1,429
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Hybrid feature learning framework for the classification of encrypted network traffic

&
Article: 2197172 | Received 08 Jan 2023, Accepted 24 Mar 2023, Published online: 13 Apr 2023

References

  • Aceto, G., Ciuonzo, D., Montieri, A., & Pescapé, A. (2019). Mimetic: Mobile encrypted traffic classification using multimodal deep learning. Computer Networks, 165, 106944. https://doi.org/10.1016/j.comnet.2019.106944
  • Aceto, G., Ciuonzo, D., Montieri, A., & Pescapé, A. (2021). Distiller: Encrypted traffic classification via multimodal multitask deep learning. Journal of Network and Computer Applications, 183–184, 102985. https://doi.org/10.1016/j.jnca.2021.102985
  • Alshammari, R., & Zincir-Heywood, A. N. (2009). Machine learning based encrypted traffic classification: Identifying SSH and Skype. In Proceedings of the Second IEEE International Conference on Computational Intelligence for Security and Defense Applications (pp. 289–296). IEEE Press.
  • Alshammari, R., & Zincir-Heywood, A. N. (2010). An investigation on the identification of VoIP traffic: Case study on Gtalk and Skype. In 2010 International Conference on Network and Service Management (pp. 310–313).
  • Cai, Z., Liu, F., Xiao, N., Liu, Q., & Wang, Z. (2010). Virtual network embedding for evolving networks. In 2010 IEEE Global Telecommunications Conference Globecom 2010 (pp. 1–5).
  • Cheng, M., HUANG, X.-h., Xu, T., Yan, M., & Qi, J.-l. (2011). Automatic traffic signature extraction based on fixed bit offset algorithm for traffic classification. The Journal of China Universities of Posts and Telecommunications, 18(1), 79–85. https://doi.org/10.1016/S1005-8885(10)60156-2
  • Coull, S. E., & Dyer, K. P. (2014). Traffic analysis of encrypted messaging services: Apple imessage and beyond. ACM SIGCOMM Computer Communication Review, 44(5), 5–11. https://doi.org/10.1145/2677046.2677048
  • Cuadra-Sanchez, A., & Aracil, J. (2017). A novel blind traffic analysis technique for detection of WhatsApp VoIP calls. International Journal of Network Management, 27(2), e1968. https://doi.org/10.1002/nem.v27.2
  • Datta, J., Kataria, N., & Hubballi, N. (2015). Network traffic classification in encrypted environment: A case study of google hangout. In 2015 Twenty First National Conference on Communications (NCC) (pp. 1–6).
  • Dorfinger, P. (2010). Real-time detection of encrypted traffic based on entropy estimation. na.
  • Ehlert, S., Petgang, S., Magedanz, T., & Sisalem, D. (2006). Analysis and signature of Skype VoIP session traffic. 4th IASTED International.
  • Fu, Y., Xiong, H., Lu, X., Yang, J., & Chen, C. (2016). Service usage classification with encrypted internet traffic in mobile messaging apps. IEEE Transactions on Mobile Computing, 15(11), 2851–2864. https://doi.org/10.1109/TMC.2016.2516020
  • Goo, Y.-H., Shim, K.-S., Lee, S.-K., & Kim, M.-S. (2016). Payload signature structure for accurate application traffic classification. In 2016 18th Asia-Pacific Network Operations and Management Symposium (APNOMS) (pp. 1–4).
  • Janani, K., & Ramamoorthy, S. (2022). Threat analysis model to control iot network routing attacks through deep learning approach. Connection Science, 34(1), 2714–2754. https://doi.org/10.1080/09540091.2022.2149698
  • Kumar, N., & Sharma, S. (2016). Survey analysis on the usage and impact of WhatsApp messenger. Global Journal of Enterprise Information System, 8(3), 52–57. https://doi.org/10.18311/gjeis/2016/15741
  • Lee, S.-H., Park, J.-S., Yoon, S.-H., & Kim, M.-S. (2015). High performance payload signature-based internet traffic classification system. In 2015 17th asia-pacific network operations and management symposium (apnoms) (pp. 491–494).
  • Liu, Z., Japkowicz, N., Wang, R., & Tang, D. (2019). Adaptive learning on mobile network traffic data. Connection Science, 31(2), 185–214. https://doi.org/10.1080/09540091.2018.1512557
  • Lotfollahi, M., Jafari Siavoshani, M., Shirali Hossein Zade, R., & Saberian, M. (2020). Deep packet: A novel approach for encrypted traffic classification using deep learning. Soft Computing, 24(3), 1999–2012. https://doi.org/10.1007/s00500-019-04030-2
  • Nguyen, T. T., & Armitage, G. (2008). A survey of techniques for internet traffic classification using machine learning. IEEE Communications Surveys & Tutorials, 10(4), 56–76. https://doi.org/10.1109/SURV.2008.080406
  • Park, B.-C., Won, Y. J., Kim, M.-S., & Hong, J. W. (2008). Towards automated application signature generation for traffic identification. In Noms 2008–2008 IEEE Network Operations and Management Symposium (pp. 160–167).
  • Rahman, M. H., Mofidul, R. B., & Jang, Y. M. (2022). Spectrum based wireless radio traffic classification using hybrid deep neural network. In 2022 Thirteenth International Conference on Ubiquitous and Future Networks (ICUFN) (pp. 95–99).
  • Shen, G., & Fan, L. (2008). Network traffic classification based on message statistics. In 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing (pp. 1–4).
  • Shim, K.-S., Ham, J.-H., Sija, B. D., & Kim, M.-S. (2017). Application traffic classification using payload size sequence signature. International Journal of Network Management, 27(5), e1981. https://doi.org/10.1002/nem.1981
  • Sudozai, M., Habib, N., Saleem, S., & Khan, A. (2017). Signatures of viber security traffic. Journal of Digital Forensics, Security and Law, 12(2), 11. https://doi.org/10.15394/jdfsl.2017.1477
  • Wang, H., Zhou, S., Li, H., Hu, J., Du, X., Zhou, J., & Yang, H. (2022). Deep learning network intrusion detection based on network traffic. In International Conference on Artificial Intelligence and Security (pp. 194–207).
  • Wang, P., Ye, F., Chen, X., & Qian, Y. (2018). Datanet: deep learning based encrypted network traffic classification in sdn home gateway. IEEE Access, 6(1), 55380–55391. doi: 10.1109/ACCESS.2018.2872430
  • Wang, W., Zhu, M., Wang, J., Zeng, X., & Yang, Z. (2017). End-to-end encrypted traffic classification with one-dimensional convolution neural networks. In 2017 IEEE International Conference on Intelligence and Security Informatics (ISI) (pp. 43–48).
  • Wongyai, W., & Charoenwatana, L. (2012). Examining the network traffic of Facebook homepage retrieval: An end user perspective. In 2012 Ninth International Conference on Computer Science and Software Engineering (JCSSE) (pp. 77–81).
  • Yoon, S.-H., Park, J.-S., & Kim, M.-S. (2012). Signature maintenance for internet application traffic identification using header signatures. In 2012 IEEE Network Operations and Management Symposium (pp. 1151–1158).
  • Yoon, S.-H., Park, J.-S., & Kim, M.-S. (2015). Behavior signature for fine-grained traffic identification. Applied Mathematics, 9(2L), 523–534.
  • Yuan, Z., Du, C., Chen, X., Wang, D., & Xue, Y. (2014). Skytracer: Towards fine-grained identification for Skype traffic via sequence signatures. In 2014 International Conference on Computing, Networking and Communications (ICNC) (pp. 1–5).