Progress in Study of Encrypted Traffic Classification

The rapid increase in encrypted network traffic recently has becomeagreat challenge for network management, and study of encrypted traffic classification provides basic technical support for effective network management and network security. The basis and problems of encrypted traffic classification are introduced first. Next, the main research progresses of encrypted traffic classification are summarized. Finally, the future trend is put forward.

[1]  Fabian Monrose,et al.  Phonotactic Reconstruction of Encrypted VoIP Conversations: Hookt on Fon-iks , 2011, 2011 IEEE Symposium on Security and Privacy.

[2]  Grenville J. Armitage,et al.  Training on multiple sub-flows to optimise the use of Machine Learning classifiers in real-world IP networks , 2006, Proceedings. 2006 31st IEEE Conference on Local Computer Networks.

[3]  Charles V. Wright,et al.  Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis , 2009, NDSS.

[4]  Sakir Sezer,et al.  Host-Based P2P Flow Identification and Use in Real-Time , 2011, TWEB.

[5]  Xiuqin Su,et al.  The classification of SSH tunneled traffic using maximum likelihood classifier , 2011, 2011 International Conference on Electronics, Communications and Control (ICECC).

[6]  Michalis Faloutsos,et al.  BLINC: multilevel traffic classification in the dark , 2005, SIGCOMM '05.

[7]  Luca Salgarelli,et al.  Optimizing statistical classifiers of network traffic , 2010, IWCMC.

[8]  Malcolm I. Heywood,et al.  Genetic optimization and hierarchical clustering applied to encrypted traffic identification , 2011, 2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS).

[9]  Luca Salgarelli,et al.  Impact of Asymmetric Routing on Statistical Traffic Classification , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[10]  Charles V. Wright,et al.  Using visual motifs to classify encrypted traffic , 2006, VizSEC '06.

[11]  Ian Goldberg,et al.  SkypeMorph: protocol obfuscation for Tor bridges , 2012, CCS.

[12]  Riyad Alshammari,et al.  Machine learning based encrypted traffic classification: Identifying SSH and Skype , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.

[13]  Yuanchao Lu,et al.  Correlation-Based Traffic Analysis on Encrypted VoIP Traffic , 2010, 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing.

[14]  Erik Hjelmvik,et al.  Breaking and Improving Protocol Obfuscation , 2010 .

[15]  Maurizio Dusi,et al.  Quantifying the accuracy of the ground truth associated with Internet traffic traces , 2011, Comput. Networks.

[16]  Grenville J. Armitage,et al.  A survey of techniques for internet traffic classification using machine learning , 2008, IEEE Communications Surveys & Tutorials.

[17]  Marco Canini,et al.  GTVS: Boosting the Collection of Application Traffic Ground Truth , 2009, TMA.

[18]  PJ Radcliffe,et al.  VoIP traffic classification in IPSec tunnels , 2010, 2010 International Conference on Electronics and Information Engineering.