Skip to main content

Advertisement

Log in

A green computing method for encrypted IoT traffic recognition based on traffic fingerprint graphs

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

The Internet of Things (IoT) is a revolutionary technological trend that is reshaping the way people interact with the digital world, creating limitless possibilities for future life and work. With the exponential increase in the number of IoT-connected devices, the substantial traffic data generated by smart devices poses significant challenges to traffic recognition, especially with the emergence of encrypted traffic for privacy protection. Encrypted traffic recognition is a prerequisite for ensuring Quality of Service (QoS) and network security. However, existing methods suffer from inadequate accuracy in encrypted traffic recognition and fail to address the issue of green computing of model training in IoT scenarios. In this paper, we propose a fast encrypted traffic recognition method, TFPGM, which is based on traffic fingerprint graphs to address these challenges. The core idea of TFPGM is to utilize interactive modes to represent the fingerprints of similar traffic types. TFPGM consists of two main phases: constructing traffic fingerprint graphs and establishing recognition models. In the construction phase, we analyze the interactive modes of encrypted traffic and represent them using undirected graphs. In the model-building phase, a dedicated recognizer is established for each traffic fingerprint to enhance the exploration of interactive modes within the same traffic class. These recognizers are combined to create a complete traffic fingerprint recognition model. In both phases, considerations were given to reducing the size of the graph and lowering the model’s complexity with the aim of achieving green computing in real-world scenarios. The results indicate that TFPG can complete model training in just 3.83 seconds while ensuring a 97.72% accuracy in the classification of 12 categories of encrypted traffic. Compared to existing methods, our method’s resource consumption can be reduced by over 90%, contributing to the realization of green computing in large-scale IoT scenarios. We also validate the model’s generalizability on another well-known encrypted traffic dataset, achieving a 95.63% accuracy in 14-class classification.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Data Availability

Not applicable.

References

  1. Qiu J, Tian Z, Du C, Zuo Q, Su S, Fang B (2020) A survey on access control in the age of internet of things. IEEE Internet Things J 7(6):4682–4696. https://doi.org/10.1109/JIOT.2020.2969326

    Article  Google Scholar 

  2. Nascita A, Cerasuolo F, Monda DD, Garcia JTA, Montieri A, Pescapè A (2022) Machine and deep learning approaches for iot attack classification. In: IEEE INFOCOM 2022 - IEEE conference on computer communications workshops (INFOCOM WKSHPS), pp 1–6. https://doi.org/10.1109/INFOCOMWKSHPS54753.2022.9797971

  3. Tahaei H, Afifi F, Asemi A, Zaki F, Anuar NB (2020) The rise of traffic classification in iot networks: a survey. J Netw Comput Appl 154:102538. https://doi.org/10.1016/j.jnca.2020.102538

    Article  Google Scholar 

  4. Xie J, Yu FR, Huang T, Xie R, Liu J, Wang C, Liu Y (2018) A survey of machine learning techniques applied to software defined networking (sdn): research issues and challenges. IEEE Commun Surv Tutor 21(1):393–430

    Article  Google Scholar 

  5. Shafiq M, Tian Z, Bashir AK, Du X, Guizani M (2021) Corrauc: a malicious bot-iot traffic detection method in iot network using machine-learning techniques. IEEE Internet Things J 8(5):3242–3254. https://doi.org/10.1109/JIOT.2020.3002255

    Article  Google Scholar 

  6. Chen D, Wang H, Zhang N, Nie X, Dai H-N, Zhang K, Raymond Choo K-K (2022) Privacy-preserving encrypted traffic inspection with symmetric cryptographic techniques in iot. IEEE Internet Things J 9(18):17265–17279. https://doi.org/10.1109/JIOT.2022.3155355

  7. Chen D, Jiang S, Zhang N, Liu L, Choo K-KR (2022) On message authentication channel capacity over a wiretap channel. IEEE Trans Inf Forensics Secur 17:3107–3122. https://doi.org/10.1109/TIFS.2022.3201386

