BFCN: A Novel Classification Method of Encrypted Traffic Based on BERT and CNN
نویسندگان
چکیده
With the speedy advancement of encryption technology and exponential increase in applications, network traffic classification has become an increasingly important research topic. Existing methods for classifying encrypted have certain limitations. For example, traditional approaches such as machine learning rely heavily on feature engineering, deep are susceptible to amount distribution labeled data, pretrained models focus merely global features while ignoring local features. To solve above problem, we propose a BERT-based byte-level convolutional (BFCN) model consisting two novel modules. The first is packet encoder module, which use BERT capture through its attention mechanism; second CNN captures operations. packet-level concatenated traffic’s final representation, can better represent traffic. Our approach achieves state-of-the-art performance publicly available ISCX-VPN dataset service application identification task, achieving F1 scores 99.11% 99.41%, respectively, these tasks. experimental results demonstrate that our method further improves classification.
منابع مشابه
Classification of encrypted traffic for applications based on statistical features
Traffic classification plays an important role in many aspects of network management such as identifying type of the transferred data, detection of malware applications, applying policies to restrict network accesses and so on. Basic methods in this field were using some obvious traffic features like port number and protocol type to classify the traffic type. However, recent changes in applicat...
متن کاملEncrypted Internet Traffic Classification Method based on Host Behavior
Accurate network traffic classification plays important roles in many areas such as traffic engineering, QoS and intrusion detection etc. Encrypted Peer-to-Peer (P2P) applications have dramatically grown in popularity over the past few years, and now constitute a significant share of the total traffic in many networks. To solve the drawback of the previous classification scheme for encrypted ne...
متن کاملwuthering heights and the concept of marality/a sociological study of the novel
to discuss my point, i have collected quite a number of articles, anthologies, and books about "wuthering heights" applying various ideas and theories to this fantastic story. hence, i have come to believe that gadamer and jauss are rightful when they claim that "the individaul human mind is the center and origin of all meaning," 3 that reading literature is a reader-oriented activity, that it ...
15 صفحه اولon the practicality and effectiveness of a personalized eclectic method incorporated into iranian high school efl syllabus
همگام با سرعت در حال رشد خلاقیت و نوآوری های آموزش زبان به ویژه ظهور روش ارتباطی آموزش زبان? بسیاری از مدارس زبان با بازاندیشی آموزش و پرورش خود? برای گنجاندن فعالیت های ارتباطی، وزمینه ی شخصی سازی شده به شیوه های سنتی خود به روز رسانی شده اند. با این حال، مدارس ایرانی در این زمینه آهسته پیش رفته اند. از این رو، هدف عمده ی پژوهش حاضر برداشتن یک گام در پر کردن شکاف بین نظریه های آموزشی نو ظهور و...
15 صفحه اولA survey of methods for encrypted traffic classification and analysis
With the widespread use of encrypted data transport network traffic encryption is becoming a standard nowadays. This presents a challenge for traffic measurement, especially for analysis and anomaly detection methods which are dependent on the type of network traffic. In this paper, we survey existing approaches for classification and analysis of encrypted traffic. First, we describe the most w...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Electronics
سال: 2023
ISSN: ['2079-9292']
DOI: https://doi.org/10.3390/electronics12030516