用户名: 密码: 验证码:
网络加密流量识别研究进展及发展趋势
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Research Status and Development Trends on Network Encrypted Traffic Identification
  • 作者:陈良臣 ; 高曙 ; 刘宝旭 ; 卢志刚
  • 英文作者:CHEN Liangchen;GAO Shu;LIU Baoxu;LU Zhigang;School of Computer Science and Technology, Wuhan University of Technology;Institute of Information Engineering, Chinese Academy of Sciences;Department of Computer Application, China University of Labor Relations;School of Cyber Security,University of Chinese Academy of Sciences;
  • 关键词:网络加密流量 ; 加密流量识别 ; 网络安全 ; 加密协议 ; 异常加密流量
  • 英文关键词:network encrypted traffic;;encrypted traffic identification;;cyber security;;encryption protocol;;abnormal encrypted traffic
  • 中文刊名:XXAQ
  • 英文刊名:Netinfo Security
  • 机构:武汉理工大学计算机科学与技术学院;中国科学院信息工程研究所;中国劳动关系学院计算机教研室;中国科学院大学网络空间安全学院;
  • 出版日期:2019-03-10
  • 出版单位:信息网络安全
  • 年:2019
  • 期:No.219
  • 基金:国家自然科学基金[61802404,61602470];; 北京市科委重点研究项目[D181100000618003];; 中国劳动关系学院中央高校基本科研业务费专项基金[19ZYJS007];中国劳动关系学院教学与改革项目[JG1739];; 中国科学院战略性先导科技专项[XDC02000000];; 国家信息安全专项(发改办高技[2015]289号)
  • 语种:中文;
  • 页:XXAQ201903004
  • 页数:7
  • CN:03
  • ISSN:31-1859/TN
  • 分类号:25-31
摘要
网络加密流量的快速增长正在改变威胁形势。如何实现对网络加密流量的实时准确识别,是我国网络空间安全领域的重要问题,也是目前网络行为分析、网络规划建设、网络异常检测和网络流量模型研究的重点。文章对网络加密流量识别的基本概念、研究进展、评价指标和存在的问题进行论述,并对网络加密流量识别的发展趋势和面临的挑战进行总结与展望。文章可为进一步探索网络空间安全领域的新方法与新技术提供借鉴与参考。
        The rapid growth of network encrypted traffic is changing the threat landscape.How to realize real-time and accurate identification of network encrypted traffic is an important issue in the field of cyberspace security in China. It is also a research hotspot of network behavior analysis, network planning construction and network traffic model. This paper discusses the basic concepts, research progress, evaluation indicators and existing issues of network encrypted traffic identification, and summarizes and forecasts the development trends and challenges of network encrypted traffic identification. This paper can provide reference for further exploration of new methods and technologies in the field of cyberspace security.
引文
[1]ROUGHAN M,SEN S,SPATSCHENC O,et al.Class-ofservice Mapping for QoS:A Statistical Signature-based Approach to IP Traffic Classification[C]//ACM.The 4th ACM SIGCOMMConference on Internet Measurement,October 25-27,2004,Taormina,Sicily,Italy.New York:ACM,2004:135-148.
    [2]Cisco.Encrypted Traffic Analytics White Paper[EB/OL].https://www.cisco.com/c/dam/en/us/solutions/collateral/enterprisenetworks/enterprise-network-security/nb-09-encrytd-trafanlytcs-wp-cte-en.pdf,2018-12-31.
    [3]ANDERSON B,MCGREW D.Identifying Encrypted Malware Traffic with Contextual Flow Data[C]//ACM.The 2016ACM Workshop on Artificial Intelligence and Security,October28,2016,Vienna,Austria.New York:ACM,2016:35-46.
    [4]VELAN P,CERMAK M,CELEDA P,et al.A Survey of Methods for Encrypted Traffic Classification and Analysis[J].International Journal of Network Management,2015,25(5):355-374.
    [5]PAN Wubin,CHENG Guang,GUO Xiaojun,et al.Review and Perspective on Encrypted Traffic Identification Research[J].Journal on Communications,2016,37(9):154-167.潘吴斌,程光,郭晓军,等.网络加密流量识别研究综述及展望[J].通信学报,2016,37(9):154-167.
    [6]ZHAO Bo,GUO Hong,LIU Qinrang,et al.Protocol Independent Identification of Encrypted Traffic Based on Weighted Cumulative Sum Test[J].Journal of Software,2013,24(6):1334-1345.赵博,郭虹,刘勤让,等.基于加权累积和检验的加密流量盲识别算法[J].软件学报,2013,24(6):1334-1345.
    [7]CHENG Guang,CHEN Yuxiang.Identification Method of Encrypted Traffic Based on Support Vector machine[J].Journal of Southeast University(Natural Science Edition),2017(4):655-659.程光,陈玉祥.基于支持向量机的加密流量识别方法[J].东南大学学报(自然科学版),2017(4):655-659.
