Encrypted Network Traffic Classification: A data driven approach
With the growing number of the network based applications, the quality and usability of various applications require distinguished requirements in light of network performance. The Internet is a vast network of independently-managed networks. The traffic is heterogeneous and consists of flows from m...
Saved in:
Published in | 2020 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom) pp. 706 - 712 |
---|---|
Main Authors | , , , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.12.2020
|
Subjects | |
Online Access | Get full text |
DOI | 10.1109/ISPA-BDCloud-SocialCom-SustainCom51426.2020.00114 |
Cover
Loading…
Abstract | With the growing number of the network based applications, the quality and usability of various applications require distinguished requirements in light of network performance. The Internet is a vast network of independently-managed networks. The traffic is heterogeneous and consists of flows from multiple applications. For the sake of Internet governance, identifying who is who has become an impressing demand. The purpose of Internet governance is to properly distinguish the demands across the limited recourse. Traffic classification is the very beginning that helps identify who and how much the application requires. Hence, the classification and identification of encrypted traffic has drawn much research attention. Compare to the traditional methods such as port-based methods and payload-based methods, this study establishes a two-stage traffic classification framework based on convolutional neural network. Experimental results suggest that the developed method has a good degree of traffic classification subject to fewer bytes in the packet. |
---|---|
AbstractList | With the growing number of the network based applications, the quality and usability of various applications require distinguished requirements in light of network performance. The Internet is a vast network of independently-managed networks. The traffic is heterogeneous and consists of flows from multiple applications. For the sake of Internet governance, identifying who is who has become an impressing demand. The purpose of Internet governance is to properly distinguish the demands across the limited recourse. Traffic classification is the very beginning that helps identify who and how much the application requires. Hence, the classification and identification of encrypted traffic has drawn much research attention. Compare to the traditional methods such as port-based methods and payload-based methods, this study establishes a two-stage traffic classification framework based on convolutional neural network. Experimental results suggest that the developed method has a good degree of traffic classification subject to fewer bytes in the packet. |
Author | Li, Hui Zhang, Zhongkai Yan, Zhongmin Liu, Lei Lu, Xudong |
Author_xml | – sequence: 1 givenname: Zhongkai surname: Zhang fullname: Zhang, Zhongkai email: zk.zhang@mail.sdu.edu.cn organization: School of Software – sequence: 2 givenname: Lei surname: Liu fullname: Liu, Lei email: l.liu@sdu.edu.cn organization: Jonit SDU-NTU Centre for Artificial Intelligence Research(C-FAIR), Shandong University – sequence: 3 givenname: Xudong surname: Lu fullname: Lu, Xudong organization: School of Software – sequence: 4 givenname: Zhongmin surname: Yan fullname: Yan, Zhongmin organization: School of Software – sequence: 5 givenname: Hui surname: Li fullname: Li, Hui organization: School of Software |
BookMark | eNotjEtOwzAUAI0ECyg9ARtfIOH5m5gVJRSoVAFSy7p6dmxhkcaRk4J6eyrBamYxmity3qfeE2IYlIyBuV1t3hfFw2PTpUNbbJKL2DVpX2wO44SxP6likuuSA4cSgDF5RuamqpnWSjJZK35J7pe9y8dh8i199dNPyl90mzGE6GjT4TjGk-EUU39HF7TFCWmb47fvKQ5DTug-r8lFwG7083_OyMfTctu8FOu351WzWBeRg5gKK23LnRDKVCCUsqgheKuZBil560QwgLXn1ksNRspKOFOzWkGwqIKzWszIzd83eu93Q457zMfdKRU1q8QvFYZRVQ |
