2019
DOI: 10.1109/access.2019.2907149
|View full text |Cite
|
Sign up to set email alerts
|

Flow Context and Host Behavior Based Shadowsocks’s Traffic Identification

Abstract: Cloud Virtual Private Server (VPS) services provide the chance of rapid deployment of anonymous proxy services, becoming an important part of many anonymous proxy solutions. The anonymous system represented by ShadowSocks (SS), through proxy services deployed on VPSs provided by different cloud service providers, has become an important mean for illegal network activists to engage in illegal network activities such as cyber-attacks and darknet transactions. It is difficult for local network administrators to s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 25 publications
(13 citation statements)
references
References 39 publications
0
13
0
Order By: Relevance
“…Deep packet inspection (DPI) [17,18] and deep flow inspection (DFI) [19] implement analysis on packets or flows through frequent item-mining and pattern-matching methods, but it is difficult to establish matching rules for encrypted traffic. The behavior detection method [20][21][22][23][24] achieves high identification accuracy of encrypted traffic only for some special applications or protocols. The methods based on statistical features currently show relatively good performance for encrypted traffic classification, and machine learning (ML) is the most popular and effective one among them.…”
Section: Related Workmentioning
confidence: 99%
“…Deep packet inspection (DPI) [17,18] and deep flow inspection (DFI) [19] implement analysis on packets or flows through frequent item-mining and pattern-matching methods, but it is difficult to establish matching rules for encrypted traffic. The behavior detection method [20][21][22][23][24] achieves high identification accuracy of encrypted traffic only for some special applications or protocols. The methods based on statistical features currently show relatively good performance for encrypted traffic classification, and machine learning (ML) is the most popular and effective one among them.…”
Section: Related Workmentioning
confidence: 99%
“…Multiple flow-based features usually represent those that are extracted from multiple flows produced in a sliding time window. In a study on the identification of proxy application traffic based on the characteristic of flow bursts in a short time window [18], these features were designed to include the number of flow bursts, the maximum flow burst lengths, and the sum of all flow burst lengths. To detect network intrusion behaviors, Patil [19] not only applied single flowbased features but also added some multiple flow-based features, such as the number of flows with the same source IP address, and the number of flows with the same destination IP address.…”
Section: Single Flow-based and Multiple Flow-based Featurementioning
confidence: 99%
“…To verify this method, we collected all the network traffic based on the TLS protocol generated from July 1, 2019, to July 15, 2019. We collected a total of 1,655,498 TLS flows containing 18,357 TLS communication channels (18,357 unique destination IP addresses). In the experiment, we mined the benign TLS channels from the abovementioned 18,357 communication channels.…”
Section: Security and Communication Networkmentioning
confidence: 99%
“…They have verified that it is remarkably effective to apply machine learning to traffic detection. Zeng et al [5] have presented a Shadowsocks detection method based on flow context and host behavior. The detection model with a detection rate achieving 93.43% is built by extracting 12-dimensional features from three aspects: the relationship between flows, host's stream behaviors, and host's DNS behaviors.…”
Section: Detection For Different Anonymous Communication Softwarementioning
confidence: 99%
“…The best current performing machine learning algorithm for detecting Shadowsocks is the Random Forest algorithm. The accuracy of its detection based on network layer features using random forest algorithm has reached 85% [4], and the accuracy of the features based on flow context and host behavior has achieved 93.43%, whose method is more suitable for large-scale network environment [5].…”
Section: Introductionmentioning
confidence: 99%