2020
DOI: 10.4018/ijwnbt.2020070104
|View full text |Cite
|
Sign up to set email alerts
|

Detection of Virtual Private Network Traffic Using Machine Learning

Abstract: The detection of unauthorized users can be problematic for techniques that are available at present if the nefarious actors are using identity hiding tools such as anonymising proxies or virtual private networks (VPNs). This work presents computational models to address the limitations currently experienced in detecting VPN traffic. A model to detect usage of VPNs was developed using a multi-layered perceptron neural network that was trained using flow statistics data found in the transmission control protocol… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
11
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(11 citation statements)
references
References 35 publications
0
11
0
Order By: Relevance
“…3, where 55.3% of the data instances were classified as non-VPN and the remaining, i.e., 44.7%, were classified as VPN when the time interval 60 s. In addition, Fig. 3 also shows the distribution of the dataset in each class over different time intervals (15,30,120). Other exploration tasks were also conducted to better understand the dataset; those included understanding the outliers as shown in Fig.…”
Section: Exploratory Data Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…3, where 55.3% of the data instances were classified as non-VPN and the remaining, i.e., 44.7%, were classified as VPN when the time interval 60 s. In addition, Fig. 3 also shows the distribution of the dataset in each class over different time intervals (15,30,120). Other exploration tasks were also conducted to better understand the dataset; those included understanding the outliers as shown in Fig.…”
Section: Exploratory Data Analysismentioning
confidence: 99%
“…In 2020, Miller et al [30] presented a computational approach to detect VPN traffic, where the flow statistics data found in captured network packets' TCP headers were extracted. A multi-layered perceptron neural network with 10-fold cross-validation was used.…”
Section: Introductionmentioning
confidence: 99%
“…Another field that was also covered by researchers was the detection of malicious virtual private network (VPN) traffic. Miller et al [95] proposed a computational model to address the current limitations in detecting VPN traffic and aid in the detection of VPN technologies that are being used to hide an attacker's identity. A model was built to detect VPN usage by using a MLP trained neural network by flow statistics found in the captured network packets' TCP header.…”
Section: Malicious Traffic Classificationmentioning
confidence: 99%
“…VPNs mask your IP address by allowing the network to forward it through a specially configured and remotely configured server under the management of the VPN host. This is means that if user browse the Internet by VPN, a server of VPN becomes user data source [4]. This is means that user internet service providers (ISPs) with others 3 rd parties can't know what a websites user visits or what a data user send or as well as receive over the internet.…”
Section: Introductionmentioning
confidence: 99%