An encrypted traffic classification method based on contrastive learning

Si Tian, Yating Gao, Guoquan Yuan, Ru Zhang, Jinmeng Zhao, Song Zhang
{"title":"An encrypted traffic classification method based on contrastive learning","authors":"Si Tian, Yating Gao, Guoquan Yuan, Ru Zhang, Jinmeng Zhao, Song Zhang","doi":"10.1145/3571662.3571678","DOIUrl":null,"url":null,"abstract":"Network traffic classification has become an important part of network management, which is conducive to realizing intelligent network operation and maintenance, improving network quality of service (QoS), and ensuring network security. With the rapid development of various applications and protocols, more and more encrypted traffic appears in the network. Due to the loss of semantic information after traffic encryption, poor content intelligibility, and difficulty in feature extraction, traditional detection methods are no longer applicable. Existing solutions mainly rely on the powerful feature self-learning ability of end-to-end deep neural networks to identify encrypted traffic. However, such methods are overly dependent on data size, and it has been experimentally proven that it is often difficult to achieve satisfactory results when validating across datasets. In order to solve this problem, this paper proposes an encrypted traffic identification method based on contrastive learning. First, the clustering method is used to expand the labeled data set. When the encrypted traffic features are difficult to extract, it is only necessary to learn the feature space to achieve discrimination.more suitable for encrypted traffic identification. When validating across datasets, only fine-tuning is required on a small amount of labeled data to achieve good recognition results. Compared with the end-to-end learning method, there is an improvement of about 5%. CCS CONCEPTS • Security and privacy • Network security • Security protocols","PeriodicalId":235407,"journal":{"name":"Proceedings of the 8th International Conference on Communication and Information Processing","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 8th International Conference on Communication and Information Processing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3571662.3571678","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Network traffic classification has become an important part of network management, which is conducive to realizing intelligent network operation and maintenance, improving network quality of service (QoS), and ensuring network security. With the rapid development of various applications and protocols, more and more encrypted traffic appears in the network. Due to the loss of semantic information after traffic encryption, poor content intelligibility, and difficulty in feature extraction, traditional detection methods are no longer applicable. Existing solutions mainly rely on the powerful feature self-learning ability of end-to-end deep neural networks to identify encrypted traffic. However, such methods are overly dependent on data size, and it has been experimentally proven that it is often difficult to achieve satisfactory results when validating across datasets. In order to solve this problem, this paper proposes an encrypted traffic identification method based on contrastive learning. First, the clustering method is used to expand the labeled data set. When the encrypted traffic features are difficult to extract, it is only necessary to learn the feature space to achieve discrimination.more suitable for encrypted traffic identification. When validating across datasets, only fine-tuning is required on a small amount of labeled data to achieve good recognition results. Compared with the end-to-end learning method, there is an improvement of about 5%. CCS CONCEPTS • Security and privacy • Network security • Security protocols
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于对比学习的加密流量分类方法
网络流分类已成为网络管理的重要组成部分,有利于实现网络运维智能化,提高网络服务质量(QoS),保障网络安全。随着各种应用和协议的快速发展,网络中出现了越来越多的加密流量。由于流量加密后语义信息丢失,内容可理解性差,特征提取困难,传统的检测方法已不再适用。现有的解决方案主要依靠端到端深度神经网络强大的特征自学习能力来识别加密流量。然而,这些方法过于依赖于数据的大小,并且实验证明,在跨数据集验证时,通常很难获得令人满意的结果。为了解决这一问题,本文提出了一种基于对比学习的加密流量识别方法。首先,采用聚类方法对标记数据集进行扩展。当加密流量特征难以提取时,只需要学习特征空间即可实现判别。更适合加密流量识别。当跨数据集进行验证时,只需要对少量标记数据进行微调就可以获得良好的识别结果。与端到端学习方法相比,提高了约5%。CCS概念•安全和隐私•网络安全•安全协议
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
MFFNet: Multi-Receptive Field Fusion Net for Microscope Steel Grain Grading An encrypted traffic classification method based on contrastive learning Hybrid Deep Learning CNN-Bidirectional LSTM and Manhattan Distance for Japanese Automated Short Answer Grading: Use case in Japanese Language Studies Distributed Learning based on Asynchronized Discriminator GAN for remote sensing image segmentation Spatial spectrum estimation algorithm of polarization sensitive array based on compensating spatial domain manifold matrix
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1