Detection of Virtual Private Network Traffic Using Machine Learning

Shane Miller, K. Curran, T. Lunney
{"title":"Detection of Virtual Private Network Traffic Using Machine Learning","authors":"Shane Miller, K. Curran, T. Lunney","doi":"10.4018/ijwnbt.2020070104","DOIUrl":null,"url":null,"abstract":"The detection of unauthorized users can be problematic for techniques that are available at present if the nefarious actors are using identity hiding tools such as anonymising proxies or virtual private networks (VPNs). This work presents computational models to address the limitations currently experienced in detecting VPN traffic. A model to detect usage of VPNs was developed using a multi-layered perceptron neural network that was trained using flow statistics data found in the transmission control protocol (TCP) header of captured network packets. Validation testing showed that the presented models are capable of classifying network traffic in a binary manner as direct (originating directly from a user's own device) or indirect (makes use of identity and location hiding features of VPNs) with high degrees of accuracy. The experiments conducted to classify OpenVPN usage found that the neural network was able to correctly identify the VPN traffic with an overall accuracy of 93.71%. The further work done to classify Stunnel OpenVPN usage found that the Neural Network was able to correctly identify VPN traffic with an overall accuracy of 97.82% accuracy when using 10-fold cross validation. This final experiment also provided an observation of 3 different validation techniques and the different accuracy results obtained. These results demonstrate a significant advancement in the detection of unauthorised user access with evidence showing that there could be further advances for research in this field particularly in the application of business security where the detection of VPN usage is important to an organization.","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"63 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Int. J. Wirel. Networks Broadband Technol.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4018/ijwnbt.2020070104","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 9

Abstract

The detection of unauthorized users can be problematic for techniques that are available at present if the nefarious actors are using identity hiding tools such as anonymising proxies or virtual private networks (VPNs). This work presents computational models to address the limitations currently experienced in detecting VPN traffic. A model to detect usage of VPNs was developed using a multi-layered perceptron neural network that was trained using flow statistics data found in the transmission control protocol (TCP) header of captured network packets. Validation testing showed that the presented models are capable of classifying network traffic in a binary manner as direct (originating directly from a user's own device) or indirect (makes use of identity and location hiding features of VPNs) with high degrees of accuracy. The experiments conducted to classify OpenVPN usage found that the neural network was able to correctly identify the VPN traffic with an overall accuracy of 93.71%. The further work done to classify Stunnel OpenVPN usage found that the Neural Network was able to correctly identify VPN traffic with an overall accuracy of 97.82% accuracy when using 10-fold cross validation. This final experiment also provided an observation of 3 different validation techniques and the different accuracy results obtained. These results demonstrate a significant advancement in the detection of unauthorised user access with evidence showing that there could be further advances for research in this field particularly in the application of business security where the detection of VPN usage is important to an organization.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
利用机器学习检测虚拟专用网流量
如果恶意行为者使用匿名代理或虚拟专用网络(vpn)等身份隐藏工具,那么检测未经授权的用户对于目前可用的技术来说可能会有问题。这项工作提出了计算模型,以解决目前在检测VPN流量方面遇到的限制。使用多层感知器神经网络开发了一个检测vpn使用情况的模型,该网络使用捕获网络数据包的传输控制协议(TCP)头中发现的流量统计数据进行训练。验证测试表明,所提出的模型能够以二进制方式将网络流量分类为直接(直接来自用户自己的设备)或间接(利用vpn的身份和位置隐藏特征),并具有很高的准确性。对OpenVPN使用情况进行分类的实验发现,神经网络能够正确识别VPN流量,总体准确率为93.71%。对Stunnel OpenVPN使用情况进行分类的进一步工作发现,当使用10倍交叉验证时,神经网络能够正确识别VPN流量,总体准确率为97.82%。最后的实验还提供了3种不同的验证技术和不同的精度结果的观察。这些结果表明,在检测未经授权的用户访问方面取得了重大进展,有证据表明,在这一领域的研究可能会有进一步的进展,特别是在检测VPN使用情况对组织很重要的商业安全应用方面。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Overload Detection and Energy Conserving Routing Protocol for Underwater Acoustic Communication Wireless Interference Analysis for Home IoT Security Vulnerability Detection A Dynamic Model for Quality of Service Evaluation of Heterogeneous Networks A Binary Search Algorithm to Determine the Minimum Transmission Range for Minimum Connected Dominating Set of a Threshold Size in Ad Hoc Networks A Resource-Efficient Approach on User Association in 5G Networks Using Downlink and Uplink Decoupling
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1