An empirical study of morphing on behavior-based network traffic classification

作者: Buyun Qu , Zhibin Zhang , Xingquan Zhu , Dan Meng

DOI: 10.1002/SEC.755

关键词: Computer scienceNaive Bayes classifierNetwork packetSupport vector machineStatistical classificationEmpirical researchRobustness (computer science)Traffic classificationMorphingData mining

摘要: With the rapid advancement of traffic classification techniques, a countermeasure against them called network morphing, which aims at masking to degrade performance identification and classification, has emerged. Although several morphing strategies have been proposed as promising approaches, very few works, however, investigated their impact on actual performance. This work sets out fulfill this gap from an empirical study point view. It takes into account different exerted packet size PS and/or inter-arrival time IAT evaluates by simulation. The is evaluated using three popularity used algorithms, including C4.5, Support Vector Machines , Naive Bayes, with various metrics considered. results show that not all can effectively thwart classification. Different perform distinctively in degrading identification, among integration morphings best, PS-based method alone worst. Furthermore, classifiers also exhibit distinct robustness C4.5 being most robust Bayes weakest. Finally, our shows learn nontrivial information merely direction patterns, partially explains weak protection methods because they fail take patterns consideration. Copyright © 2013 John Wiley & Sons, Ltd.

参考文章(24)
Alfonso Iacovazzi, Andrea Baiocchi, Padding and fragmentation for masking packet length statistics traffic monitoring and analysis. pp. 85- 88 ,(2012) , 10.1007/978-3-642-28534-9_9
Christopher M. Bishop, Pattern Recognition and Machine Learning (Information Science and Statistics) Springer-Verlag New York, Inc.. ,(2006)
Alberto Dainotti, Antonio Pescapé, Carlo Sansone, Early classification of network traffic through multi-classification traffic monitoring and analysis. pp. 122- 135 ,(2011) , 10.1007/978-3-642-20305-3_11
Shui Yu, Theerasak Thapngam, Su Wei, Wanlei Zhou, Efficient web browsing with perfect anonymity using page prefetching international conference on algorithms and architectures for parallel processing. pp. 1- 12 ,(2010) , 10.1007/978-3-642-13119-6_1
Mark A. Hall, Ian H. Witten, Eibe Frank, Data Mining: Practical Machine Learning Tools and Techniques ,(1999)
Fabian Monrose, Scott E. Coull, Charles V. Wright, Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis. network and distributed system security symposium. ,(2009)
Sotiris B. Kotsiantis, Supervised Machine Learning: A Review of Classification Techniques Informatica (lithuanian Academy of Sciences). ,vol. 31, pp. 249- 268 ,(2007)
Qixiang Sun, D.R. Simon, Yi-Min Wang, W. Russell, V.N. Padmanabhan, Lili Qiu, Statistical identification of encrypted Web browsing traffic ieee symposium on security and privacy. pp. 19- 30 ,(2002) , 10.1109/SECPRI.2002.1004359
F. Gringoli, Luca Salgarelli, M. Dusi, N. Cascarano, F. Risso, k. c. claffy, GT: picking up the truth from the ground for internet traffic acm special interest group on data communication. ,vol. 39, pp. 12- 18 ,(2009) , 10.1145/1629607.1629610
Alfonso Iacovazzi, Andrea Baiocchi, Optimum packet length masking international teletraffic congress. pp. 1- 8 ,(2010) , 10.1109/ITC.2010.5608728