2018 18th International Symposium on Communications and Information Technologies (ISCIT) 2018
DOI: 10.1109/iscit.2018.8587975
|View full text |Cite
|
Sign up to set email alerts
|

Time Series Analysis for Encrypted Traffic Classification: A Deep Learning Approach

Abstract: We develop a novel time series feature extraction technique to address the encrypted application classification problem. The proposed method consists of two main steps. First, we propose a feature engineering technique to extract significant attributes of the encrypted network traffic behavior through analyzing the time series of receiving packets. In the second step, a deep learning technique is developed to exploit the advantage of time series data samples in providing the strong representation of the encryp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
14
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 26 publications
(14 citation statements)
references
References 15 publications
0
14
0
Order By: Relevance
“…However, each window contains only a single kind of traffic. Draper-Gil used k-Nearest Neighbor and decision tree predictors; Saber et al [26] used under-and over-sampling, PCA, SVMs; Lotfollahi et al [19] used stacked autoencoders and convolutional neural networks; and Vu et al [30] used LSTMs. The best models on this dataset achieve F1 scores up to 0.98 on the single-class prediction problem.…”
Section: Related Workmentioning
confidence: 99%
“…However, each window contains only a single kind of traffic. Draper-Gil used k-Nearest Neighbor and decision tree predictors; Saber et al [26] used under-and over-sampling, PCA, SVMs; Lotfollahi et al [19] used stacked autoencoders and convolutional neural networks; and Vu et al [30] used LSTMs. The best models on this dataset achieve F1 scores up to 0.98 on the single-class prediction problem.…”
Section: Related Workmentioning
confidence: 99%
“…The conventional ways of network traffic classification are flow based and payload-based methods [4]. The flow-based method utilizes statistical features of traffic flows.…”
Section: Introductionmentioning
confidence: 99%
“…Javaid et al [4] proposed a network intrusion detection scheme using sparse autoencoders (SAEs). Reference [5] used Long Short Term Memory (LSTM) to extract time series features between traffic groupings. However, the commonly used CNN, LSTM, and other methods improve the classification results while the problem of network computational complexity cannot be ignored.…”
Section: Introductionmentioning
confidence: 99%