Encrypted Traffic Identification Based on Sparse Logistical Regression and Extreme Learning Machine

In this work, a new encrypted traffic identification algorithm using sparse logistical regression and extreme learning machine (ELM) is introduced. The proposed method is based on randomness characteristics of encrypted traffic. we utilize l1-norm regularized logistic regression to select sparse features. The identification is performed with the help of Extreme Learning Machine (ELM) because of its better identification and faster speed. In ELM, the input weights and the bias values are randomly chosen and the output weights are analytically calculated. Extensive experiments are performed using the proposed encrypted traffic identification algorithm and results are compared against state of the art techniques.

[1]  Douglas A. Reynolds,et al.  Gaussian Mixture Models , 2018, Encyclopedia of Biometrics.

[2]  Honglak Lee,et al.  Efficient L1 Regularized Logistic Regression , 2006, AAAI.

[3]  Michalis Faloutsos,et al.  BLINC: multilevel traffic classification in the dark , 2005, SIGCOMM '05.

[4]  Riyad Alshammari,et al.  Generalization of signatures for SSH encrypted traffic identification , 2009, 2009 IEEE Symposium on Computational Intelligence in Cyber Security.

[5]  Renata Teixeira,et al.  Early application identification , 2006, CoNEXT '06.

[6]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[7]  D. Serre Matrices: Theory and Applications , 2002 .

[8]  James Won-Ki Hong,et al.  Streaming Media and Multimedia Conferencing Traffic Analysis Using Payload Examination , 2004 .

[9]  Shuiwang Ji,et al.  SLEP: Sparse Learning with Efficient Projections , 2011 .

[10]  Chee Kheong Siew,et al.  Universal Approximation using Incremental Constructive Feedforward Networks with Random Hidden Nodes , 2006, IEEE Transactions on Neural Networks.

[11]  Robert P. W. Duin,et al.  Data domain description using support vectors , 1999, ESANN.

[12]  Andrea Baiocchi,et al.  Real Time Identification of SSH Encrypted Application Flows by Using Cluster Analysis Techniques , 2009, Networking.

[13]  Michalis Faloutsos,et al.  Transport layer identification of P2P traffic , 2004, IMC '04.

[14]  Chee Kheong Siew,et al.  Extreme learning machine: RBF network case , 2004, ICARCV 2004 8th Control, Automation, Robotics and Vision Conference, 2004..

[15]  Anthony McGregor,et al.  Flow Clustering Using Machine Learning Techniques , 2004, PAM.

[16]  Luís Torgo,et al.  Regression by Classification , 1996, SBIA.

[17]  Pierre L'Ecuyer,et al.  TestU01: A C library for empirical testing of random number generators , 2006, TOMS.

[18]  Guang-Bin Huang,et al.  Extreme learning machine: a new learning scheme of feedforward neural networks , 2004, 2004 IEEE International Joint Conference on Neural Networks (IEEE Cat. No.04CH37541).