Certificate-aware encrypted traffic classification using Second-Order Markov Chain

Meng Shen, Mingwei Wei, Liehuang Zhu*, Mingzhong Wang, Fuliang Li

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

46 Citations (Scopus)

Abstract

With the prosperity of network applications, traffic classification serves as a crucial role in network management and malicious attack detection. The widely used encryption transmission protocols, such as the Secure Socket Layer/Transport Layer Security (SSL/TLS) protocols, leads to the failure of traditional payload-based classification methods. Existing methods for encrypted traffic classification suffer from low accuracy. In this paper, we propose a certificate-aware encrypted traffic classification method based on the Second-Order Markov Chain. We start by exploring reasons why existing methods not perform well, and make a novel observation that certificate packet length in SSL/TLS sessions contributes to application discrimination. To increase the diversity of application fingerprints, we develop a new model by incorporating the certificate packet length clustering into the Second-Order homogeneous Markov chains. Extensive evaluation results show that the proposed method lead to a 30% improvement on average compared with the state-of-the-art method, in terms of classification accuracy.

Original languageEnglish
Title of host publication2016 IEEE/ACM 24th International Symposium on Quality of Service, IWQoS 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781509026340
DOIs
Publication statusPublished - 13 Oct 2016
Event24th IEEE/ACM International Symposium on Quality of Service, IWQoS 2016 - Beijing, China
Duration: 20 Jun 201621 Jun 2016

Publication series

Name2016 IEEE/ACM 24th International Symposium on Quality of Service, IWQoS 2016

Conference

Conference24th IEEE/ACM International Symposium on Quality of Service, IWQoS 2016
Country/TerritoryChina
CityBeijing
Period20/06/1621/06/16

Fingerprint

Dive into the research topics of 'Certificate-aware encrypted traffic classification using Second-Order Markov Chain'. Together they form a unique fingerprint.

Cite this