scholarly journals An Encrypted Traffic Identification Scheme Based on the Multilevel Structure and Variational Automatic Encoder

2020 ◽  
Vol 2020 ◽  
pp. 1-10
Author(s):  
Jiangtao Zhai ◽  
Huaifeng Shi ◽  
Mingqian Wang ◽  
Zhongjun Sun ◽  
Junjun Xing

With the rapid growth of the encrypted network traffic, the identification to it becomes a hot topic in information security. Since the existing methods have difficulties in identifying the application which the encrypted traffic belongs to, a new encrypted traffic identification scheme is proposed in this paper. The proposed scheme has two levels. In the first level, the entropy and estimation of Monte Carlo π value as features are used to identify the encrypted traffic by C4.5 decision tree. In the second level, the application types are distinguished from the encrypted traffic selected above. First, the variational automatic encoder is used to extract the layer features, which is combined with the frequently-used stream features. Meanwhile, the mutual information is used to reduce the dimensionality of the combination features. Finally, the random forest classifier is used to obtain the optimal result. Compared with the existing methods, the experimental results show that the proposed scheme not only has faster convergence speed but also achieves better performance in the recognition accuracy, recall rate, and F1-Measure, which is higher than 97%.

2015 ◽  
Vol 11 (1) ◽  
Author(s):  
Eunike Thirza Hanitya Christian ◽  
R. Gunawan Santoso ◽  
Erick Purwanto

Daifugo is climbing card game that is originated from Japan. AI player of Daifugo card game can be implemented using Monte Carlo Tree Search to get optimal result from random simulation. Monte Carlo Tree Search has 4 step, selection, expansion, simulation and backpropagation that is executed until maximal loop is reached. Objective of using Monte Carlo Tree Search on AI player in Daifugo card game is to get move with high winning rate and to observe the effect of number of loop on the method to winning rate


2021 ◽  
Vol 105 ◽  
pp. 291-301
Author(s):  
Wei Wang ◽  
Cheng Sheng Sun ◽  
Jia Ning Ye

With more and more malicious traffic using TLS protocol encryption, efficient identification of TLS malicious traffic has become an increasingly important task in network security management in order to ensure communication security and privacy. Most of the traditional traffic identification methods on TLS malicious encryption only adopt the common characteristics of ordinary traffic, which results in the increase of coupling among features and then the low identification accuracy. In addition, most of the previous work related to malicious traffic identification extracted features directly from the data flow without recording the extraction process, making it difficult for subsequent traceability. Therefore, this paper implements an efficient feature extraction method with structural correlation for TLS malicious encrypted traffic. The traffic feature extraction process is logged in modules, and the index is used to establish relevant information links, so as to analyse the context and facilitate subsequent feature analysis and problem traceability. Finally, Random Forest is used to realize efficient TLS malicious traffic identification with an accuracy of up to 99.38%.


2019 ◽  
Vol 17 (1) ◽  
pp. 103-114 ◽  
Author(s):  
Lulu Guo ◽  
Qianqiong Wu ◽  
Shengli Liu ◽  
Ming Duan ◽  
Huijie Li ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document