IIT: Accurate Decentralized Application Identification Through Mining Intra- and Inter-Flow Relationships

IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS IEEE Transactions on Network and Service Management Pub Date : 2024-10-11 DOI:10.1109/TNSM.2024.3479150
Qianwei Meng;Qingjun Yuan;Weina Niu;Yongjuan Wang;Siqi Lu;Guangsong Li;Xiangbin Wang;Wenqi He
{"title":"IIT: Accurate Decentralized Application Identification Through Mining Intra- and Inter-Flow Relationships","authors":"Qianwei Meng;Qingjun Yuan;Weina Niu;Yongjuan Wang;Siqi Lu;Guangsong Li;Xiangbin Wang;Wenqi He","doi":"10.1109/TNSM.2024.3479150","DOIUrl":null,"url":null,"abstract":"Identifying Decentralized Applications (DApps) from encrypted network traffic plays an important role in areas such as network management and threat detection. However, DApps deployed on the same platform use the same encryption settings, resulting in DApps generating encrypted traffic with great similarity. In addition, existing flow-based methods only consider each flow as an isolated individual and feed it sequentially into the neural network for feature extraction, ignoring other rich information introduced between flows, and therefore the relationship between different flows is not effectively utilized. In this study, we propose a novel encrypted traffic classification model IIT to heterogeneously mine the potential features of intra- and inter-flows, which contain two types of encoders based on the multi-head self-attention mechanism. By combining the complementary intra- and inter-flow perspectives, the entire process of information flow can be more completely understood and described. IIT provides a more complete perspective on network flows, with the intra-flow perspective focusing on information transfer between different packets within a flow, and the inter-flow perspective placing more emphasis on information interaction between different flows. We captured 44 classes of DApps in the real world and evaluated the IIT model on two datasets, including DApps and malicious traffic classification tasks. The results demonstrate that the IIT model achieves a classification accuracy of greater than 97% on the real-world dataset of 44 DApps, outperforming other state-of-the-art methods. In addition, the IIT model exhibits good generalization in the malicious traffic classification task.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"22 1","pages":"394-408"},"PeriodicalIF":5.4000,"publicationDate":"2024-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Network and Service Management","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10714359/","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

Identifying Decentralized Applications (DApps) from encrypted network traffic plays an important role in areas such as network management and threat detection. However, DApps deployed on the same platform use the same encryption settings, resulting in DApps generating encrypted traffic with great similarity. In addition, existing flow-based methods only consider each flow as an isolated individual and feed it sequentially into the neural network for feature extraction, ignoring other rich information introduced between flows, and therefore the relationship between different flows is not effectively utilized. In this study, we propose a novel encrypted traffic classification model IIT to heterogeneously mine the potential features of intra- and inter-flows, which contain two types of encoders based on the multi-head self-attention mechanism. By combining the complementary intra- and inter-flow perspectives, the entire process of information flow can be more completely understood and described. IIT provides a more complete perspective on network flows, with the intra-flow perspective focusing on information transfer between different packets within a flow, and the inter-flow perspective placing more emphasis on information interaction between different flows. We captured 44 classes of DApps in the real world and evaluated the IIT model on two datasets, including DApps and malicious traffic classification tasks. The results demonstrate that the IIT model achieves a classification accuracy of greater than 97% on the real-world dataset of 44 DApps, outperforming other state-of-the-art methods. In addition, the IIT model exhibits good generalization in the malicious traffic classification task.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
IIT:通过挖掘流内和流间关系来准确地识别分散的应用程序
从加密网络流量中识别去中心化应用程序(DApps)在网络管理和威胁检测等领域发挥着重要作用。然而,部署在同一平台上的dapp使用相同的加密设置,导致dapp生成的加密流量非常相似。此外,现有的基于流的方法只将每个流作为一个孤立的个体,依次输入到神经网络中进行特征提取,忽略了流之间引入的其他丰富信息,因此不能有效地利用不同流之间的关系。在本研究中,我们提出了一种新的加密流量分类模型IIT来异构挖掘流内和流间的潜在特征,其中包含两种基于多头自关注机制的编码器。通过将互补的信息流内部和信息流之间的观点结合起来,可以更完整地理解和描述信息流的整个过程。IIT提供了更完整的网络流视角,流内视角关注流内不同数据包之间的信息传递,流间视角更强调不同流之间的信息交互。我们在现实世界中捕获了44类dapp,并在两个数据集上评估了IIT模型,包括dapp和恶意流量分类任务。结果表明,IIT模型在44个dapp的真实数据集上实现了超过97%的分类准确率,优于其他最先进的方法。此外,IIT模型在恶意流量分类任务中表现出良好的泛化性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
IEEE Transactions on Network and Service Management
IEEE Transactions on Network and Service Management Computer Science-Computer Networks and Communications
CiteScore
9.30
自引率
15.10%
发文量
325
期刊介绍: IEEE Transactions on Network and Service Management will publish (online only) peerreviewed archival quality papers that advance the state-of-the-art and practical applications of network and service management. Theoretical research contributions (presenting new concepts and techniques) and applied contributions (reporting on experiences and experiments with actual systems) will be encouraged. These transactions will focus on the key technical issues related to: Management Models, Architectures and Frameworks; Service Provisioning, Reliability and Quality Assurance; Management Functions; Enabling Technologies; Information and Communication Models; Policies; Applications and Case Studies; Emerging Technologies and Standards.
期刊最新文献
Entity-Level Autoregressive Relational Triple Extraction Toward Knowledge Graph Construction for Network Operation and Maintenance BiTrustChain: A Dual-Blockchain Empowered Dynamic Vehicle Trust Management for Malicious Detection in IoV A UAV-Aided Digital Twin Framework for IoT Networks With High Accuracy and Synchronization AI-Empowered Multivariate Probabilistic Forecasting: A Key Enabler for Sustainability in Open RAN Privacy-Preserving and Collusion-Resistant Data Query Scheme for Vehicular Platoons
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1