Toward effective mobile encrypted traffic classification through deep learning

Traffic Classification (TC), consisting in how to infer applications generating network traffic, is currently the enabler for valuable profiling information, other than being the workhorse for service differentiation/ blocking. Further, TC is fostered by the blooming of mobile (mostly encrypted) traffic volumes, fueled by the huge adoption of hand-held devices. While researchers and network operators still rely on machine learning to pursue accurate inference, we envision Deep Learning (DL) paradigm as the stepping stone toward the design of practical (and effective) mobile traffic classifiers based on automatically-extracted features, able to operate with encrypted traffic, and reflecting complex traffic patterns. In this context, the paper contribution is fourfold. First, it provides a taxonomy of the key network traffic analysis subjects where DL is foreseen as attractive. Secondly, it delves into the non-trivial adoption of DL to mobile TC, surfacing potential gains. Thirdly, to capitalize such gains, it proposes and validates a general framework for DL-based encrypted TC. Two concrete instances originating from our framework are then experimentally evaluated on three mobile datasets of human users’ activity. Lastly, our framework is leveraged to point to future research perspectives.

[1]  Giuseppe Aceto,et al.  MIMETIC: Mobile encrypted traffic classification using multimodal deep learning , 2019, Comput. Networks.

[2]  Giuseppe Aceto,et al.  MIRAGE: Mobile-app Traffic Capture and Ground-truth Creation , 2019, 2019 4th International Conference on Computing, Communications and Security (ICCCS).

[3]  Antonio Pescapè,et al.  Know your Big Data Trade-offs when Classifying Encrypted Mobile Traffic with Deep Learning , 2019, 2019 Network Traffic Measurement and Analysis Conference (TMA).

[4]  Zigang Cao,et al.  FS-Net: A Flow Sequence Network For Encrypted Traffic Classification , 2019, IEEE INFOCOM 2019 - IEEE Conference on Computer Communications.

[5]  Jingyu Wang,et al.  Common Knowledge Based and One-Shot Learning Enabled Multi-Task Traffic Classification , 2019, IEEE Access.

[6]  Giuseppe Aceto,et al.  Mobile Encrypted Traffic Classification Using Deep Learning: Experimental Evaluation, Lessons Learned, and Challenges , 2019, IEEE Transactions on Network and Service Management.

[7]  Naveen K. Chilamkurti,et al.  Leveraging LSTM Networks for Attack Detection in Fog-to-Things Communications , 2018, IEEE Communications Magazine.

[8]  H. Hagras Toward Human-Understandable, Explainable AI , 2018, Computer.

[9]  Pedro Casas,et al.  RawPower: Deep Learning based Anomaly Detection from Raw Network Traffic Measurements , 2018, SIGCOMM Posters and Demos.

[10]  He Huang,et al.  Automatic Multi-task Learning System for Abnormal Network Traffic Detection , 2018, Int. J. Emerg. Technol. Learn..

[11]  Qi Shi,et al.  A Deep Learning Approach to Network Intrusion Detection , 2018, IEEE Transactions on Emerging Topics in Computational Intelligence.

[12]  Mohsen Imani,et al.  Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning , 2018, CCS.

[13]  Paul Patras,et al.  Long-Term Mobile Traffic Forecasting Using Deep Spatio-Temporal Neural Networks , 2017, MobiHoc.

[14]  Wei Lin,et al.  Traffic Identification of Mobile Apps Based on Variational Autoencoder Network , 2017, 2017 13th International Conference on Computational Intelligence and Security (CIS).

[15]  Yun-Chun Chen,et al.  Deep learning for malicious flow detection , 2017, 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).

[16]  Mahdi Jafari Siavoshani,et al.  Deep packet: a novel approach for encrypted traffic classification using deep learning , 2017, Soft Computing.

[17]  Wouter Joosen,et al.  Automated Website Fingerprinting through Deep Learning , 2017, NDSS.

[18]  Ming Zhu,et al.  End-to-end encrypted traffic classification with one-dimensional convolution neural networks , 2017, 2017 IEEE International Conference on Intelligence and Security Informatics (ISI).

[19]  Kilian Q. Weinberger,et al.  On Calibration of Modern Neural Networks , 2017, ICML.

[20]  Fuad E. Alsaadi,et al.  A switching delayed PSO optimized extreme learning machine for short-term load forecasting , 2017, Neurocomputing.

[21]  Mauro Conti,et al.  Robust Smartphone App Identification via Encrypted Network Traffic Analysis , 2017, IEEE Transactions on Information Forensics and Security.

[22]  Yurong Liu,et al.  A survey of deep neural network architectures and their applications , 2017, Neurocomputing.

[23]  Shui Yu,et al.  Network Traffic Prediction Based on Deep Belief Network in Wireless Mesh Backbone Networks , 2017, 2017 IEEE Wireless Communications and Networking Conference (WCNC).

[24]  Fuad E. Alsaadi,et al.  Deep Belief Networks for Quantitative Analysis of a Gold Immunochromatographic Strip , 2016, Cognitive Computation.

[25]  Ivan Martinovic,et al.  Who do you sync you are?: smartphone fingerprinting via application behaviour , 2013, WiSec '13.

[26]  Antonio Pescapè,et al.  Identification of Traffic Flows Hiding behind TCP Port 80 , 2010, 2010 IEEE International Conference on Communications.

[27]  Antonio Pescapè,et al.  K-Dimensional Trees for Continuous Traffic Classification , 2010, TMA.

[28]  Grenville J. Armitage,et al.  A survey of techniques for internet traffic classification using machine learning , 2008, IEEE Communications Surveys & Tutorials.

[29]  Ming Zhu,et al.  Malware traffic classification using convolutional neural network for representation learning , 2017, 2017 International Conference on Information Networking (ICOIN).

[30]  Guigang Zhang,et al.  Deep Learning , 2016, Int. J. Semantic Comput..

[31]  Antonio Pescapè,et al.  Issues and future directions in traffic classification , 2012, IEEE Network.