skip to main content
10.1145/3371676.3371705acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccnsConference Proceedingsconference-collections
research-article

A Method of Detecting the Abnormal Encrypted Traffic Based on Machine Learning and Behavior Characteristics

Published: 13 January 2020 Publication History

Abstract

Classification of network traffic using port-based or deep packet-based analysis is becoming increasingly difficult with many peer-to-peer(P2P) applications using dynamic port numbers, especially in massive data streams. In view of the problem that traditional method cannot be self-learning and self-evolving in dynamic networks, this paper proposed an abnormally encrypted traffic detection method based on machine learning and behavior characteristics, this approach can not only identify unknown abnormal traffic, but eliminate specific feature extraction in advance, which can effectively improve the accuracy of the abnormal encrypted traffic detection system. In this paper, we processed the network traffic data with using a machine learning approach combined behavior characteristics of applications, the experimental results show that in the complex network, the abnormal encrypted data stream detection method based on machine learning and behavior characteristics has higher recognition accuracy and can more effectively solve the problem of abnormally encrypted traffic identification.

References

[1]
Chen Sheng, Zhu Guoshneg, Qi Xiaoyun, Lei Longfei, Zhen Jia, Wu Shanchao, and Wu Mengyu. 2017. Research on Abnormal Network Traffic Detection Based on Machine Learning[J]. Information and Communication, 2017(12):39--42.
[2]
Wang Haizhong. 2014. Design and Implementation of Network Traffic Classification System Based on Decision Tree [D]. University of Chinese Academy of Sciences(School of Engineering Management and Information Technology).
[3]
Aceto, G. Dainotti, A. Donato, W. and Pescapé, A. 2010. PortLoad: Taking the best of two worlds in traffic classification. In: Proc. of the INFOCOM IEEE Conf. on Computer Communications Workshops. San Diego: IEEE Press, 2010. 1--5.
[4]
Guo, ZB. and Qiu, ZD. 2008. Identification of BitTorrent traffic for high speed network using packet sampling and application signatures.Journal of Computer Research and Development, 45(2):227--236.
[5]
Smith, R. Estan, C. Jha, S. and Kong, SJ. 2008. Deflating the big bang: Fast and scalable deep packet inspection with extended finite automata.In: Bahl V, Wetherall D, Savage S, Stoica I, eds. Proc. of the ACM SIGCOMM 2008 Conf. on Data Communication (SIGCOMM 2008). New York: ACM Press. 207--218.
[6]
Xu, K. Zhang, M. Ye, MJ. Chiu, DM. and Wu, JP. 2010. Identify P2P traffic by inspecting data transfer behavior. Journal of Computer Communications, 33(10):1141--1150.
[7]
Sen, S. Spatscheck, O. and Wang, D. 2004. Accurate, scalable in network identification of P2P traffic using application signatures [C] //In WWW2004. New York(USA), 2004.
[8]
Nguyen, T. T. and Armitage, G. 2008. A survey of techniques for internet traffic classification using machine learning[J]. IEEE Communications Surveys & Tutorials, 10(4):56--76.
[9]
Alshammari, R. and Zincir-Heywood, A N. 2011. Can encrypted traffic be identified without port numbers, IP addresses and payload inspection?[J]. Computer Networks, 55(6):1326--1350.
[10]
Wang, Y. and Yu, S Z. 2009. Supervised Learning Real-time Traffic Classifiers[J]. Journal of Networks, 4(7):622-62
[11]
Karagiannis, T., Papagiannaki, K., and Faloutsos, M. 2005. BLINC:multilevel traffic classification in the dark [C]. Proceedings of SIGCOMM, Philadelphia, PA, USA, 2005: 229--240.
[12]
Marques Neto, H. T., Almeida, J. M., and Rocha, L. C. D., et al. 2004. A characterization of broadband user behavior and their e-business activities[J]. ACM SIGMETRICS Performance Evaluation Review, 2004, 32(3): 3--13.

Cited By

View all

Index Terms

  1. A Method of Detecting the Abnormal Encrypted Traffic Based on Machine Learning and Behavior Characteristics

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICCNS '19: Proceedings of the 2019 9th International Conference on Communication and Network Security
    November 2019
    172 pages
    ISBN:9781450376624
    DOI:10.1145/3371676
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    In-Cooperation

    • University of Tokyo
    • Chongqing University of Posts and Telecommunications

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 13 January 2020

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Abnormal traffic analysis
    2. Behavior characteristics
    3. J48 decision trees
    4. Machine Learning

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    ICCNS 2019

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)14
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 23 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media