2022
DOI: 10.3390/s22114216
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Lightweight Anonymous Proxy Traffic Detection Method Based on Spatio-Temporal Features

Abstract: Anonymous proxies are used by criminals for illegal network activities due to their anonymity, such as data theft and cyber attacks. Therefore, anonymous proxy traffic detection is very essential for network security. In recent years, detection based on deep learning has become a hot research topic, since deep learning can automatically extract and select traffic features. To make (heterogeneous) network traffic adapt to the homogeneous input of typical deep learning algorithms, a major branch of existing stud… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 27 publications
0
1
0
Order By: Relevance
“…This method can analyze the information carried in the header of the data packet and realize the accurate classification of the dark network traffic, which effectively improves the performance of the classification process. He et al [19] proposed a method for analyzing anonymous proxy traffic by converting the size sequence and inter-arrival time sequence of the initial N data packets of the flow into images. These images were then classified using a one-dimensional convolutional neural network.…”
Section: Deep Learning Methodsmentioning
confidence: 99%
“…This method can analyze the information carried in the header of the data packet and realize the accurate classification of the dark network traffic, which effectively improves the performance of the classification process. He et al [19] proposed a method for analyzing anonymous proxy traffic by converting the size sequence and inter-arrival time sequence of the initial N data packets of the flow into images. These images were then classified using a one-dimensional convolutional neural network.…”
Section: Deep Learning Methodsmentioning
confidence: 99%
“…He et al [14] developed a one-dimensional CNN model to classify anonymous proxy traffic with smaller image sizes. First, they converted two-way and one-way Spatiotemporal features to one-dimensional images.…”
Section: A Anonymous Network Traffic Classificationmentioning
confidence: 99%
“…Convolutional neural networks (CNNs) are one such model that can exploit properties such as locality and order between components of the data [12]. Prior research [9], [13], [14] has proven the effectiveness of CNNs in classifying network traffic when trained on T2I data. Other CNN variants, such as deep residual networks (ResNet), have also yielded high performance in a broad range of classification tasks.…”
Section: Introductionmentioning
confidence: 99%
“…Liang et al [5] extracted Tor traffic feature matches for feature enhancement by building a logistic regression-based deep neural network, and used an artificial bee colony mechanism instead of common iterative algorithms such as gradient descent to achieve real-time traffic identification. Yanjie.He et al [6] converted the size sequence and arrival interval time sequence of the first N packets of a stream by analyzing anonymous proxy traffic. Xin Tong et al [7] proposed a traffic analysis method "Dark-Forest", which uses a particle swarm optimization algorithm to Liu, Z et al [8] proposed a method called ELD (Extending Labeled Data) to identify the labels of new unknown mobile traffic and thus extend the labeled mobile traffic data.…”
Section: Introductionmentioning
confidence: 99%