2014
DOI: 10.1007/s10922-014-9324-6
|View full text |Cite
|
Sign up to set email alerts
|

How Robust Can a Machine Learning Approach Be for Classifying Encrypted VoIP?

Abstract: The classification of encrypted network traffic represents an important issue for network management and security tasks including quality of service, firewall enforcement, and security. Traffic classification becomes more challenging since the traditional techniques, such as port numbers or Deep Packet Inspection, are ineffective against Peer-to-Peer Voice over Internet Protocol (VoIP) applications, which used non-standard ports and encryption. Moreover, traffic classification also represents a particularly ch… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(5 citation statements)
references
References 36 publications
(52 reference statements)
0
5
0
Order By: Relevance
“…Although the method showed acceptable performance (over 90%) [15] and it can detect the application type, it could not correctly identify the application names, classifying both Yahoo and Gmail as e-mail [16]. In contrast, high accuracy was achieved (over 95%) by applying the latter approach of statistical methods [17][18][19][20], using statistical features derived from the packet header, such as number of packets, packet size, interarrival packets time, and flow duration with the aid of machine learning algorithms. e advantage of using ML algorithms is that they can be used in real-time environments to provide rapid application detection with high accuracy.…”
Section: Traffic Classification Techniquesmentioning
confidence: 94%
“…Although the method showed acceptable performance (over 90%) [15] and it can detect the application type, it could not correctly identify the application names, classifying both Yahoo and Gmail as e-mail [16]. In contrast, high accuracy was achieved (over 95%) by applying the latter approach of statistical methods [17][18][19][20], using statistical features derived from the packet header, such as number of packets, packet size, interarrival packets time, and flow duration with the aid of machine learning algorithms. e advantage of using ML algorithms is that they can be used in real-time environments to provide rapid application detection with high accuracy.…”
Section: Traffic Classification Techniquesmentioning
confidence: 94%
“…This characteristic makes them suitable for feature Some of them are computed under the assumption that the properties values are normally distributed, which might not be true for some cases. [110], [95], [96], [97], [111], [112], [113], [114], [115], [116], [117], [118], [119], [120], [121], [122], [123], [124], [125], [126], [127], [128], [129], [96], [130], [131], [132], [133], [134], [106], [135], [136], [137], [138], [105], [139], [140], [107], [141], [142], [143] Graph based features Internet interactions are modeled as graphs and valuable features can be extracted from these representations They are ideal for understanding communication patterns…”
Section: Feature Reduction and Selectionmentioning
confidence: 99%
“…VoIP communications have risen in popularity and their identification is a key factor in the telecommunication field either to prioritize or unable them. In consequence, several approaches have been proposed, such as the works in [160], [118], [114], [161], [128]. Some of these works tries to characterize and identify Skype, one of the most complex VoIP applications in the network due to its intricate communication protocol.…”
Section: A Classical Classificationmentioning
confidence: 99%
See 1 more Smart Citation
“…It is straightforward to see that full payload packet-level trace would give the network analysts the most accurate information because the trace has virtually every bit of information that the sender-receiver pair exchanged. Please note that in the case of encrypted traffic, the payload itself will not be of any help, unless you either have the encryption key to decrypt its content or can use specific technique [15,16] to overcome this issue. On the other hand, the more aggregated the collected trace is, the less detailed information is.…”
Section: Traffic Measurements: Packets Flow Records and Aggregated mentioning
confidence: 99%