Abstract
The Internet of Things (IoT) is a revolutionary technological trend that is reshaping the way people interact with the digital world, creating limitless possibilities for future life and work. With the exponential increase in the number of IoT-connected devices, the substantial traffic data generated by smart devices poses significant challenges to traffic recognition, especially with the emergence of encrypted traffic for privacy protection. Encrypted traffic recognition is a prerequisite for ensuring Quality of Service (QoS) and network security. However, existing methods suffer from inadequate accuracy in encrypted traffic recognition and fail to address the issue of green computing of model training in IoT scenarios. In this paper, we propose a fast encrypted traffic recognition method, TFPGM, which is based on traffic fingerprint graphs to address these challenges. The core idea of TFPGM is to utilize interactive modes to represent the fingerprints of similar traffic types. TFPGM consists of two main phases: constructing traffic fingerprint graphs and establishing recognition models. In the construction phase, we analyze the interactive modes of encrypted traffic and represent them using undirected graphs. In the model-building phase, a dedicated recognizer is established for each traffic fingerprint to enhance the exploration of interactive modes within the same traffic class. These recognizers are combined to create a complete traffic fingerprint recognition model. In both phases, considerations were given to reducing the size of the graph and lowering the model’s complexity with the aim of achieving green computing in real-world scenarios. The results indicate that TFPG can complete model training in just 3.83 seconds while ensuring a 97.72% accuracy in the classification of 12 categories of encrypted traffic. Compared to existing methods, our method’s resource consumption can be reduced by over 90%, contributing to the realization of green computing in large-scale IoT scenarios. We also validate the model’s generalizability on another well-known encrypted traffic dataset, achieving a 95.63% accuracy in 14-class classification.









Similar content being viewed by others
Data Availability
Not applicable.
References
Qiu J, Tian Z, Du C, Zuo Q, Su S, Fang B (2020) A survey on access control in the age of internet of things. IEEE Internet Things J 7(6):4682–4696. https://doi.org/10.1109/JIOT.2020.2969326
Nascita A, Cerasuolo F, Monda DD, Garcia JTA, Montieri A, Pescapè A (2022) Machine and deep learning approaches for iot attack classification. In: IEEE INFOCOM 2022 - IEEE conference on computer communications workshops (INFOCOM WKSHPS), pp 1–6. https://doi.org/10.1109/INFOCOMWKSHPS54753.2022.9797971
Tahaei H, Afifi F, Asemi A, Zaki F, Anuar NB (2020) The rise of traffic classification in iot networks: a survey. J Netw Comput Appl 154:102538. https://doi.org/10.1016/j.jnca.2020.102538
Xie J, Yu FR, Huang T, Xie R, Liu J, Wang C, Liu Y (2018) A survey of machine learning techniques applied to software defined networking (sdn): research issues and challenges. IEEE Commun Surv Tutor 21(1):393–430
Shafiq M, Tian Z, Bashir AK, Du X, Guizani M (2021) Corrauc: a malicious bot-iot traffic detection method in iot network using machine-learning techniques. IEEE Internet Things J 8(5):3242–3254. https://doi.org/10.1109/JIOT.2020.3002255
Chen D, Wang H, Zhang N, Nie X, Dai H-N, Zhang K, Raymond Choo K-K (2022) Privacy-preserving encrypted traffic inspection with symmetric cryptographic techniques in iot. IEEE Internet Things J 9(18):17265–17279. https://doi.org/10.1109/JIOT.2022.3155355
Chen D, Jiang S, Zhang N, Liu L, Choo K-KR (2022) On message authentication channel capacity over a wiretap channel. IEEE Trans Inf Forensics Secur 17:3107–3122. https://doi.org/10.1109/TIFS.2022.3201386
Lin K, Xu X, Gao H (2021) Tscrnn: a novel classification scheme of encrypted traffic based on flow spatiotemporal features for efficient management of iiot. Comput Netw 190:107974. https://doi.org/10.1016/j.comnet.2021.107974
Cao Z, Xiong G, Zhao Y, Li Z, Guo L (2014) A survey on encrypted traffic classification. In: Applications and techniques in information security: 5th International Conference, ATIS 2014, Melbourne, VIC, Australia, November 26-28, 2014. Proceedings 5, Springer, pp 73–81. https://doi.org/10.1007/978-3-662-45670-5_8
Dong C, Zhang C, Lu Z, Liu B, Jiang B (2020) Cetanalytics: comprehensive effective traffic information analytics for encrypted traffic classification. Comput Netw 176:107258. https://doi.org/10.1016/j.comnet.2020.107258
Rezaei S, Liu X (2019) Deep learning for encrypted traffic classification: an overview. IEEE Commun Mag 57(5):76–81. https://doi.org/10.1109/MCOM.2019.1800819
Draper-Gil G, Lashkari AH, Mamun MSI, Ghorbani AA (2016) Characterization of encrypted and vpn traffic using time-related. In: Proceedings of the 2nd international conference on information systems security and privacy (ICISSP), pp 407–414. https://doi.org/10.5220/0005740704070414
Lashkari AH, Draper-Gil G, Mamun MSI, Ghorbani AA et al (2017) Characterization of tor traffic using time based features. In: ICISSp, pp 253–262
Song Y, Huang Q, Yang J, Fan M, Hu A, Jiang Y (2019) Iot device fingerprinting for relieving pressure in the access control. In: Proceedings of the ACM turing celebration conference-China, pp 1–8
