Author:
Sun Weishi,Zhang Yaning,Li Jie,Sun Chenxing,Zhang Shuzhuang
Abstract
Network traffic classification has great significance for network security, network management and other fields. However, in recent years, the use of VPN and TLS encryption had presented network traffic classification with new challenges. Due to the great performances of deep learning in image recognition, many solutions have focused on the deep learning-based method and achieved positive results. A traffic classification method based on deep learning is provided in this paper, where the concept of Packet Block is proposed, which is the aggregation of continuous packets in the same direction. The features of Packet Block are extracted from network traffic, and then transformed into images. Finally, convolutional neural networks are used to identify the application type of network traffic. The experiment is conducted using captured OpenVPN dataset and public ISCX-Tor dataset. The results shows that the accuracy is 97.20% in OpenVPN dataset and 93.31% in ISCX-Tor dataset, which is higher than the state-of-the-art methods. This suggests that our approach has the ability to meet the challenges of VPN and TLS encryption.
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Hardware and Architecture,Signal Processing,Control and Systems Engineering
Reference23 articles.
1. Yamansavascilar, B., Guvensan, M.A., Yavuz, A.G., and Karsligil, M.E. (2017, January 26–29). Application identification via network traffic classification. Proceedings of the International Conference on Computing, Networking and Communications (ICNC), Silicon Valley, CA, USA.
2. Aceto, G., Ciuonzo, D., Montieri, A., and Pescape, A. (2019). Mobile Encrypted Traffic Classification Using Deep Learning: Experimental Evaluation, Lessons Learned, and Challenges. IEEE Trans. Netw. Serv. Manag., 445–458.
3. Vu, L., Thuy, H.V., Nguyen, Q.U., Ngoc, T.N., and Dutkiewicz, E. (2018, January 26–29). Time Series Analysis for Encrypted Traffic Classification: A Deep Learning Approach. Proceedings of the 2018 18th International Symposium on Communications and Information Technologies (ISCIT), Bangkok, Thailand.
4. Fan, Z., He, W., Xue, L., and Bridges, P.G. (2011, January 14–17). Inferring users’ online activities through traffic analysis. Proceedings of the Fourth ACM Conference on Wireless Network Security, WISEC 2011, Hamburg, Germany.
5. A Resource-Allocating Network for Function Interpolarion;Platt;Neural Comput.,1991
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献