Abstract
Encrypted traffic classification can essentially support network QoS (Quality of Service) and user QoE (Quality of Experience). However, as a typical supervised learning problem, it requires sufficiently labeled samples, which should be frequently updated. The current gateway-based labeled sample acquisition methods can only be carried out under TLS traffic. It relies on the Server Name Indication, a confused optional field that can be tampered with. The current end-based methods carried out manually or automatically have low efficiency and lack sample integrity, category purity, and label authenticity. In addition, they may have colossal packet loss and violate device security and user privacy. To solve these problems, we propose a one-stop automated encrypted traffic labeled sample collection, construction, and correlation system, A3C. First, we carry out the automated process-isolated traffic collection and labeled sample construction in the mixed application scenario, which can be used on Windows, Linux, and Android systems. Then, we propose the Segmented Entropy Distribution Capsule Neural Network (SED-CapsNet) to validate the encryption of the collected samples. We also propose optional authenticity validation and context flow correlation methods. Experimental results show that the system can effectively achieve one-stop encrypted traffic labeled dataset acquisition. It is superior to the existing methods.
Funder
the General Program of the National Natural Science Foundation of China
Subject
Fluid Flow and Transfer Processes,Computer Science Applications,Process Chemistry and Technology,General Engineering,Instrumentation,General Materials Science
Reference52 articles.
1. Google (2022, October 15). HTTPS Encryption on the Web—Google Transparency Report. Available online: https://transparencyreport.google.com/https/overview.
2. Yang, B., and Liu, D. (2019, January 15–17). Research on Network Traffic Identification based on Machine Learning and Deep Packet Inspection. Proceedings of the 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), Chengdu, China.
3. Draper-Gil, G., Lashkari, A.H., Mamun, M.S.I., and Ghorbani, A.A. (2016, January 19–21). Characterization of encrypted and vpn traffic using time-related. Proceedings of the 2nd International Conference on Information Systems Security and Privacy (ICISSP), Rome, Italy.
4. A Survey of Techniques for Mobile Service Encrypted Traffic Classification Using Deep Learning;IEEE Access,2019
5. Gerald, C., Gilbert, R., and Thomas, B. (2022, April 15). Wireshark · Go Deep. Available online: https://www.wireshark.org/.
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献