Higher Layers, Better Results: Application Layer Feature Engineering in Encrypted Traffic Classification

0Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Encrypted traffic has become the primary carrier of network transmission, and encrypted traffic classification is essential for advanced network management and security protection. Existing studies mainly focus on encrypted traffic feature engineering and classification model design, aiming to select more expressive features from encrypted traffic and achieve high-performance classification. The most commonly used features in the feature engineering process are statistical features and sequence features obtained in network or transport layers, which are more inclined to represent the factors of network transmission rather than the data attributes of applications or services. As a result, the relevance of the features and application or services is not strong, leading to unsatisfactory performance. To solve this problem, we introduce the Application Data Unit (ADU) and put forward the application layer feature engineering, which uses the features of the highest protocol level - the application layer to achieve better HTTPS classification. In order to compare the classification effects of features of different layers, we carried out experiments on traditional machine learning models based on statistical features and deep learning models based on sequence features, respectively. The results show that the proposed ADU features are better than the segment granularity features of the TLS layer and far better than the packet granularity features both in statistical and length sequence features. The average F1-score increase in the encrypted traffic application classification scenario is more than 10%.

Cite

CITATION STYLE

APA

Chen, Z., Cheng, G., Wei, Z., Xu, Z., Fu, N., & Zhou, Y. (2022). Higher Layers, Better Results: Application Layer Feature Engineering in Encrypted Traffic Classification. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 13472 LNCS, pp. 548–556). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-031-19214-2_46

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free