Encrypted Traffic Identification Based on N-gram Entropy and Cumulative Sum Test

Author(s):  
Guang Cheng ◽  
Ying Hu
2020 ◽  
Vol 2020 ◽  
pp. 1-10
Author(s):  
Jiangtao Zhai ◽  
Huaifeng Shi ◽  
Mingqian Wang ◽  
Zhongjun Sun ◽  
Junjun Xing

With the rapid growth of the encrypted network traffic, the identification to it becomes a hot topic in information security. Since the existing methods have difficulties in identifying the application which the encrypted traffic belongs to, a new encrypted traffic identification scheme is proposed in this paper. The proposed scheme has two levels. In the first level, the entropy and estimation of Monte Carlo π value as features are used to identify the encrypted traffic by C4.5 decision tree. In the second level, the application types are distinguished from the encrypted traffic selected above. First, the variational automatic encoder is used to extract the layer features, which is combined with the frequently-used stream features. Meanwhile, the mutual information is used to reduce the dimensionality of the combination features. Finally, the random forest classifier is used to obtain the optimal result. Compared with the existing methods, the experimental results show that the proposed scheme not only has faster convergence speed but also achieves better performance in the recognition accuracy, recall rate, and F1-Measure, which is higher than 97%.


2021 ◽  
Vol 105 ◽  
pp. 291-301
Author(s):  
Wei Wang ◽  
Cheng Sheng Sun ◽  
Jia Ning Ye

With more and more malicious traffic using TLS protocol encryption, efficient identification of TLS malicious traffic has become an increasingly important task in network security management in order to ensure communication security and privacy. Most of the traditional traffic identification methods on TLS malicious encryption only adopt the common characteristics of ordinary traffic, which results in the increase of coupling among features and then the low identification accuracy. In addition, most of the previous work related to malicious traffic identification extracted features directly from the data flow without recording the extraction process, making it difficult for subsequent traceability. Therefore, this paper implements an efficient feature extraction method with structural correlation for TLS malicious encrypted traffic. The traffic feature extraction process is logged in modules, and the index is used to establish relevant information links, so as to analyse the context and facilitate subsequent feature analysis and problem traceability. Finally, Random Forest is used to realize efficient TLS malicious traffic identification with an accuracy of up to 99.38%.


2019 ◽  
Vol 17 (1) ◽  
pp. 103-114 ◽  
Author(s):  
Lulu Guo ◽  
Qianqiong Wu ◽  
Shengli Liu ◽  
Ming Duan ◽  
Huijie Li ◽  
...  

2014 ◽  
Vol 543-547 ◽  
pp. 2249-2254 ◽  
Author(s):  
Wei Wang ◽  
Dong Nian Cheng

The P2P technology consumes the largest proportion of network traffic and is usually encrypted, which is lack of supervision. Accurate and rapid identification of encrypted P2P traffic, represented by the famous Skype, is of great significance to improve the network quality of service and enhance security control. In this paper, a trends-aware protocol fingerprints model is proposed based on the statistical signatures of signaling interactions and content transfer phase of Skype. The proposed method can sense traffic trends by trends-aware weighting functions and identify Skype traffic with anomaly scores in real-time. Experimental results show that the precision and real-time performances of the proposed algorithm is better than several state-of-art encrypted traffic identification methods, such as the protocol fingerprints and C4.5 algorithm.


Sign in / Sign up

Export Citation Format

Share Document