Publication | Closed Access
Comparisons of Machine Learning Algorithms for Application Identification of Encrypted Traffic
32
Citations
6
References
2011
Year
Unknown Venue
Application IdentificationInternet Traffic AnalysisEngineeringEncrypted TrafficInformation SecurityMachine Learning AlgorithmsInformation ForensicsNetwork OperatorsHardware SecurityData SciencePattern RecognitionNetwork ManagementNetwork SecurityIntrusion Detection SystemComputer ScienceTraffic MonitoringNetwork ForensicsData SecurityCryptographyNetwork Traffic Measurement
Application identification assists network operators effectively on many tasks regarding network management such as controlling bandwidth or securing traffic from others. However, encryption is one of the factors to make application identification difficult, because it is so hard to infer the original (unencrypted) packets from encrypted packets. As a result, the accuracy of application identification is getting worse as the increase of encrypted traffic. In this paper, we propose a method to increase the accuracy of application identification whatever the traffic is encrypted or not. We propose EFM (Estimated Features Method) and investigate how three different supervised machine learning algorithms (Support Vector Machine, Naive Bayes Kernel Estimation, and C4.5 decision tree) affect the accuracy of identification. Our results show that EFM using SVM is able to provide overall accuracy 97.2% for encrypted traffic.
| Year | Citations | |
|---|---|---|
Page 1
Page 1