VoIP Traffic Detection in Tunneled and Anonymous Networks Using Deep Learning

نویسندگان

چکیده

Network management is facing a great challenge to analyze and identify encrypted network traffic with specific applications protocols. A significant number of users applying different encryption techniques services hide the true nature communication. These challenges attract community improve security enhance service quality. managers need novel cope failure shortcomings port-based payload-based classification methods due emergent technologies. Mainly, famous hopping mechanisms used make unknown anonymous are VPN (virtual private network) TOR (Onion Router). This paper presents scheme unveil easily tunneled traffic. The proposed identification uses highly desirable deep learning efficiently extract Voice over IP (VoIP) Non VoIP ones within flows. Finally, captured has been classified into four categories, i-e., VoIP, Non-VoIP, Non-VoIP. experimental results show that our engine extremely robust

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Detecting Overlapping Communities in Social Networks using Deep Learning

In network analysis, a community is typically considered of as a group of nodes with a great density of edges among themselves and a low density of edges relative to other network parts. Detecting a community structure is important in any network analysis task, especially for revealing patterns between specified nodes. There is a variety of approaches presented in the literature for overlapping...

متن کامل

Concept drift detection in business process logs using deep learning

Process mining provides a bridge between process modeling and analysis on the one hand and data mining on the other hand. Process mining aims at discovering, monitoring, and improving real processes by extracting knowledge from event logs. However, as most business processes change over time (e.g. the effects of new legislation, seasonal effects and etc.), traditional process mining techniques ...

متن کامل

fault location in power distribution networks using matching algorithm

چکیده رساله/پایان نامه : تاکنون روش‏های متعددی در ارتباط با مکان یابی خطا در شبکه انتقال ارائه شده است. استفاده مستقیم از این روش‏ها در شبکه توزیع به دلایلی همچون وجود انشعاب‏های متعدد، غیر یکنواختی فیدرها (خطوط کابلی، خطوط هوایی، سطح مقطع متفاوت انشعاب ها و تنه اصلی فیدر)، نامتعادلی (عدم جابجا شدگی خطوط، بارهای تک‏فاز و سه فاز)، ثابت نبودن بار و اندازه گیری مقادیر ولتاژ و جریان فقط در ابتدای...

Analysis of VOIP Traffic over WiMAX Networks

VoIP applications are being broadly employed in present networks challenging their abilities to offer a experience level of good quality to the users. Specially, new wireless broadband techniques i.e. WiMAX, deployed and their performance requires to assess for checking the performance levels of VoIP services. The Quality of Service is the primary challenge of implementation VOIP over WiMAX net...

متن کامل

Traffic Prediction using a Deep Learning Paradigm

For many years intelligent transportation systems (ITS) have been collecting and processing huge amounts of data from numerous sensors to generate a ground truth of urban traffic. Such data has set the foundation of traffic theory, planning and simulation to create rule-based systems. It has also been used in many different studies in data-driven short-term traffic flow forecasting with promisi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2021

ISSN: ['2169-3536']

DOI: https://doi.org/10.1109/access.2021.3073967