    Article  Google Scholar 

  8. Lin K, Xu X, Gao H (2021) Tscrnn: a novel classification scheme of encrypted traffic based on flow spatiotemporal features for efficient management of iiot. Comput Netw 190:107974. https://doi.org/10.1016/j.comnet.2021.107974

    Article  Google Scholar 

  9. Cao Z, Xiong G, Zhao Y, Li Z, Guo L (2014) A survey on encrypted traffic classification. In: Applications and techniques in information security: 5th International Conference, ATIS 2014, Melbourne, VIC, Australia, November 26-28, 2014. Proceedings 5, Springer, pp 73–81. https://doi.org/10.1007/978-3-662-45670-5_8

  10. Dong C, Zhang C, Lu Z, Liu B, Jiang B (2020) Cetanalytics: comprehensive effective traffic information analytics for encrypted traffic classification. Comput Netw 176:107258. https://doi.org/10.1016/j.comnet.2020.107258

    Article  Google Scholar 

  11. Rezaei S, Liu X (2019) Deep learning for encrypted traffic classification: an overview. IEEE Commun Mag 57(5):76–81. https://doi.org/10.1109/MCOM.2019.1800819

    Article  Google Scholar 

  12. Draper-Gil G, Lashkari AH, Mamun MSI, Ghorbani AA (2016) Characterization of encrypted and vpn traffic using time-related. In: Proceedings of the 2nd international conference on information systems security and privacy (ICISSP), pp 407–414. https://doi.org/10.5220/0005740704070414

  13. Lashkari AH, Draper-Gil G, Mamun MSI, Ghorbani AA et al (2017) Characterization of tor traffic using time based features. In: ICISSp, pp 253–262

  14. Song Y, Huang Q, Yang J, Fan M, Hu A, Jiang Y (2019) Iot device fingerprinting for relieving pressure in the access control. In: Proceedings of the ACM turing celebration conference-China, pp 1–8

  15. Sivanathan A, Gharakheili HH, Loi F, Radford A, Wijenayake C, Vishwanath A, Sivaraman V (2018) Classifying iot devices in smart environments using network traffic characteristics. IEEE Trans Mob Comput 18(8):1745–1759

    Article  Google Scholar 

  16. Miller S, Curran K, Lunney T (2018) Multilayer perceptron neural network for detection of encrypted vpn network traffic. In: 2018 International conference on cyber situational awareness, data analytics and assessment (Cyber SA), pp 1–8. https://doi.org/10.1109/CyberSA.2018.8551395

  17. Wang W, Zhu M, Wang J, Zeng X, Yang Z (2017) End-to-end encrypted traffic classification with one-dimensional convolution neural networks. In: 2017 IEEE International conference on intelligence and security informatics (ISI), pp 43–48. https://doi.org/10.1109/ISI.2017.8004872

  18. Lotfollahi M, Jafari Siavoshani M, Shirali Hossein Zade R, Saberian M (2020) Deep packet: a novel approach for encrypted traffic classification using deep learning. Soft Comput 24(3):1999–2012. https://doi.org/10.1007/s00500-019-04030-2

    Article  Google Scholar 

  19. Shapira T, Shavitt Y (2019) Flowpic: Encrypted internet traffic classification is as easy as image recognition. In: IEEE INFOCOM 2019 - IEEE conference on computer communications workshops (INFOCOM WKSHPS), pp 680–687. https://doi.org/10.1109/INFCOMW.2019.8845315

  20. Rezaei S, Liu X (2018) How to achieve high classification accuracy with just a few labels: a semi-supervised approach using sampled packets. arXiv:1812.09761. https://doi.org/10.48550/arXiv.1812.09761

  21. Yao H, Liu C, Zhang P, Wu S, Jiang C, Yu S (2022) Identification of encrypted traffic through attention mechanism based long short term memory. IEEE Trans Big Data 8(1):241–252. https://doi.org/10.1109/TBDATA.2019.2940675

