BFCN: A Novel Classification Method of Encrypted Traffic Based on BERT and CNN

نویسندگان

چکیده

With the speedy advancement of encryption technology and exponential increase in applications, network traffic classification has become an increasingly important research topic. Existing methods for classifying encrypted have certain limitations. For example, traditional approaches such as machine learning rely heavily on feature engineering, deep are susceptible to amount distribution labeled data, pretrained models focus merely global features while ignoring local features. To solve above problem, we propose a BERT-based byte-level convolutional (BFCN) model consisting two novel modules. The first is packet encoder module, which use BERT capture through its attention mechanism; second CNN captures operations. packet-level concatenated traffic’s final representation, can better represent traffic. Our approach achieves state-of-the-art performance publicly available ISCX-VPN dataset service application identification task, achieving F1 scores 99.11% 99.41%, respectively, these tasks. experimental results demonstrate that our method further improves classification.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Classification of encrypted traffic for applications based on statistical features

Traffic classification plays an important role in many aspects of network management such as identifying type of the transferred data, detection of malware applications, applying policies to restrict network accesses and so on. Basic methods in this field were using some obvious traffic features like port number and protocol type to classify the traffic type. However, recent changes in applicat...

متن کامل

Encrypted Internet Traffic Classification Method based on Host Behavior

Accurate network traffic classification plays important roles in many areas such as traffic engineering, QoS and intrusion detection etc. Encrypted Peer-to-Peer (P2P) applications have dramatically grown in popularity over the past few years, and now constitute a significant share of the total traffic in many networks. To solve the drawback of the previous classification scheme for encrypted ne...

متن کامل

wuthering heights and the concept of marality/a sociological study of the novel

to discuss my point, i have collected quite a number of articles, anthologies, and books about "wuthering heights" applying various ideas and theories to this fantastic story. hence, i have come to believe that gadamer and jauss are rightful when they claim that "the individaul human mind is the center and origin of all meaning," 3 that reading literature is a reader-oriented activity, that it ...

15 صفحه اول

on the practicality and effectiveness of a personalized eclectic method incorporated into iranian high school efl syllabus

همگام با سرعت در حال رشد خلاقیت و نوآوری های آموزش زبان به ویژه ظهور روش ارتباطی آموزش زبان? بسیاری از مدارس زبان با بازاندیشی آموزش و پرورش خود? برای گنجاندن فعالیت های ارتباطی، وزمینه ی شخصی سازی شده به شیوه های سنتی خود به روز رسانی شده اند. با این حال، مدارس ایرانی در این زمینه آهسته پیش رفته اند. از این رو، هدف عمده ی پژوهش حاضر برداشتن یک گام در پر کردن شکاف بین نظریه های آموزشی نو ظهور و...

15 صفحه اول

A survey of methods for encrypted traffic classification and analysis

With the widespread use of encrypted data transport network traffic encryption is becoming a standard nowadays. This presents a challenge for traffic measurement, especially for analysis and anomaly detection methods which are dependent on the type of network traffic. In this paper, we survey existing approaches for classification and analysis of encrypted traffic. First, we describe the most w...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Electronics

سال: 2023

ISSN: ['2079-9292']

DOI: https://doi.org/10.3390/electronics12030516