Enhanced Encrypted Traffic Analysis Leveraging Graph Neural Networks and Optimized Feature Dimensionality Reduction

被引:0
|
作者
Jung, In-Su [1 ]
Song, Yu-Rae [1 ]
Jilcha, Lelisa Adeba [2 ]
Kim, Deuk-Hun [3 ]
Im, Sun-Young [4 ]
Shim, Shin-Woo [4 ]
Kim, Young-Hwan [4 ]
Kwak, Jin [5 ]
机构
[1] Ajou Univ, Dept Cyber Secur, ISAA Lab, Suwon 16499, South Korea
[2] Ajou Univ, Dept AI Convergence Network, ISAA Lab, Suwon 16499, South Korea
[3] Ajou Univ, ISAA Lab, Inst Comp & Informat Res, Suwon 16499, South Korea
[4] LIG Nex1, Seongnam 13488, South Korea
[5] Ajou Univ, Dept Cyber Secur, Suwon 16499, South Korea
来源
SYMMETRY-BASEL | 2024年 / 16卷 / 06期
关键词
encrypted traffic analysis (ETA); graph neural network (GNN); GraphSAGE; network traffic classification; metadata; optimized feature dimensionality reduction; CLASSIFICATION;
D O I
10.3390/sym16060733
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
With the continuously growing requirement for encryption in network environments, web browsers are increasingly employing hypertext transfer protocol security. Despite the increase in encrypted malicious network traffic, the encryption itself limits the data accessible for analyzing such behavior. To mitigate this, several studies have examined encrypted network traffic by analyzing metadata and payload bytes. Recent studies have furthered this approach, utilizing graph neural networks to analyze the structural data patterns within malicious encrypted traffic. This study proposed an enhanced encrypted traffic analysis leveraging graph neural networks which can model the symmetric or asymmetric spatial relations between nodes in the traffic network and optimized feature dimensionality reduction. It classified malicious network traffic by leveraging key features, including the IP address, port, CipherSuite, MessageLen, and JA3 features within the transport-layer-security session data, and then analyzed the correlation between normal and malicious network traffic data. The proposed approach outperformed previous models in terms of efficiency, using fewer features while maintaining a high accuracy rate of 99.5%. This demonstrates its research value as it can classify malicious network traffic with a high accuracy based on fewer features.
引用
收藏
页数:21
相关论文
共 50 条
  • [41] Dimensionality Reduction for the Feature System in Classification of Hyperspectral Earth Remote Sensing Data by Use of Neural Networks
    Kozik, V., I
    Nezhevenko, E. S.
    OPTOELECTRONICS INSTRUMENTATION AND DATA PROCESSING, 2022, 58 (01) : 1 - 7
  • [42] Feature Selection Graph Neural Network for Optimized Node Categorization
    Preethaa, K. R. Sri
    Wadhwa, Gitanjali
    Natarajan, Yuvaraj
    Paul, Anand
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 70 (01) : 2872 - 2883
  • [43] Semisupervised Graph Neural Networks for Traffic Classification in Edge Networks
    Yang, Yang
    Lyu, Rui
    Gao, Zhipeng
    Rui, Lanlan
    Yan, Yu
    DISCRETE DYNAMICS IN NATURE AND SOCIETY, 2023, 2023
  • [44] Leveraging graph neural networks for point-of-interest recommendations
    Zhang, Jiyong
    Liu, Xin
    Zhou, Xiaofei
    Chu, Xiaowen
    NEUROCOMPUTING, 2021, 462 : 1 - 13
  • [45] Leveraging graph neural networks for supporting automatic triage of patients
    Defilippo, Annamaria
    Veltri, Pierangelo
    Lio, Pietro
    Guzzi, Pietro Hiram
    SCIENTIFIC REPORTS, 2024, 14 (01):
  • [46] Automated Physical Design Watermarking Leveraging Graph Neural Networks
    Zhang, Ruisi
    Selina, Rachel
    Pan, David Z.
    Koushan, Farinaz
    PROCEEDINGS OF THE 2024 ACM/IEEE INTERNATIONAL SYMPOSIUM ON MACHINE LEARNING FOR CAD, MLCAD 2024, 2024,
  • [47] Leveraging Transformer and Graph Neural Networks for Variable Misuse Detection
    Romanov, Vitaly
    Dlamini, Gcinizwe
    Valeev, Aidar
    Ivanov, Vladimir
    PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON EVALUATION OF NOVEL APPROACHES TO SOFTWARE ENGINEERING, ENASE 2023, 2023, : 727 - 733
  • [48] TB-Graph: Enhancing Encrypted Malicious Traffic Classification through Relational Graph Attention Networks
    Liu, Ming
    Yang, Qichao
    Wang, Wenqing
    Liu, Shengli
    CMC-COMPUTERS MATERIALS & CONTINUA, 2025, 82 (02): : 2985 - 3004
  • [49] Dimensionality-Reduction Methods for the Analysis of Web Traffic
    Basurto, Nuno
    Michelena, Alvaro
    Urda, Daniel
    Quintian, Hector
    Luis Calvo-Rolle, Jose
    Herrero, Alvaro
    INTERNATIONAL JOINT CONFERENCE 15TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE IN SECURITY FOR INFORMATION SYSTEMS (CISIS 2022) 13TH INTERNATIONAL CONFERENCE ON EUROPEAN TRANSNATIONAL EDUCATION (ICEUTE 2022), 2023, 532 : 62 - 72
  • [50] Flow Interaction Graph Analysis: Unknown Encrypted Malicious Traffic Detection
    Fu, Chuanpu
    Li, Qi
    Xu, Ke
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2024, 32 (04) : 2972 - 2987