Semi-supervised Encrypted Traffic Classification Using Composite Features Set

Many network management tasks such as managing bandwidth budget and ensuring quality of service objectives rely on accurate classification of network traffic. But the statistical features of encrypted traffics are not stable and do not contain sufficient information for classification all the time. Some applications support multiple protocols, and the behaviors of these applications are complicated and can’t be classified utilized only statistical features accurately. Regarding this, we propose composite features-based semi-supervised encrypted traffic classification. This is the first step utilizing composite feature set for classifying encrypted traffic. And the proposed approach is semi-supervised, fast and accurate classifiers can be obtained by training with a small number of labeled flows mixed with large number of unlabeled flows. We conduct the experiments to evaluate the performance of the proposed approach, obtaining promising results

[1]  Benxiong Huang,et al.  Internet Traffic Classification Using DBSCAN , 2009, 2009 WASE International Conference on Information Engineering.

[2]  Renata Teixeira,et al.  Early Recognition of Encrypted Applications , 2007, PAM.

[3]  Matthew Roughan,et al.  Class-of-service mapping for QoS: a statistical signature-based approach to IP traffic classification , 2004, IMC '04.

[4]  Anthony McGregor,et al.  Flow Clustering Using Machine Learning Techniques , 2004, PAM.

[5]  Xiaohong Guan,et al.  An SVM-based machine learning method for accurate internet traffic classification , 2010, Inf. Syst. Frontiers.

[6]  Dongsheng Wang,et al.  An Novel Hybrid Method for Effectively Classifying Encrypted Traffic , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[7]  Anja Feldmann,et al.  An analysis of Internet chat systems , 2003, IMC '03.

[8]  Michael Langberg,et al.  Realtime Classification for Encrypted Traffic , 2010, SEA.

[9]  Mark A. Hall,et al.  Correlation-based Feature Selection for Machine Learning , 2003 .

[10]  Charles V. Wright,et al.  On Inferring Application Protocol Behaviors in Encrypted Network Traffic , 2006, J. Mach. Learn. Res..

[11]  Michalis Faloutsos,et al.  BLINC: multilevel traffic classification in the dark , 2005, SIGCOMM '05.

[12]  Yuwei Wang,et al.  Identifying Network Application Layer Protocol with Machine Learning , 2009 .

[13]  Carey L. Williamson,et al.  A Longitudinal Study of P2P Traffic Classification , 2006, 14th IEEE International Symposium on Modeling, Analysis, and Simulation.

[14]  Grenville J. Armitage,et al.  A survey of techniques for internet traffic classification using machine learning , 2008, IEEE Communications Surveys & Tutorials.

[15]  Oliver Spatscheck,et al.  Accurate, scalable in-network identification of p2p traffic using application signatures , 2004, WWW '04.

[16]  Konstantina Papagiannaki,et al.  Toward the Accurate Identification of Network Applications , 2005, PAM.