encrypted traffic
Recently Published Documents


TOTAL DOCUMENTS

240
(FIVE YEARS 157)

H-INDEX

19
(FIVE YEARS 9)

Electronics ◽  
2021 ◽  
Vol 10 (24) ◽  
pp. 3180
Author(s):  
Joonseo Ha ◽  
Heejun Roh

In parallel with the rapid adoption of transport layer security (TLS), malware has utilized the encrypted communication channel provided by TLS to hinder detection from network traffic. To this end, recent research efforts are directed toward malware detection and malware family classification for TLS-encrypted traffic. However, amongst their feature sets, the proposals to utilize the sequential information of each TLS session has not been properly evaluated, especially in the context of malware family classification. In this context, we propose a systematic framework to evaluate the state-of-the-art malware family classification methods for TLS-encrypted traffic in a controlled environment and discuss the advantages and limitations of the methods comprehensively. In particular, our experimental results for the 10 representations and classifier combinations show that the graph-based representation for the sequential information achieves better performance regardless of the evaluated classification algorithms. With our framework and findings, researchers can design better machine learning based classifiers.


Sensors ◽  
2021 ◽  
Vol 21 (24) ◽  
pp. 8231
Author(s):  
Xinyi Hu ◽  
Chunxiang Gu ◽  
Yihang Chen ◽  
Fushan Wei

With the rapid increase in encrypted traffic in the network environment and the increasing proportion of encrypted traffic, the study of encrypted traffic classification has become increasingly important as a part of traffic analysis. At present, in a closed environment, the classification of encrypted traffic has been fully studied, but these classification models are often only for labeled data and difficult to apply in real environments. To solve these problems, we propose a transferable model called CBD with generalization abilities for encrypted traffic classification in real environments. The overall structure of CBD can be generally described as a of one-dimension CNN and the encoder of Transformer. The model can be pre-trained with unlabeled data to understand the basic characteristics of encrypted traffic data, and be transferred to other datasets to complete the classification of encrypted traffic from the packet level and the flow level. The performance of the proposed model was evaluated on a public dataset. The results showed that the performance of the CBD model was better than the baseline methods, and the pre-training method can improve the classification ability of the model.


2021 ◽  
pp. 177-205
Author(s):  
Aswani Kumar Cherukuri ◽  
Ikram Sumaiya Thaseen ◽  
Gang Li ◽  
Xiao Liu ◽  
Vinamra Das ◽  
...  

2021 ◽  
Author(s):  
Pedro Casas ◽  
Sarah Wassermann ◽  
Nikolas Wehner ◽  
Michael Seufert ◽  
Joshua Schuler ◽  
...  

2021 ◽  
Author(s):  
Chang Liu ◽  
Gang Xiong ◽  
Gaopeng Gou ◽  
Siu-Ming Yiu ◽  
Zhen Li ◽  
...  

2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Junkai Yi ◽  
Guanglin Gong ◽  
Zeyu Liu ◽  
Yacong Zhang

In order to solve the problem that traditional analysis approaches of encrypted traffic in encryption transmission of network application only consider the traffic classification in the complete communication process with ignoring traffic classification in the simplified communication process, and there are a lot of duplication problems in application fingerprints during state transition, a new classification approach of encrypted traffic is proposed. The article applies the Gaussian mixture model (GMM) to analyze the length of the message, and the model is established to solve the problem of application fingerprint duplication. The fingerprints with similar lengths of the same application are divided into as few clusters as possible by constrained clustering approach, which speeds up convergence speed and improves the clustering effect. The experimental results show that compared with the other encryption traffic classification approaches, the proposed approach has 11.7%, 19.8%, 6.86%, and 5.36% improvement in TPR, FPR, Precision, and Recall, respectively, and the classification effect of encrypted traffic is significantly improved.


2021 ◽  
Vol 2021 ◽  
pp. 1-14
Author(s):  
Maohua Guo ◽  
Jinlong Fei

Website fingerprinting attacks allow attackers to determine the websites that users are linked to, by examining the encrypted traffic between the users and the anonymous network portals. Recent research demonstrated the feasibility of website fingerprinting attacks on Tor anonymous networks with only a few samples. Thus, this paper proposes a novel small-sample website fingerprinting attack method for SSH and Shadowsocks single-agent anonymity network systems, which focuses on analyzing homology relationships between website fingerprinting. Based on the latter, we design a Convolutional Neural Network-Bidirectional Long Short-Term Memory (CNN-BiLSTM) attack classification model that achieves 94.8% and 98.1% accuracy in classifying SSH and Shadowsocks anonymous encrypted traffic, respectively, when only 20 samples per site are available. We also highlight that the CNN-BiLSTM model has significantly better migration capabilities than traditional methods, achieving over 90% accuracy when applied on a new set of monitored sites with only five samples per site. Overall, our experiments demonstrate that CNN-BiLSTM is an efficient, flexible, and robust model for website fingerprinting attack classification.


Sign in / Sign up

Export Citation Format

Share Document