VoIP Traffic Detection in Tunneled and Anonymous Networks Using Deep Learning
نویسندگان
چکیده
Network management is facing a great challenge to analyze and identify encrypted network traffic with specific applications protocols. A significant number of users applying different encryption techniques services hide the true nature communication. These challenges attract community improve security enhance service quality. managers need novel cope failure shortcomings port-based payload-based classification methods due emergent technologies. Mainly, famous hopping mechanisms used make unknown anonymous are VPN (virtual private network) TOR (Onion Router). This paper presents scheme unveil easily tunneled traffic. The proposed identification uses highly desirable deep learning efficiently extract Voice over IP (VoIP) Non VoIP ones within flows. Finally, captured has been classified into four categories, i-e., VoIP, Non-VoIP, Non-VoIP. experimental results show that our engine extremely robust
منابع مشابه
Detecting Overlapping Communities in Social Networks using Deep Learning
In network analysis, a community is typically considered of as a group of nodes with a great density of edges among themselves and a low density of edges relative to other network parts. Detecting a community structure is important in any network analysis task, especially for revealing patterns between specified nodes. There is a variety of approaches presented in the literature for overlapping...
متن کاملConcept drift detection in business process logs using deep learning
Process mining provides a bridge between process modeling and analysis on the one hand and data mining on the other hand. Process mining aims at discovering, monitoring, and improving real processes by extracting knowledge from event logs. However, as most business processes change over time (e.g. the effects of new legislation, seasonal effects and etc.), traditional process mining techniques ...
متن کاملfault location in power distribution networks using matching algorithm
چکیده رساله/پایان نامه : تاکنون روشهای متعددی در ارتباط با مکان یابی خطا در شبکه انتقال ارائه شده است. استفاده مستقیم از این روشها در شبکه توزیع به دلایلی همچون وجود انشعابهای متعدد، غیر یکنواختی فیدرها (خطوط کابلی، خطوط هوایی، سطح مقطع متفاوت انشعاب ها و تنه اصلی فیدر)، نامتعادلی (عدم جابجا شدگی خطوط، بارهای تکفاز و سه فاز)، ثابت نبودن بار و اندازه گیری مقادیر ولتاژ و جریان فقط در ابتدای...
Analysis of VOIP Traffic over WiMAX Networks
VoIP applications are being broadly employed in present networks challenging their abilities to offer a experience level of good quality to the users. Specially, new wireless broadband techniques i.e. WiMAX, deployed and their performance requires to assess for checking the performance levels of VoIP services. The Quality of Service is the primary challenge of implementation VOIP over WiMAX net...
متن کاملTraffic Prediction using a Deep Learning Paradigm
For many years intelligent transportation systems (ITS) have been collecting and processing huge amounts of data from numerous sensors to generate a ground truth of urban traffic. Such data has set the foundation of traffic theory, planning and simulation to create rule-based systems. It has also been used in many different studies in data-driven short-term traffic flow forecasting with promisi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2021
ISSN: ['2169-3536']
DOI: https://doi.org/10.1109/access.2021.3073967