CODEN | IEEPAD |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/ISPA-BDCloud-SocialCom-SustainCom51426.2020.00114 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Xplore IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Xplore url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EISBN | 9781665414852 1665414855 |
EndPage | 712 |
ExternalDocumentID | 9443817 |
Genre | orig-research |
GrantInformation_xml | – fundername: Shandong Provincial Natural Science Foundation Joint grantid: zr2019lzh008 funderid: 10.13039/501100007129 – fundername: NSFC grantid: 61972230 funderid: 10.13039/501100001809 – fundername: National Key Research and Development Program of China grantid: 2018YFB0204005 funderid: 10.13039/501100012166 |
GroupedDBID | 6IE 6IL CBEJK RIE RIL |
ID | FETCH-LOGICAL-i203t-b4bd2c335970355ba60feb6160442dc3f90a8e2be46094473c981850fba5fcb63 |
IEDL.DBID | RIE |
IngestDate | Thu Jun 29 18:38:08 EDT 2023 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i203t-b4bd2c335970355ba60feb6160442dc3f90a8e2be46094473c981850fba5fcb63 |
PageCount | 7 |
ParticipantIDs | ieee_primary_9443817 |
PublicationCentury | 2000 |
PublicationDate | 2020-Dec. |
PublicationDateYYYYMMDD | 2020-12-01 |
PublicationDate_xml | – month: 12 year: 2020 text: 2020-Dec. |
PublicationDecade | 2020 |
PublicationTitle | 2020 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom) |
PublicationTitleAbbrev | ISPA-BDCLOUD-SOCIALCOM-SUSTAINCOM |
PublicationYear | 2020 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
Score | 1.7852998 |
Snippet | With the growing number of the network based applications, the quality and usability of various applications require distinguished requirements in light of... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 706 |
SubjectTerms | Convolutional neural networks Cryptography encrypted traffic classification Feature extraction Internet one-dimensional convolutional neural networks Telecommunication traffic Training two-stage |
Title | Encrypted Network Traffic Classification: A data driven approach |
URI | https://ieeexplore.ieee.org/document/9443817 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NTwIxEJ0AB-NJDRi_04NHC6Ut--FJRAiaQEiQhBvptN3EaBZC2IP-etstaDQevDU99SPtm2nfewNwrR0mZSoxlLe1pdJYpKlJBEXOFUceqaCQG42j4Uw-zTvzCtx8aWGstSX5zDZ9s_zLN0td-KeyViq9IVVchapL3IJWaw_SrW1m63E66dL7h97bsjA0iFvdmaLTIERyTRcbcM9K4Kz8f5A_CqqUeDI4gNFuJIFG8tosNtjUH79MGv871ENofCv3yOQLk46gYvM63PVzvX5fudiSjAPrmziI8t4RpKyJ6dlC5Qbdki7xlFFi1v4SJDvD8QbMBv3n3pBuKyfQF87EhqJEw7UQLltgLqBAFbHMYtSOmJTcaJGlTCWWo5WRS-9kLHTqgZtlqDqZxkgcQy1f5vYEiLKxC1p0wq2WUnU0msxldHGikYlYY3IKdT_7xSqYYyy2Ez_7u_sc9v36Bz7IBdQ268JeOlTf4FW5nZ8G3aUR |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NTwIxEJ0gJupJDRi_7cGjhdLtfnkSEQIKhARIuJF-bWI0CyG7B_31tlvAaDx4a3pqM2nfTPveG4BbaTAp4ZHCtCE1ZkoLHKvIw4JSTgUNuFPIDYZBd8qeZ_6sBHdbLYzWuiCf6ZodFn_5aiFz-1RWj5k1pAp3YNe3Ylyn1tqDeG2cWe-NR038-NR6X-QKO3mrOVV47KRIZmiyA2p5CZQUPxDsR0uVAlE6hzDYrMURSd5qeSZq8vOXTeN_F3sE1W_tHhptUekYSjqtwEM7lauPpcku0dDxvpEBKesegYqumJYvVIToHjWRJY0itbLXINpYjldh2mlPWl287p2AXynxMiyYUFR6nqkXiEkpBA9IokXQCAhjVEkviQmPNBWaBabAY6EnYwvdJBHcT6QIvBMop4tUnwLiOjRpi4yoloxxXwqVmJoujKQgXihFdAYVu_v50tljzNcbP_97-gb2u5NBf97vDV8u4MDGwrFDLqGcrXJ9ZTA-E9dFaL8A0GyoWQ |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2020+IEEE+Intl+Conf+on+Parallel+%26+Distributed+Processing+with+Applications%2C+Big+Data+%26+Cloud+Computing%2C+Sustainable+Computing+%26+Communications%2C+Social+Computing+%26+Networking+%28ISPA%2FBDCloud%2FSocialCom%2FSustainCom%29&rft.atitle=Encrypted+Network+Traffic+Classification%3A+A+data+driven+approach&rft.au=Zhang%2C+Zhongkai&rft.au=Liu%2C+Lei&rft.au=Lu%2C+Xudong&rft.au=Yan%2C+Zhongmin&rft.date=2020-12-01&rft.pub=IEEE&rft.spage=706&rft.epage=712&rft_id=info:doi/10.1109%2FISPA-BDCloud-SocialCom-SustainCom51426.2020.00114&rft.externalDocID=9443817 |