Characterization of Encrypted and VPN Traffic using Time-related Features

نویسندگان

  • Gerard Draper-Gil
  • Arash Habibi Lashkari
  • Mohammad Saiful Islam Mamun
  • Ali A. Ghorbani
چکیده

• Our classifiers perform better when the flows are generated using shorter timeout values, which contradicts the common assumption of using 600 ms as timeout duration. • Future work: we plan to expand our work to other applications and types of encrypted traffic, and to further study the application of time-based features to characterize encrypted traffic. FEATURE DESCRIPTION dura&on Dura&on of the flow fiat Forward Inter Arrival Time (mean, std, max, min) biat Backward Inter Arrival Time (mean, std, max, min) flowiat Flow Inter Arrival Time (mean, std, max, min) ac&ve The amount of &me a flow was ac&ve (mean, std, max, min). idle The amount of &me a flow was idle (mean, std, max, min) C_psec Flow Bytes per second fp_psec Flow Packets per second • Flow set of packets sharing: {source IP, source port, des&na&on IP, des&na&on port , Protocol}

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Classification of encrypted traffic for applications based on statistical features

Traffic classification plays an important role in many aspects of network management such as identifying type of the transferred data, detection of malware applications, applying policies to restrict network accesses and so on. Basic methods in this field were using some obvious traffic features like port number and protocol type to classify the traffic type. However, recent changes in applicat...

متن کامل

Deep Packet: A Novel Approach For Encrypted Traffic Classification Using Deep Learning

Network traffic classification has become significantly important with rapid growth of current Internet network and online applications. There have been numerous studies on this topic which have led to many different approaches. Most of these approaches use predefined features extracted by an expert in order to classify network traffic. In contrast, in this study, we propose a deep learning bas...

متن کامل

Vik Tor Goh - Intrusion Detection Framework for Encrypted Networks

Network-based Intrusion Detection Systems (NIDSs) monitor network traffic for signs of malicious activities that have the potential to disrupt entire network infrastructures and services. NIDS can only operate when the network traffic is available and can be extracted for analysis. However, with the growing use of encrypted networks such as Virtual Private Networks (VPNs) that encrypt and conce...

متن کامل

Real Time Identification of SSH Encrypted Application Flows by Using Cluster Analysis Techniques

The identification of application flows is a critical task in order to manage bandwidth requirements of different kind of services (i.e. VOIP, Video, ERP). As network security functions spread, an increasing amount of traffic is natively encrypted due to privacy issues (e.g. VPN). This makes ineffective current traffic classification systems based on ports and payload inspection, e.g. even powe...

متن کامل

Leveraging an Open Source VPN Technology to End User

Virtual Private Network (VPN) can be implemented by corporate and public user in a few methods. The methods included proprietary or open source solutions. It has shown great potential due to its encrypted traffic flow which gives it a secure environment. With a good reception of internet in Malaysia it is unfortunate that the major Internet Service Providers (ISPs) have imposed packet filtering...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016