skip to main content
10.1145/3573428.3573644acmotherconferencesArticle/Chapter ViewAbstractPublication PageseitceConference Proceedingsconference-collections
research-article

An encrypted traffic classification model based on the raw traffic and spatiotemporal characteristics

Published:15 March 2023Publication History

ABSTRACT

Deep learning techniques are frequently utilized and produce effective results in the classification of encrypted traffic. In the current encryption traffic classification process, the network traffic characteristics are not sufficiently extracted, which is a concern. An encrypted traffic classification model based on raw network traffic and its spatiotemporal characteristics is proposed in this paper. The raw network traffic is divided into sessions, and the packets inside each session are then split into 784-byte slices, and the traffic is then described using the slice data. The time feature vector and the spatial feature vector are then created by combining ResNet and GRU models to generate features from raw network data in parallel. The traffic is then classified using the combined features. According to experimental findings, the proposed model's recognition accuracy on the ISCX-NonVPN-VPN2016 dataset reached 99.36%, which is an improvement over other approaches currently in use.

References

  1. F. Pacheco, E. Exposito, M. Gineste, C. Baudoin and J. Aguilar, "Towards the Deployment of Machine Learning Solutions in Network Traffic Classification: A Systematic Survey," in IEEE Communications Surveys & Tutorials, vol. 21, no. 2, pp. 1988-2014, Secondquarter, 2019, doi: 10.1109/COMST.2018.2883147.Google ScholarGoogle ScholarCross RefCross Ref
  2. H. Yao, C. Liu, P. Zhang, S. Wu, C. Jiang and S. Yu, "Identification of Encrypted Traffic Through Attention Mechanism Based Long Short Term Memory," in IEEE Transactions on Big Data, vol. 8, no. 1, pp. 241-252, 1 Feb. 2022, doi: 10.1109/TBDATA.2019.2940675.Google ScholarGoogle ScholarCross RefCross Ref
  3. Draper-Gil, G.; Lashkari, A.; Mamun, M. and A. Ghorbani, A. 2016. Characterization of Encrypted and VPN Traffic using Time-related Features. In Proceedings of the 2nd International Conference on Information Systems Security and Privacy - ICISSP, ISBN 978-989-758-167-0; ISSN 2184-4356, pages 407-414. DOI: 10.5220/0005740704070414.Google ScholarGoogle Scholar
  4. B. Yamansavascilar, M. A. Guvensan, A. G. Yavuz and M. E. Karsligil, "Application identification via network traffic classification," 2017 International Conference on Computing, Networking and Communications (ICNC), 2017, pp. 843-848, doi: 10.1109/ICCNC.2017.7876241.Google ScholarGoogle Scholar
  5. Habibi Lashkari, A.; Draper Gil, G.; Mamun, M. and Ghorbani, A. 2017. Characterization of Tor Traffic using Time based Features. In Proceedings of the 3rd International Conference on Information Systems Security and Privacy - ICISSP, ISBN 978-989-758-209-7; ISSN 2184-4356, pages 253-262. DOI: 10.5220/0006105602530262.Google ScholarGoogle Scholar
  6. E. Hodo, X. Bellekens, E. Iorkyase, A. Hamilton, C. Tachtatzis, and R. Atkinson, “Machine learning approach for detection of nontor traffic,” in the Proc. of the 12th International Conference on Availability, Reliability and Security, New York, NY, USA: ACM, 2017.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Lotfollahi, M., Jafari Siavoshani, M., Shirali Hossein Zade, R. Deep packet: a novel approach for encrypted traffic classification using deep learning. Soft Comput 24, 1999–2012, 2020. https://doi.org/10.1007/s00500-019-04030-2.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. W. Wang, M. Zhu, J. Wang, X. Zeng and Z. Yang, "End-to-end encrypted traffic classification with one-dimensional convolution neural networks," 2017 IEEE International Conference on Intelligence and Security Informatics (ISI), 2017, pp. 43-48, doi: 10.1109/ISI.2017.8004872.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Z. Zou, J. Ge, H. Zheng, Y. Wu, C. Han and Z. Yao, "Encrypted Traffic Classification with a Convolutional Long Short-Term Memory Neural Network," 2018 IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC/SmartCity/DSS), 2018, pp. 329-334, doi: 10.1109/HPCC/SmartCity/DSS.2018.00074.Google ScholarGoogle Scholar
  10. M. Wang, K. Zheng, D. Luo, Y. Yang and X. Wang, "An Encrypted Traffic Classification Framework Based on Convolutional Neural Networks and Stacked Autoencoders," 2020 IEEE 6th International Conference on Computer and Communications (ICCC), 2020, pp. 634-641, doi: 10.1109/ICCC51575.2020.9344978.Google ScholarGoogle Scholar
  11. A. Dainotti, A. Pescape and K. C. Claffy, "Issues and future directions in traffic classification," in IEEE Network, vol. 26, no. 1, pp. 35-40, January-February, 2012, doi: 10.1109/MNET.2012.6135854.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Wei W, Ming Z, Zeng X, Malware traffic classification using convolutional neural network for representation learning[C]// 2017 International Conference on Information Networking (ICOIN). IEEE, 2017.Google ScholarGoogle Scholar

Index Terms

  1. An encrypted traffic classification model based on the raw traffic and spatiotemporal characteristics

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      EITCE '22: Proceedings of the 2022 6th International Conference on Electronic Information Technology and Computer Engineering
      October 2022
      1999 pages
      ISBN:9781450397148
      DOI:10.1145/3573428

      Copyright © 2022 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 15 March 2023

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

      Acceptance Rates

      Overall Acceptance Rate508of972submissions,52%
    • Article Metrics

      • Downloads (Last 12 months)62
      • Downloads (Last 6 weeks)10

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format