Sivanathan A, Gharakheili HH, Loi F, Radford A, Wijenayake C, Vishwanath A, Sivaraman V (2018) Classifying iot devices in smart environments using network traffic characteristics. IEEE Trans Mob Comput 18(8):1745–1759
Miller S, Curran K, Lunney T (2018) Multilayer perceptron neural network for detection of encrypted vpn network traffic. In: 2018 International conference on cyber situational awareness, data analytics and assessment (Cyber SA), pp 1–8. https://doi.org/10.1109/CyberSA.2018.8551395
Wang W, Zhu M, Wang J, Zeng X, Yang Z (2017) End-to-end encrypted traffic classification with one-dimensional convolution neural networks. In: 2017 IEEE International conference on intelligence and security informatics (ISI), pp 43–48. https://doi.org/10.1109/ISI.2017.8004872
Lotfollahi M, Jafari Siavoshani M, Shirali Hossein Zade R, Saberian M (2020) Deep packet: a novel approach for encrypted traffic classification using deep learning. Soft Comput 24(3):1999–2012. https://doi.org/10.1007/s00500-019-04030-2
Shapira T, Shavitt Y (2019) Flowpic: Encrypted internet traffic classification is as easy as image recognition. In: IEEE INFOCOM 2019 - IEEE conference on computer communications workshops (INFOCOM WKSHPS), pp 680–687. https://doi.org/10.1109/INFCOMW.2019.8845315
Rezaei S, Liu X (2018) How to achieve high classification accuracy with just a few labels: a semi-supervised approach using sampled packets. arXiv:1812.09761. https://doi.org/10.48550/arXiv.1812.09761
Yao H, Liu C, Zhang P, Wu S, Jiang C, Yu S (2022) Identification of encrypted traffic through attention mechanism based long short term memory. IEEE Trans Big Data 8(1):241–252. https://doi.org/10.1109/TBDATA.2019.2940675
Rimmer V, Preuveneers D, Juarez M, Van Goethem T, Joosen W (2017) Automated website fingerprinting through deep learning. arXiv:1708.06376
Wang Q, Chen X, Jin X, Li X, Chen D, Qin X (2022) Enhancing trustworthiness of internet of vehicles in space-air-ground-integrated networks: attestation approach. IEEE Internet Things J 9(8):5992–6002. https://doi.org/10.1109/JIOT.2021.3084449
Wang Y, Wang Q, Chen X, Chen D, Fang X, Yin M, Zhang N (2022) Containerguard: a real-time attack detection system in container-based big data platform. IEEE Trans Industr Inform 18(5):3327–3336. https://doi.org/10.1109/TII.2020.3047416
Chen D, Zhang N, Wu H, Zhang K, Lu R, Guizani M (2022) Audio-based security techniques for secure device-to-device communications. IEEE Netw 36(6):54–59. https://doi.org/10.1109/MNET.005.2100336
Aceto G, Ciuonzo D, Montieri A, Pescapé A (2020) Toward effective mobile encrypted traffic classification through deep learning. Neurocomputing 409:306–315
Wang X, Chen S, Su J (2020) App-net: a hybrid neural network for encrypted mobile traffic classification. In: IEEE INFOCOM 2020-IEEE conference on computer communications workshops (INFOCOM WKSHPS), IEEE, pp 424–429
Panchenko A, Lanze F, Pennekamp J, Engel T, Zinnen A, Henze M, Wehrle K (2016) Website fingerprinting at internet scale. In: NDSS
Sirinam P, Imani M, Juarez M, Wright M (2018) Deep fingerprinting: undermining website fingerprinting defenses with deep learning. In: Proceedings of the 2018 ACM SIGSAC conference on computer and communications security, pp 1928–1943
Wang M, Zheng K, Luo D, Yang Y, Wang X (2020) An encrypted traffic classification framework based on convolutional neural networks and stacked autoencoders. In: 2020 IEEE 6th International conference on computer and communications (ICCC), pp 634–641. https://doi.org/10.1109/ICCC51575.2020.9344978
Hamilton WL, Ying R, Leskovec J (2017) Inductive representation learning on large graphs. NIPS’17, pp 1025–1035. Curran Associates Inc., Red Hook, NY, USA. https://doi.org/10.5555/3294771.329486
Shen M, Zhang J, Zhu L, Xu K, Du X (2021) Accurate decentralized application identification via encrypted traffic analysis using graph neural networks. IEEE Trans Inf Forensics Secur 16:2367–2380. https://doi.org/10.1109/TIFS.2021.3050608
Acknowledgements
This research was supported by the Young Scientists Fund of the National Natural Science Foundation of China under Grant (No. 62302322), the National Natural Science Foundation of China (No. U19A2081), the Fundamental Research Funds for the Central Universities (No. 2022SCU12116) and the Science and Engineering Connotation Development Project of Sichuan University (No. 2020SCUNG129).
Author information
Authors and Affiliations
Contributions
All authors have the same contributions to this work.
Corresponding author
Ethics declarations
Ethics approval
Not applicable.
Consent to participate
Not applicable.
Consent for publication
Yes
Competing interests
The authors declare no competing interests.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This article belongs to the Topical Collection: Special Issue on Affordable and Clean Energy Guest Editors: Dajiang Chen, Ning Zhang, and Chunpeng Ge.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Li, Y., Chen, X., Tang, W. et al. A green computing method for encrypted IoT traffic recognition based on traffic fingerprint graphs. Peer-to-Peer Netw. Appl. 17, 1514–1526 (2024). https://doi.org/10.1007/s12083-024-01665-3
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-024-01665-3