    Article  Google Scholar 

  22. Rimmer V, Preuveneers D, Juarez M, Van Goethem T, Joosen W (2017) Automated website fingerprinting through deep learning. arXiv:1708.06376

  23. Wang Q, Chen X, Jin X, Li X, Chen D, Qin X (2022) Enhancing trustworthiness of internet of vehicles in space-air-ground-integrated networks: attestation approach. IEEE Internet Things J 9(8):5992–6002. https://doi.org/10.1109/JIOT.2021.3084449

    Article  Google Scholar 

  24. Wang Y, Wang Q, Chen X, Chen D, Fang X, Yin M, Zhang N (2022) Containerguard: a real-time attack detection system in container-based big data platform. IEEE Trans Industr Inform 18(5):3327–3336. https://doi.org/10.1109/TII.2020.3047416

    Article  Google Scholar 

  25. Chen D, Zhang N, Wu H, Zhang K, Lu R, Guizani M (2022) Audio-based security techniques for secure device-to-device communications. IEEE Netw 36(6):54–59. https://doi.org/10.1109/MNET.005.2100336

    Article  Google Scholar 

  26. Aceto G, Ciuonzo D, Montieri A, Pescapé A (2020) Toward effective mobile encrypted traffic classification through deep learning. Neurocomputing 409:306–315

    Article  Google Scholar 

  27. Wang X, Chen S, Su J (2020) App-net: a hybrid neural network for encrypted mobile traffic classification. In: IEEE INFOCOM 2020-IEEE conference on computer communications workshops (INFOCOM WKSHPS), IEEE, pp 424–429

  28. Panchenko A, Lanze F, Pennekamp J, Engel T, Zinnen A, Henze M, Wehrle K (2016) Website fingerprinting at internet scale. In: NDSS

  29. Sirinam P, Imani M, Juarez M, Wright M (2018) Deep fingerprinting: undermining website fingerprinting defenses with deep learning. In: Proceedings of the 2018 ACM SIGSAC conference on computer and communications security, pp 1928–1943

  30. Wang M, Zheng K, Luo D, Yang Y, Wang X (2020) An encrypted traffic classification framework based on convolutional neural networks and stacked autoencoders. In: 2020 IEEE 6th International conference on computer and communications (ICCC), pp 634–641. https://doi.org/10.1109/ICCC51575.2020.9344978

  31. Hamilton WL, Ying R, Leskovec J (2017) Inductive representation learning on large graphs. NIPS’17, pp 1025–1035. Curran Associates Inc., Red Hook, NY, USA. https://doi.org/10.5555/3294771.329486

  32. Shen M, Zhang J, Zhu L, Xu K, Du X (2021) Accurate decentralized application identification via encrypted traffic analysis using graph neural networks. IEEE Trans Inf Forensics Secur 16:2367–2380. https://doi.org/10.1109/TIFS.2021.3050608

    Article  Google Scholar 

Download references

Acknowledgements

This research was supported by the Young Scientists Fund of the National Natural Science Foundation of China under Grant (No. 62302322), the National Natural Science Foundation of China (No. U19A2081), the Fundamental Research Funds for the Central Universities (No. 2022SCU12116) and the Science and Engineering Connotation Development Project of Sichuan University (No. 2020SCUNG129).

Author information

Authors and Affiliations

Authors

Contributions

All authors have the same contributions to this work.

Corresponding author

Correspondence to Wenyi Tang.

Ethics declarations

Ethics approval

Not applicable.

Consent to participate

Not applicable.

Consent for publication

Yes

Competing interests

The authors declare no competing interests.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article belongs to the Topical Collection: Special Issue on Affordable and Clean Energy Guest Editors: Dajiang Chen, Ning Zhang, and Chunpeng Ge.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Li, Y., Chen, X., Tang, W. et al. A green computing method for encrypted IoT traffic recognition based on traffic fingerprint graphs. Peer-to-Peer Netw. Appl. 17, 1514–1526 (2024). https://doi.org/10.1007/s12083-024-01665-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-024-01665-3

Keywords