Affiliation:
1. School of Cyber Science and Technology, Beihang University, Beijing 100191, China
Abstract
To safeguard user privacy, critical Internet traffic is often transmitted using encryption. While encryption is crucial for protecting sensitive information, it poses challenges for traffic identification and poses hidden dangers to network security. As a result, the precise classification of encrypted network traffic has become a crucial problem in network security. In light of this, our paper proposes an encrypted traffic identification method based on the C-LSTM model for encrypted traffic recognition by leveraging the power of deep learning. This method can effectively extract spatial and temporal features from encrypted traffic, enabling accurate identification of traffic types. Through rigorous testing and evaluation, our system has achieved an impressive accuracy rate of 96.4% on the widely used ISCXVPN2016 dataset. This achievement demonstrates the effectiveness and reliability of our method in accurately classifying encrypted network traffic. By addressing the challenges posed by encrypted traffic identification, our research contributes to enhancing network security and privacy protection.
Subject
Fluid Flow and Transfer Processes,Computer Science Applications,Process Chemistry and Technology,General Engineering,Instrumentation,General Materials Science
Reference22 articles.
1. (2022, June 02). Google: “HTTPS Encryption on the Web—Google Transparency Report”. Available online: https://transparencyreport.google.com.
2. Automatic Detection of DGA-Enabled Malware Using SDN and Traffic Behavioral Modeling;Ahmed;IEEE Trans. Netw. Sci. Eng.,2022
3. Network traffic classification for data fusion: A survey;Zhao;Inf. Fusion,2021
4. A Survey on Big Data for Network Traffic Monitoring and Analysis;Drago;IEEE Trans. Netw. Serv. Manag.,2019
5. IoT-KEEPER: Detecting Malicious IoT Network Activity Using Online Traffic Analysis at the Edge;Hafeez;IEEE Trans. Netw. Serv. Manag.,2020
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Monitoring and Analysis of Encrypted Attack Traffic Based on Machine Learning;2023 International Conference on Human-Centered Cognitive Systems (HCCS);2023-12-16