An analysis of clustering objectives for feature selection applied to encrypted traffic identification

Author(s):  
Carlos Bacquet ◽  
Nur A. Zincir-Heywood ◽  
Malcolm I. Heywood
2020 ◽  
Vol 2020 ◽  
pp. 1-10
Author(s):  
Jiangtao Zhai ◽  
Huaifeng Shi ◽  
Mingqian Wang ◽  
Zhongjun Sun ◽  
Junjun Xing

With the rapid growth of the encrypted network traffic, the identification to it becomes a hot topic in information security. Since the existing methods have difficulties in identifying the application which the encrypted traffic belongs to, a new encrypted traffic identification scheme is proposed in this paper. The proposed scheme has two levels. In the first level, the entropy and estimation of Monte Carlo π value as features are used to identify the encrypted traffic by C4.5 decision tree. In the second level, the application types are distinguished from the encrypted traffic selected above. First, the variational automatic encoder is used to extract the layer features, which is combined with the frequently-used stream features. Meanwhile, the mutual information is used to reduce the dimensionality of the combination features. Finally, the random forest classifier is used to obtain the optimal result. Compared with the existing methods, the experimental results show that the proposed scheme not only has faster convergence speed but also achieves better performance in the recognition accuracy, recall rate, and F1-Measure, which is higher than 97%.


Author(s):  
Bushra Mohammed Ali Abdalla ◽  
Haitham A. Jamil ◽  
Mosab Hamdan ◽  
Joseph Stephen Bassi ◽  
Ismahani Ismail ◽  
...  

2021 ◽  
Vol 105 ◽  
pp. 291-301
Author(s):  
Wei Wang ◽  
Cheng Sheng Sun ◽  
Jia Ning Ye

With more and more malicious traffic using TLS protocol encryption, efficient identification of TLS malicious traffic has become an increasingly important task in network security management in order to ensure communication security and privacy. Most of the traditional traffic identification methods on TLS malicious encryption only adopt the common characteristics of ordinary traffic, which results in the increase of coupling among features and then the low identification accuracy. In addition, most of the previous work related to malicious traffic identification extracted features directly from the data flow without recording the extraction process, making it difficult for subsequent traceability. Therefore, this paper implements an efficient feature extraction method with structural correlation for TLS malicious encrypted traffic. The traffic feature extraction process is logged in modules, and the index is used to establish relevant information links, so as to analyse the context and facilitate subsequent feature analysis and problem traceability. Finally, Random Forest is used to realize efficient TLS malicious traffic identification with an accuracy of up to 99.38%.


2020 ◽  
Vol 94 ◽  
pp. 101863 ◽  
Author(s):  
Muhammad Shafiq ◽  
Zhihong Tian ◽  
Ali Kashif Bashir ◽  
Xiaojiang Du ◽  
Mohsen Guizani

Sign in / Sign up

Export Citation Format

Share Document