Alert button
Picture for Tomáš Čejka

Tomáš Čejka

Alert button

Network Traffic Classification based on Single Flow Time Series Analysis

Jul 25, 2023
Josef Koumar, Karel Hynek, Tomáš Čejka

Figure 1 for Network Traffic Classification based on Single Flow Time Series Analysis
Figure 2 for Network Traffic Classification based on Single Flow Time Series Analysis
Figure 3 for Network Traffic Classification based on Single Flow Time Series Analysis
Figure 4 for Network Traffic Classification based on Single Flow Time Series Analysis

Network traffic monitoring using IP flows is used to handle the current challenge of analyzing encrypted network communication. Nevertheless, the packet aggregation into flow records naturally causes information loss; therefore, this paper proposes a novel flow extension for traffic features based on the time series analysis of the Single Flow Time series, i.e., a time series created by the number of bytes in each packet and its timestamp. We propose 69 universal features based on the statistical analysis of data points, time domain analysis, packet distribution within the flow timespan, time series behavior, and frequency domain analysis. We have demonstrated the usability and universality of the proposed feature vector for various network traffic classification tasks using 15 well-known publicly available datasets. Our evaluation shows that the novel feature vector achieves classification performance similar or better than related works on both binary and multiclass classification tasks. In more than half of the evaluated tasks, the classification performance increased by up to 5\%.

* Submitted to The 19th International Conference on Network and Service Management (CNSM) 2023 
Viaarxiv icon

Fine-grained TLS Services Classification with Reject Option

Feb 24, 2022
Jan Luxemburk, Tomáš Čejka

Figure 1 for Fine-grained TLS Services Classification with Reject Option
Figure 2 for Fine-grained TLS Services Classification with Reject Option
Figure 3 for Fine-grained TLS Services Classification with Reject Option
Figure 4 for Fine-grained TLS Services Classification with Reject Option

The recent success and proliferation of machine learning and deep learning have provided powerful tools, which are also utilized for encrypted traffic analysis, classification, and threat detection. These methods, neural networks in particular, are often complex and require a huge corpus of training data. Therefore, this paper focuses on collecting a large up-to-date dataset with almost 200 fine-grained service labels and 140 million network flows extended with packet-level metadata. The number of flows is three orders of magnitude higher than in other existing public labeled datasets of encrypted traffic. The number of service labels, which is important to make the problem hard and realistic, is four times higher than in the public dataset with the most class labels. The published dataset is intended as a benchmark for identifying services in encrypted traffic. Service identification can be further extended with the task of "rejecting" unknown services, i.e., the traffic not seen during the training phase. Neural networks offer superior performance for tackling this more challenging problem. To showcase the dataset's usefulness, we implemented a neural network with a multi-modal architecture, which is the state-of-the-art approach, and achieved 97.04% classification accuracy and detected 91.94% of unknown services with 5% false positive rate.

Viaarxiv icon