Key Technology of SSL Encrypted Application Identification Under Imbalance of Application Class
Through a in-depth study about the reason of network class imbalance, a method called SMOTE was chosen over the data set sampling preprocess, making full use of the advantages which is high accuracy of traffic model feature matching identification and sorting out the encrypted SSL flow, and then usi...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Beijing Xintong Media Co., Ltd
2015-12-01
|
Series: | Dianxin kexue |
Subjects: | |
Online Access: | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2015355/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841529697686519808 |
---|---|
author | Xuejiao Chen Pan Wang Shidong3 Liu |
author_facet | Xuejiao Chen Pan Wang Shidong3 Liu |
author_sort | Xuejiao Chen |
collection | DOAJ |
description | Through a in-depth study about the reason of network class imbalance, a method called SMOTE was chosen over the data set sampling preprocess, making full use of the advantages which is high accuracy of traffic model feature matching identification and sorting out the encrypted SSL flow, and then using the clustering method and the SVM based on mutual information classification method to further identify SSL encryption specific application, like HTTPS/POPS etc. The hybrid method effectively combines the advantages of static feature matching and machine learning methods,to achieve the balance of classification method on accuracy and speed. |
format | Article |
id | doaj-art-50f235e7a94e4e409e094dceece5ded7 |
institution | Kabale University |
issn | 1000-0801 |
language | zho |
publishDate | 2015-12-01 |
publisher | Beijing Xintong Media Co., Ltd |
record_format | Article |
series | Dianxin kexue |
spelling | doaj-art-50f235e7a94e4e409e094dceece5ded72025-01-15T03:15:49ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012015-12-0131838959611491Key Technology of SSL Encrypted Application Identification Under Imbalance of Application ClassXuejiao ChenPan WangShidong3 LiuThrough a in-depth study about the reason of network class imbalance, a method called SMOTE was chosen over the data set sampling preprocess, making full use of the advantages which is high accuracy of traffic model feature matching identification and sorting out the encrypted SSL flow, and then using the clustering method and the SVM based on mutual information classification method to further identify SSL encryption specific application, like HTTPS/POPS etc. The hybrid method effectively combines the advantages of static feature matching and machine learning methods,to achieve the balance of classification method on accuracy and speed.http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2015355/traffic identificationtraffic analysisbehavior characterizationbehavior modelingbehavior pattern |
spellingShingle | Xuejiao Chen Pan Wang Shidong3 Liu Key Technology of SSL Encrypted Application Identification Under Imbalance of Application Class Dianxin kexue traffic identification traffic analysis behavior characterization behavior modeling behavior pattern |
title | Key Technology of SSL Encrypted Application Identification Under Imbalance of Application Class |
title_full | Key Technology of SSL Encrypted Application Identification Under Imbalance of Application Class |
title_fullStr | Key Technology of SSL Encrypted Application Identification Under Imbalance of Application Class |
title_full_unstemmed | Key Technology of SSL Encrypted Application Identification Under Imbalance of Application Class |
title_short | Key Technology of SSL Encrypted Application Identification Under Imbalance of Application Class |
title_sort | key technology of ssl encrypted application identification under imbalance of application class |
topic | traffic identification traffic analysis behavior characterization behavior modeling behavior pattern |
url | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2015355/ |
work_keys_str_mv | AT xuejiaochen keytechnologyofsslencryptedapplicationidentificationunderimbalanceofapplicationclass AT panwang keytechnologyofsslencryptedapplicationidentificationunderimbalanceofapplicationclass AT shidong3liu keytechnologyofsslencryptedapplicationidentificationunderimbalanceofapplicationclass |