NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium 2018
DOI: 10.1109/noms.2018.8406218
|View full text |Cite
|
Sign up to set email alerts
|

Fingerprinting encrypted network traffic types using machine learning

Abstract: Abstract-Internet applications rely on strong encryption techniques to protect the content of all communications between client and server. These encryption algorithms ensure that third parties are unable to obtain the plain text data but also make it hard for the network administrator to enforce restrictions on the types of traffic that are allowed. In this paper we show that we can train accurate machine learning models which can predict the type of traffic going through an IPsec or TOR tunnel based on featu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 22 publications
(6 citation statements)
references
References 12 publications
0
6
0
Order By: Relevance
“…In recent years, the research on encrypted traffic has mainly used feature engineering [8][9][10][11][12][13] to find out the characteristics that best reflect the features of different classes of encrypted traffic and then classify them by selecting an appropriate classifier. Currently, the commonly used classification models are mainly divided into three types: Markov models [14][15][16], traditional machine learning algorithms [17][18][19][20][21], and deep neural network methods [6,[22][23][24][25][26][27][28][29][30][31].…”
Section: Related Workmentioning
confidence: 99%
“…In recent years, the research on encrypted traffic has mainly used feature engineering [8][9][10][11][12][13] to find out the characteristics that best reflect the features of different classes of encrypted traffic and then classify them by selecting an appropriate classifier. Currently, the commonly used classification models are mainly divided into three types: Markov models [14][15][16], traditional machine learning algorithms [17][18][19][20][21], and deep neural network methods [6,[22][23][24][25][26][27][28][29][30][31].…”
Section: Related Workmentioning
confidence: 99%
“…However, this method is ineffective in presenting user behaviors which are crucial in classifying network traffic. Analyzing encrypted packet payload without decrypting has received more attentions recently [15], [16]. Sherry et al [15] only considered the HTTP protocol with TLS encryption which is one of many encryption protocols on the Internet applications.…”
Section: ) Flow-based Methodmentioning
confidence: 99%
“…Sherry et al [15] only considered the HTTP protocol with TLS encryption which is one of many encryption protocols on the Internet applications. S. Leroux et al [16] presented a network traffic analysis method based on packet size and interval time. However, it only works efficiently for some specific applications which have extremely different packet size and transmission time, e.g., HTTP, VoIP, Video streaming, and P2P.…”
Section: ) Flow-based Methodmentioning
confidence: 99%
“…We considered using the TCP packet length from Application Data. While we cannot see into the unencrypted content, the packet length is directly linked to the payload of the traffic and usually follows an application-specific profile [46]. Thus, we can use packet length to determine which traffic is benign or malicious based on the specific application profile.…”
Section: Feature Extractionmentioning
confidence: 99%