Key Technology of SSL Encrypted Application Identification Under Imbalance of Application Class

Through a in-depth study about the reason of network class imbalance, a method called SMOTE was chosen over the data set sampling preprocess, making full use of the advantages which is high accuracy of traffic model feature matching identification and sorting out the encrypted SSL flow, and then usi...

Full description

Saved in:
Bibliographic Details
Main Authors: Xuejiao Chen, Pan Wang, Shidong3 Liu
Format: Article
Language:zho
Published: Beijing Xintong Media Co., Ltd 2015-12-01
Series:Dianxin kexue
Subjects:
Online Access:http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2015355/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841529697686519808
author Xuejiao Chen
Pan Wang
Shidong3 Liu
author_facet Xuejiao Chen
Pan Wang
Shidong3 Liu
author_sort Xuejiao Chen
collection DOAJ
description Through a in-depth study about the reason of network class imbalance, a method called SMOTE was chosen over the data set sampling preprocess, making full use of the advantages which is high accuracy of traffic model feature matching identification and sorting out the encrypted SSL flow, and then using the clustering method and the SVM based on mutual information classification method to further identify SSL encryption specific application, like HTTPS/POPS etc. The hybrid method effectively combines the advantages of static feature matching and machine learning methods,to achieve the balance of classification method on accuracy and speed.
format Article
id doaj-art-50f235e7a94e4e409e094dceece5ded7
institution Kabale University
issn 1000-0801
language zho
publishDate 2015-12-01
publisher Beijing Xintong Media Co., Ltd
record_format Article
series Dianxin kexue
spelling doaj-art-50f235e7a94e4e409e094dceece5ded72025-01-15T03:15:49ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012015-12-0131838959611491Key Technology of SSL Encrypted Application Identification Under Imbalance of Application ClassXuejiao ChenPan WangShidong3 LiuThrough a in-depth study about the reason of network class imbalance, a method called SMOTE was chosen over the data set sampling preprocess, making full use of the advantages which is high accuracy of traffic model feature matching identification and sorting out the encrypted SSL flow, and then using the clustering method and the SVM based on mutual information classification method to further identify SSL encryption specific application, like HTTPS/POPS etc. The hybrid method effectively combines the advantages of static feature matching and machine learning methods,to achieve the balance of classification method on accuracy and speed.http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2015355/traffic identificationtraffic analysisbehavior characterizationbehavior modelingbehavior pattern
spellingShingle Xuejiao Chen
Pan Wang
Shidong3 Liu
Key Technology of SSL Encrypted Application Identification Under Imbalance of Application Class
Dianxin kexue
traffic identification
traffic analysis
behavior characterization
behavior modeling
behavior pattern
title Key Technology of SSL Encrypted Application Identification Under Imbalance of Application Class
title_full Key Technology of SSL Encrypted Application Identification Under Imbalance of Application Class
title_fullStr Key Technology of SSL Encrypted Application Identification Under Imbalance of Application Class
title_full_unstemmed Key Technology of SSL Encrypted Application Identification Under Imbalance of Application Class
title_short Key Technology of SSL Encrypted Application Identification Under Imbalance of Application Class
title_sort key technology of ssl encrypted application identification under imbalance of application class
topic traffic identification
traffic analysis
behavior characterization
behavior modeling
behavior pattern
url http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2015355/
work_keys_str_mv AT xuejiaochen keytechnologyofsslencryptedapplicationidentificationunderimbalanceofapplicationclass
AT panwang keytechnologyofsslencryptedapplicationidentificationunderimbalanceofapplicationclass
AT shidong3liu keytechnologyofsslencryptedapplicationidentificationunderimbalanceofapplicationclass