Residential Collegefalse
Status已發表Published
PEAN: A Packet-level End-to-end Attentive Network for Encrypted Traffic Identification
Lin, Peng1,2; Hu, Yishen1; Lin, Yanying1,2; Ye, Kejiang1; Xu, Cheng Zhong3
2022
Conference Name23rd IEEE International Conference on High Performance Computing and Communications, 7th IEEE International Conference on Data Science and Systems, 19th IEEE International Conference on Smart City and 7th IEEE International Conference on Dependability in Sensor, Cloud and Big Data Systems and Applications, HPCC-DSS-SmartCity-DependSys 2021
Source Publication2021 IEEE 23rd International Conference on High Performance Computing and Communications, 7th International Conference on Data Science and Systems, 19th International Conference on Smart City and 7th International Conference on Dependability in Sensor, Cloud and Big Data Systems and Applications, HPCC-DSS-SmartCity-DependSys 2021
Pages267-274
Conference Date2021/12/20-2021/12/22
Conference PlaceHaikou, Hainan, China
Abstract

Encrypted traffic identification is important to maintain the cybersecurity. Recently, as the SSL/TLS encryption protocols are widely used in modern Internet environment, how to identify the encrypted traffic become a big challenge. The traditional payload-based methods are usually used to identify the unencrypted traffic, but is no longer effective for the encrypted traffic. To solve the enrypted traffic identification problem, researchers tried to use machine learning methods to model the flow features of encrypted traffics and have made some progress. However the identification accuracy is still not high as these methods usually use the high-level hand-designed features which may loss a lot of important information. To overcome this limitation, in this paper, we design PEAN - a Packet-level End-to-end Attentive Network for encrypted traffic identification. PEAN uses the information such as raw bytes and length sequence as the model input rather than using the traditional hand-designed features. Then, we use an unsupervised network traffic pre-training model to better model the traffic bytes. A self-attention mechanism is also designed to better learn the deep relationship among traffic packets. Experiments on a real trace set demonstrate the effectiveness of PEAN.

KeywordCyber Security Encrypted Traffic Identification Traffic Classification
DOI10.1109/HPCC-DSS-SmartCity-DependSys53884.2021.00061
URLView the original
Language英語English
Scopus ID2-s2.0-85132415764
Fulltext Access
Citation statistics
Document TypeConference paper
CollectionTHE STATE KEY LABORATORY OF INTERNET OF THINGS FOR SMART CITY (UNIVERSITY OF MACAU)
Faculty of Science and Technology
Affiliation1.Shenzhen Institute of Advanced Technology, Chinese Academy of Sciences, China
2.University of Chinese Academy of Sciences, China
3.University of Macau, Faculty of Science and Technology, State Key Lab of IoTSC, Macao
Recommended Citation
GB/T 7714
Lin, Peng,Hu, Yishen,Lin, Yanying,et al. PEAN: A Packet-level End-to-end Attentive Network for Encrypted Traffic Identification[C], 2022, 267-274.
APA Lin, Peng., Hu, Yishen., Lin, Yanying., Ye, Kejiang., & Xu, Cheng Zhong (2022). PEAN: A Packet-level End-to-end Attentive Network for Encrypted Traffic Identification. 2021 IEEE 23rd International Conference on High Performance Computing and Communications, 7th International Conference on Data Science and Systems, 19th International Conference on Smart City and 7th International Conference on Dependability in Sensor, Cloud and Big Data Systems and Applications, HPCC-DSS-SmartCity-DependSys 2021, 267-274.
Files in This Item:
There are no files associated with this item.
Related Services
Recommend this item
Bookmark
Usage statistics
Export to Endnote
Google Scholar
Similar articles in Google Scholar
[Lin, Peng]'s Articles
[Hu, Yishen]'s Articles
[Lin, Yanying]'s Articles
Baidu academic
Similar articles in Baidu academic
[Lin, Peng]'s Articles
[Hu, Yishen]'s Articles
[Lin, Yanying]'s Articles
Bing Scholar
Similar articles in Bing Scholar
[Lin, Peng]'s Articles
[Hu, Yishen]'s Articles
[Lin, Yanying]'s Articles
Terms of Use
No data!
Social Bookmark/Share
All comments (0)
No comment.
 

Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.