2020
DOI: 10.4218/etrij.2019-0190
|View full text |Cite
|
Sign up to set email alerts
|

Practical evaluation of encrypted traffic classification based on a combined method of entropy estimation and neural networks

Abstract: Encrypted traffic classification plays a vital role in cybersecurity as network traffic encryption becomes prevalent. First, we briefly introduce three traffic encryption mechanisms: IPsec, SSL/TLS, and SRTP. After evaluating the performances of support vector machine, random forest, naïve Bayes, and logistic regression for traffic classification, we propose the combined approach of entropy estimation and artificial neural networks. First, network traffic is classified as encrypted or plaintext with entropy es… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 28 publications
(8 citation statements)
references
References 21 publications
0
8
0
Order By: Relevance
“…Therefore, many scholars combine different evaluation methods to improve the defects of different evaluation methods. For example, Zhou et al (32) combined the entropy method with neural network in the evaluation; Li et al (33) combined the entropy method with TOPSIS; Zhong et al (34) combined the entropy method with the analytic hierarchy process; and Ming-Lang et al (35) used bibliometric analysis and fuzzy Delphi method. Because of the above analysis, this paper adopted the gray relational analysis method of entropy method.…”
Section: Methodsmentioning
confidence: 99%
“…Therefore, many scholars combine different evaluation methods to improve the defects of different evaluation methods. For example, Zhou et al (32) combined the entropy method with neural network in the evaluation; Li et al (33) combined the entropy method with TOPSIS; Zhong et al (34) combined the entropy method with the analytic hierarchy process; and Ming-Lang et al (35) used bibliometric analysis and fuzzy Delphi method. Because of the above analysis, this paper adopted the gray relational analysis method of entropy method.…”
Section: Methodsmentioning
confidence: 99%
“…In [154], Wang et al used entropy to classify traffic more deeply. In [156], Zhou et al, used entropy for evaluation of encrypted traffic classification. In Table 12, there is a summary of works about the use of entropy.…”
Section: ) Shannon Entropymentioning
confidence: 99%
“…Flow-behavior-based approaches enable encrypted traffic to be classified by leveraging the behavior statistics. The authors of [8] introduced three representative encryption mechanisms of traffic and extracted the statistics from the encrypted traffic. Moreover, they evaluated the performance of several machine-learning algorithms such as a support vector machine, random forest, naive Bayes, logistic regression, and neural networks.…”
Section: Related Work a Flow Behavior-based Traffic Classificationmentioning
confidence: 99%