Multi-Task Scenario Encrypted Traffic Classification and Parameter Analysis
Affiliation:
1. College of Information and Cyber Security, People’s Public Security University of China, Beijing 100038, China
Abstract
The widespread use of encrypted traffic poses challenges to network management and network security. Traditional machine learning-based methods for encrypted traffic classification no longer meet the demands of management and security. The application of deep learning technology in encrypted traffic classification significantly improves the accuracy of models. This study focuses primarily on encrypted traffic classification in the fields of network analysis and network security. To address the shortcomings of existing deep learning-based encrypted traffic classification methods in terms of computational memory consumption and interpretability, we introduce a Parameter-Efficient Fine-Tuning method for efficiently tuning the parameters of an encrypted traffic classification model. Experimentation is conducted on various classification scenarios, including Tor traffic service classification and malicious traffic classification, using multiple public datasets. Fair comparisons are made with state-of-the-art deep learning model architectures. The results indicate that the proposed method significantly reduces the scale of fine-tuning parameters and computational resource usage while achieving performance comparable to that of the existing best models. Furthermore, we interpret the learning mechanism of encrypted traffic representation in the pre-training model by analyzing the parameters and structure of the model. This comparison validates the hypothesis that the model exhibits hierarchical structure, clear organization, and distinct features.
Reference40 articles.
1. Isingizwe, D.F., Wang, M., Liu, W., Wang, D., Wu, T., and Li, J. (2021, January 13). Analyzing Learning-Based Encrypted Malware Traffic Classification with AutoML. Proceedings of the 2021 IEEE 21st International Conference on Communication Technology (ICCT), Tianjin, China. 2. TSCRNN: A Novel Classification Scheme of Encrypted Traffic Based on Flow Spatiotemporal Features for Efficient Management of IIoT;Lin;Comput. Netw.,2021 3. A survey on encrypted network traffic analysis applications, techniques, and countermeasures;Papadogiannaki;ACM Comput. Surv. (CSUR),2021 4. Van Ede, T., Bortolameotti, R., Continella, A., Ren, J., Dubois, D.J., Lindorfer, M., Choffnes, D., Van Steen, M., and Peter, A. (2020). Network and Distributed System Security Symposium, Internet Society. 5. Robust smartphone app identification via encrypted network traffic analysis;Taylor;IEEE Trans. Inf. Forensics Secur.,2017
|
|