper-based Stacking Network (WSNet). According to traffic characteristics of different scenarios, WSNet adaptively selects optimal features for different algorithms to filter out irrelevant and redundant features without human intervention, thereby improving classification efficiency. Combining with stacking technology to integrate advantages of primary learners, hence it has good performance in complex traffic scenarios. Our comprehensive experiments on two real-world datasets show that WSNet adapts to and outperforms the state-of-the-art methods.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. State of the DApps 2022. https://www.stateofthedapps.com/

  2. Alan, H.F., Kaur, J.: Can android applications be identified using only TCP/IP headers of their launch time traffic? In: Proceedings of the 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 61–66 (2016)

    Google Scholar 

  3. Cai, X., Zhang, X.C., Joshi, B., Johnson, R.: Touching from a distance: website fingerprinting attacks and defenses. In: Proceedings of the ACM Conference on Computer and Communications Security (CCS), pp. 605–616 (2012)

    Google Scholar 

  4. Conti, M., Mancini, L.V., Spolaor, R., Verde, N.V.: Analyzing android encrypted network traffic to identify user actions. IEEE Trans. Inf. Forensics Secur. 11(1), 114–125 (2016)

    Article  Google Scholar 

  5. Coull, S.E., Dyer, K.P.: Traffic analysis of encrypted messaging services: apple imessage and beyond. Comput. Commun. Rev. 44(5), 5–11 (2014)

    Article  Google Scholar 

  6. Draper-Gil, G., Lashkari, A.H., Mamun, M.S.I.: Characterization of encrypted and VPN traffic using time-related features. In: Proceedings of the 2nd International Conference on Information Systems Security and Privacy, pp. 407–414 (2016)

    Google Scholar 

  7. Liu, C., He, L., Xiong, G.: FS-Net: a flow sequence network for encrypted traffic classification. In: IEEE INFOCOM 2019 - IEEE Conference on Computer Communications (INFOCOM), pp. 1171–1179 (2019)

    Google Scholar 

  8. Shen, M., Wei, M., Zhu, L., Wang, M.: Classification of encrypted traffic with second-order markov chains and application attribute bigrams. IEEE Trans. Inf. Forensics Secur. 12(8), 1830–1843 (2017)

    Article  Google Scholar 

  9. Shen, M., Zhang, J., Zhu, L., Xu, K., Du, X.: Accurate decentralized application identification via encrypted traffic analysis using graph neural networks. IEEE Trans. Inf. Forensics Secur. 16, 2367–2380 (2021)

    Article  Google Scholar 

  10. Shen, M., Zhang, J., Zhu, L., Xu, K., Du, X., Liu, Y.: Encrypted traffic classification of decentralized applications on ethereum using feature fusion. In: Proceedings of the International Symposium on Quality of Service. IWQoS, pp. 18:1–18:10 (2019)

    Google Scholar 

  11. Sirinam, P., Imani, M., Juárez, M., Wright, M.: Deep fingerprinting: undermining website fingerprinting defenses with deep learning. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (CCS), pp. 1928–1943 (2018)

    Google Scholar 

  12. Taylor, V.F., Spolaor, R., Conti, M., Martinovic, I.: AppScanner: automatic fingerprinting of smartphone apps from encrypted network traffic. In: IEEE European Symposium on Security and Privacy, EuroS &P, pp. 439–454 (2016)

    Google Scholar 

  13. Wang, Y., Li, Z., Gou, G.: Identifying DApps and user behaviors on ethereum via encrypted traffic. In: Security and Privacy in Communication Networks (2020)

    Google Scholar 

  14. Wang, Y., Xiong, G., Liu, C.: CQNet: a clustering-based quadruplet network for decentralized application classification via encrypted traffic. In: Machine Learning and Knowledge Discovery in Databases, pp. 518–534 (2021)

    Google Scholar 

  15. Yan, F., et al.: Identifying wechat red packets and fund transfers via analyzing encrypted network traffic. In: TrustCom/BigDataSE, pp. 1426–1432 (2018)

    Google Scholar 

  16. Zhou, X., Demetriou, S., He, D., Naveed, M., Pan, X.: Identity, location, disease and more: inferring your secrets from android public resources. In: ACM SIGSAC Conference on Computer and Communications Security. (CCS), pp. 1017–1028 (2013)

    Google Scholar 

Download references

Acknowledgements

This work is supported by The National Key Research and Development Program of China (No.2020YFB1006100, No.2020YFE0200500 and No.2018YFB1800200) and Key research and Development Program for Guangdong Province under grant No. 2019B010137003.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chengshang Hou .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wang, Y., Xiong, G., Li, Z., Cui, M., Gou, G., Hou, C. (2023). WSNet: A Wrapper-Based Stacking Network for Multi-scenes Classification of DApps. In: Li, B., Yue, L., Tao, C., Han, X., Calvanese, D., Amagasa, T. (eds) Web and Big Data. APWeb-WAIM 2022. Lecture Notes in Computer Science, vol 13421. Springer, Cham. https://doi.org/10.1007/978-3-031-25158-0_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-25158-0_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-25157-3

  • Online ISBN: 978-3-031-25158-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics