A Glimpse of the Whole: Path Optimization Prototypical Network for Few-Shot Encrypted Traffic Classification

With the prosperous application of encryption technology in network traffic, monitoring and analyzing network traffic efficiently become more and more challenging. Existing traffic classification methods mostly rely on sufficient and balanced training data, which inevitably require overwhelming labeling effort. Therefore, it is necessary to investigate an effective solution to relieve the enormous burden on annotating network data. To address the above issues, in this paper, we model the encrypted traffic classification as few-shot learning based on metric-learning and propose Path Optimization Prototypical Network (POPNet). Firstly, POPNet utilizes embedding model to map network traffic into a high dimensional metric space. Secondly, the distance between the embedded samples is optimized to aggregate samples with same category while estranging the distinct ones. Moreover, path optimization strategies are carefully designed to compress the searching space to obtain an efficient solution. Experimental results on regenerated datasets of real-world network traffic have demonstrated the effectiveness of our proposed POPNet. It is encouraging to see that, with barely a few training samples, POPNet has achieved superior performance on encrypted network traffic classification among the state-of-thearts, and its performance is immune to the deduction of training samples. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. Conference’17, July 2017, Washington, DC, USA © 2020 Association for Computing Machinery. ACM ISBN 978-x-xxxx-xxxx-x/YY/MM. . . $15.00 https://doi.org/10.1145/nnnnnnn.nnnnnnn CCS CONCEPTS •Networks→Networkmanagement; • Information systems → Traffic analysis; • Computing methodologies→Model verification and validation.

[1]  Wei Kuang Lai,et al.  Improving goodputs of IP packets under ATM UBR traffic with port-based queueing schemes , 2000, Comput. Networks.

[2]  Danqi Chen,et al.  of the Association for Computational Linguistics: , 2001 .

[3]  Michael Fink,et al.  Object Classification from a Single Example Utilizing Class Relevance Metrics , 2004, NIPS.

[4]  Pietro Perona,et al.  One-shot learning of object categories , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[5]  Geoffrey E. Hinton,et al.  Visualizing Data using t-SNE , 2008 .

[6]  Marco Canini,et al.  Efficient application identification and the temporal and spatial stability of classification schema , 2009, Comput. Networks.

[7]  Simon Osindero,et al.  Conditional Generative Adversarial Nets , 2014, ArXiv.

[8]  Ananthram Swami,et al.  Malware traffic detection using tamper resistant features , 2015, MILCOM 2015 - 2015 IEEE Military Communications Conference.

[9]  Nir Ailon,et al.  Deep Metric Learning Using Triplet Network , 2014, SIMBAD.

[10]  Tianqi Chen,et al.  XGBoost: A Scalable Tree Boosting System , 2016, KDD.

[11]  Ali A. Ghorbani,et al.  Characterization of Encrypted and VPN Traffic using Time-related Features , 2016, ICISSP.

[12]  Oriol Vinyals,et al.  Matching Networks for One Shot Learning , 2016, NIPS.

[13]  Blake Anderson,et al.  Machine Learning for Encrypted Malware Traffic Classification: Accounting for Noisy Labels and Non-Stationarity , 2017, KDD.

[14]  Nguyen Quang Uy,et al.  A Deep Learning Based Method for Handling Imbalanced Problem in Network Traffic Classification , 2017, SoICT.

[15]  Kai Chen,et al.  A temporal correlation and traffic analysis approach for APT attacks detection , 2017, Cluster Computing.

[16]  Richard S. Zemel,et al.  Prototypical Networks for Few-shot Learning , 2017, NIPS.

[17]  Sergey Levine,et al.  Model-Agnostic Meta-Learning for Fast Adaptation of Deep Networks , 2017, ICML.

[18]  Ming Zhu,et al.  End-to-end encrypted traffic classification with one-dimensional convolution neural networks , 2017, 2017 IEEE International Conference on Intelligence and Security Informatics (ISI).

[19]  Yu Cheng,et al.  Diverse Few-Shot Text Classification with Multiple Metrics , 2018, NAACL.

[20]  Zhen Li,et al.  TLS/SSL Encrypted Traffic Classification with Autoencoder and Convolutional Neural Network , 2018, 2018 IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC/SmartCity/DSS).

[21]  Yulei Wu,et al.  Encrypted Traffic Classification with a Convolutional Long Short-Term Memory Neural Network , 2018, 2018 IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC/SmartCity/DSS).

[22]  Siu-Ming Yiu,et al.  MaMPF: Encrypted Traffic Classification Based on Multi-Attribute Markov Probability Fingerprints , 2018, 2018 IEEE/ACM 26th International Symposium on Quality of Service (IWQoS).

[23]  Rui Li,et al.  Byte Segment Neural Network for Network Traffic Classification , 2018, 2018 IEEE/ACM 26th International Symposium on Quality of Service (IWQoS).

[24]  Pan Wang,et al.  Datanet: Deep Learning Based Encrypted Network Traffic Classification in SDN Home Gateway , 2018, IEEE Access.

[25]  Zigang Cao,et al.  FS-Net: A Flow Sequence Network For Encrypted Traffic Classification , 2019, IEEE INFOCOM 2019 - IEEE Conference on Computer Communications.

[26]  Arun Kumar Sangaiah,et al.  Novel dynamic multiple classification system for network traffic , 2019, Inf. Sci..

[27]  Zhen Liu,et al.  Mobile app traffic flow feature extraction and selection for improving classification robustness , 2019, J. Netw. Comput. Appl..

[28]  Lingfeng Wang,et al.  Deep Hierarchical Encoder–Decoder Network for Image Captioning , 2019, IEEE Transactions on Multimedia.

[29]  Gang Xiong,et al.  Deep Forest with LRRS Feature for Fine-grained Website Fingerprinting with Encrypted SSL/TLS , 2019, CIKM.

[30]  Luis Hernández-Callejo,et al.  Exploratory study on Class Imbalance and solutions for Network Traffic Classification , 2019, Neurocomputing.

[31]  Yuval Shavitt,et al.  FlowPic: Encrypted Internet Traffic Classification is as Easy as Image Recognition , 2019, IEEE INFOCOM 2019 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[32]  Chi-Wing Fu,et al.  Revisiting Metric Learning for Few-Shot Image Classification , 2019, Neurocomputing.

[33]  Michael A. Lepori,et al.  Representations of Syntax [MASK] Useful: Effects of Constituency and Dependency Structure in Recursive LSTMs , 2020, ACL.

[34]  Mahdi Jafari Siavoshani,et al.  Deep packet: a novel approach for encrypted traffic classification using deep learning , 2017, Soft Computing.

[35]  Margret Keuper,et al.  Watch Your Up-Convolution: CNN Based Generative Deep Neural Networks Are Failing to Reproduce Spectral Distributions , 2020, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).

[36]  Sara Beery,et al.  Context R-CNN: Long Term Temporal Context for Per-Camera Object Detection , 2019, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).

[37]  Pan Wang,et al.  PacketCGAN: Exploratory Study of Class Imbalance for Encrypted Traffic Classification Using CGAN , 2019, ICC 2020 - 2020 IEEE International Conference on Communications (ICC).

[38]  Ashutosh Nayyar,et al.  A Dynamic Mechanism for Security Management in Multi-Agent Networked Systems , 2020, IEEE INFOCOM 2020 - IEEE Conference on Computer Communications.

[39]  Yue Zhang,et al.  Multi-Cell Compositional LSTM for NER Domain Adaptation , 2020, ACL.

[40]  Lan Yan,et al.  Learning to Classify: A Flow-Based Relation Network for Encrypted Traffic Classification , 2020, WWW.

[41]  Kamlesh Tiwari,et al.  A survey on analyzing encrypted network traffic of mobile devices , 2020, International Journal of Information Security.