2021
DOI: 10.1109/access.2021.3073967
|View full text |Cite
|
Sign up to set email alerts
|

VoIP Traffic Detection in Tunneled and Anonymous Networks Using Deep Learning

Abstract: Network management is facing a great challenge to analyze and identify encrypted network traffic with specific applications and protocols. A significant number of network users applying different encryption techniques to network applications and services to hide the true nature of the network communication. These challenges attract the network community to improve network security and enhance network service quality. Network managers need novel techniques to cope with the failure and shortcomings of the port-b… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1
1

Relationship

2
6

Authors

Journals

citations
Cited by 22 publications
(11 citation statements)
references
References 62 publications
0
10
0
1
Order By: Relevance
“…The accuracy rate reached 98% in the test on the ISCX-VPN-2016 [19] dataset. To analyze VoIP traffic in tunneled and anonymous networks, the captured raw traffic is preprocessed based on the feature engineering of FSTFs [20], and then a hybrid deep learning model (MLP, 1D-CNN, and LSTM) is used for classification, which can classify traffic data into four categories: VPN VoIP, VPN Non-VoIP, TOR VoIP, and TOR Non-VoIP, and the classification accuracy can exceed 94%. In addition, experiments in work [21] show that the attention mechanism [22] can help the deep learning model focus on the more critical information in encrypted traffic and ignore the noise that is meaningless to the detection task, which can further improve the detection effect of the model.…”
Section: Deep Learning Based Detection Methodsmentioning
confidence: 99%
“…The accuracy rate reached 98% in the test on the ISCX-VPN-2016 [19] dataset. To analyze VoIP traffic in tunneled and anonymous networks, the captured raw traffic is preprocessed based on the feature engineering of FSTFs [20], and then a hybrid deep learning model (MLP, 1D-CNN, and LSTM) is used for classification, which can classify traffic data into four categories: VPN VoIP, VPN Non-VoIP, TOR VoIP, and TOR Non-VoIP, and the classification accuracy can exceed 94%. In addition, experiments in work [21] show that the attention mechanism [22] can help the deep learning model focus on the more critical information in encrypted traffic and ignore the noise that is meaningless to the detection task, which can further improve the detection effect of the model.…”
Section: Deep Learning Based Detection Methodsmentioning
confidence: 99%
“…Port‐based and deep packet inspection‐based techniques were employed to classify the network traffic in the past. However, these methods are invalidated due to the emergence of obfuscation techniques such as the usage of random ports and payload encryption [13]. Therefore, researchers introduced statistical‐based classification techniques to fulfil the requirement of network security for intelligent identification of different network applications and protocols.…”
Section: Related Workmentioning
confidence: 99%
“…The widely used, traditional inspection methods are mainly categorised into two sections; such as deep packet-based [4][5][6][7] and port-based [8,9]. These early detection procedures failed to recognise the network traffic accurately due to the implementation of the encryption protocols, such as Secure Sockets layer (SSL) and Transport Security Layer (TLS) and the usage of non-standard ports [10][11][12][13]. Machine learning techniques overcome the failure of payload-based classification and port-based classification techniques.…”
Section: Introductionmentioning
confidence: 99%
“…These countries have enforced laws making VPN use on phones illegal, accompanied by severe fines and potential imprisonment. Such measures underscore the increasing focus on VPN usage globally, particularly when they are employed to circumvent geo-restrictions and access blocked content, raising significant issues regarding cybersecurity and national security [1][2][3].…”
Section: Introductionmentioning
confidence: 99%