Encrypted traffic classification based on packet length distribution of sampling sequence
academic paper|更新时间:2024-06-05
|
Encrypted traffic classification based on packet length distribution of sampling sequence
Journal on CommunicationsVol. 36, Issue 9, Pages: 65-75(2015)
作者机构:
1. 北京邮电大学 博士后流动站,北京 100876
2. 北京天融信公司 企业博士后工作站,北京 100085
作者简介:
基金信息:
Enterprise Postdoctoral Research Support Program of Zhongguancun Haidian Science Park(2012RC);Beijing Municipal Postdoctoral Research Support Program(2013ZZ-54)
Chang-xi GAO, Ya-biao WU, Cong WANG. Encrypted traffic classification based on packet length distribution of sampling sequence[J]. Journal on Communications, 2015, 36(9): 65-75.
DOI:
Chang-xi GAO, Ya-biao WU, Cong WANG. Encrypted traffic classification based on packet length distribution of sampling sequence[J]. Journal on Communications, 2015, 36(9): 65-75. DOI: 10.11959/j.issn.1000-436x.2015171.
Encrypted traffic classification based on packet length distribution of sampling sequence
A hypothesis testing-based statistical decision model (HTSDM) for application identification of encrypted traf-fic was presented.HTSDM was based on packet length distribution of deterministic sampling sequence at flow level
which was characterized by packet positions
packet directions
packet sizes
packet arrival continuity and packet arrival order.HTSDM boosted deep packet inspection (DPI) by introducing constraints of packet position and direction as well as inter-flow correlation action.A hybrid method of encrypted traffic classification combining DPI and dynamic flow in-spection (DFI) was proposed based on HTSDM.Experiment results show that this method can effectively identify the unique statistical traffic behavior of encrypted application in flow coordinate space
and achieve high precision
recall and overall accuracy while keeping low false positive rate (FPR) and overall FPR.
关键词
Keywords
references
GOMES J V , INÁCIO P R M , PEREIRA M , et al . Detection and classification of peer-to-peer traffic:a survey [J ] . ACM Computing Surveys , 2013 , 45 ( 3 ): 1 - 40 .
MOORE A , ZUEV D , CROGAN M . Discriminators for use in flow-based classification [R ] . Technical Report RR-05-13,ISSN 1470-5559,University of London , 2005 .
HJELMVIK E , JOHN W . Breaking and improving protocol obfusca-tion [R ] . Technical Report No.2010-05,ISSN 1652-926X,Chalmers University of Technology , 2010 .
LU C N , HUANG C Y , LIN Y D , et al . Session level flow classifica-tion by packet size distribution and session grouping [J ] . Computer Networks , 2012 , 56 ( 1 ): 260 - 272 .
BAR-YANAI R , LANGBERG M , PELEG D , RODITTY L . Realtime classification for encrypted traffic [A ] . Proceedings of 9th International Symposium on Experimental Algorithms (SEA 2010) [C ] . 2010 . 373 - 385 .
ALSHAMMARI R , ZINCIR-HEYWOOD A N . Machine learning based encrypted traffic classification:identifying SSH and skype [A ] . Proceedings of the 2009 IEEE Symposium on Computation Intelli-gence in Security and Defense Applications (CISDA 2009) [C ] . Ottawa , 2009 . 1 - 8 .
DUSI M , ESTE A , GRINGOLI F , SALGARELLI L . Using GMM and SVM-based techniques for the classification of SSH-encrypted traffic [A ] . Proceedings of the 44th IEEE International Conference on Com-munication(ICC' 09) [C ] . Dresden , 2009 . 1 - 6 .
NGUYEN T , ARMITAGE G . A survey of techniques for internet traf-fic classification using machine learning [J ] . IEEE Communications Surveys &Tutorials , 2008 , 10 ( 4 ): 56 - 76 .
CROTTI M , GRINGOLI F , SALGARELLI L . Impact of asymmetric routing on statistical traffic classification [A ] . Proceedings of the 7th IEEE Global Communications Conference (GLOBECOMM 2009) [C ] . Honolulu , 2009 . 1 - 8 .