    [8]YU Qiang,HUO Hongwei.Algorithms Improving the Storage Efficiency of Deep Packet Inspection[J].Journal of Software,2011,22(1):149-163.于强,霍红卫.一组提高存储效率的深度包检测算法[J].软件学报,2011,22(1):149-163.
    [9]XU Peng,LIN Sen.Internet Traffic Classification Using C4.5Decision Tree[J].Journal of Software,2009,20(10):2692-2704.徐鹏,林森.基于C4.5决策树的流量分类方法[J].软件学报,2009,20(10):2692-2704
    [10]SHAHBAZ R,XIN Liu.Deep Learning for Encrypted Traffic Classification:An Overview[EB/OL].https://arxiv.org/abs/1810.07906,2018-12-31.
    [11]WEI Shuning,CHEN Xingru,TANG Yong,et al.Research on the Application of AR-HELM Algorithm in Network Traffic Classification[J].Netinfo Security,2018,18(1):9-14.魏书宁,陈幸如,唐勇,等.AR-HELM算法在网络流量分类中的应用研究[J].信息网络安全,2018,18(1):9-14.
    [12]WANG Wei.Research on Identification of Encrypted Network Application Traffic[D].Zhengzhou:PLA Information Engineering University,2014.王炜.网络应用层加密流量识别技术研究[D].郑州:解放军信息工程大学,2014.
    [13]CAO Zigang,XIONG Gang,ZHAO Yong,et al.A Survey on Encrypted Traffic Classification[M]//Springer.Applications and Techniques in Information Security.Heidelberg:Springer Berlin Heidelberg,2014:73-81.
    [14]LU Gang,GUO Ronghua,ZHOU Ying,et al.Review of Malicious Traffic Feature Extraction[J].Netinfo Security,2018,18(9):1-9.鲁刚,郭荣华,周颖,等.恶意流量特征提取综述[J].信息网络安全,2018,18(9):1-9.
    [15]MA Ruolong.Research and Implementation of Unknown and Encrypted Traffic Identification Based on Convolutional Neural Network[D].Beijing:Beijing University of Posts and Telecommunications,2018.马若龙.基于卷积神经网络的未知和加密流量识别的研究与实现[D].北京:北京邮电大学,2018.
    [16]BONFIGLIO D,MELLIA M,MEO M,et al.Revealing skype Traffic:When Randomness Plays with You[J].ACM SIGCOMMComputer Communication Review,2007,37(4):37-48.
    [17]KORCZYNSKI M,DUDA A.Markov Chain Fingerprinting to Classify Encrypted Traffic[C]//IEEE.IEEE Conference on Computer Communications,April 27-May 2,2014,Toronto,ON,Canada.NJ:IEEE,2014:781-789.
    [18]WANG Wei,CHENG Dongnian.M-serial Test-based Encrypted Traffic Identification[J].Computer Engineering and Design,2014,35(11):3712-3716.王炜,程东年.基于M-序列检验的加密流量识别[J].计算机工程与设计,2014,35(11):3712-3716.
    [19]KHAKPOUR A R,LIU A X.An Information-Theoretical Approach to High-Speed Flow Nature Identification[J].IEEE/ACM Transactions on Networking,2013,21(4):1076-1089.
    [20]ZHANG Bo.Research on Technology of Encrypted Traffic Identification Based on Traffic Features[D].Harbin:Harbin Institute of Technology,2012.张波.基于流特征的加密流量识别技术研究[D].哈尔滨:哈尔滨工业大学,2012.
    [21]CHEN Wei,HU Lei,YANG Long.Fast Identification Method of Encrypted Traffic Based on Payload Signatures[J].Computer Engineering,2012,38(12):22-25.陈伟,胡磊,杨龙.基于载荷特征的加密流量快速识别方法[J].计算机工程,2012,38(12):22-25.
    [22]CHEN Wei,YU Le,YANG Geng.Detecting Encrypted Botnet Traffic Using Spatial-Temporal Correlation[J].China Communications,2012(10):49-59.陈伟,于乐,杨庚.使用时空相关性分析检测加密僵尸网络流量[J].中国通信,2012(10):49-59.
    [23]WANG Pan,CHEN Xuejiao.SAE-based Encrypted Traffic Identification Method[J].Computer Engineering,2018,44(11):140-147,153.王攀,陈雪娇.基于堆栈式自动编码器的加密流量识别方法[J].计算机工程,2018,44(11):140-147,153.
    [24]MENG Juan,YANG Longqi,ZHOU Yuhuan,et al.Encrypted Traffic Identification Based on Sparse Logistical Regression and Extreme Learning Machine[M]//Springer.Proceedings of ELM-2014.Cham:Springer,Cham,2015:61-70.
    [25]ZHANG Meng,ZHANG Hongli,ZHANG Bo,et al.Encrypted Traffic Classification Based on an Improved Clustering Algorithm[M]//Springer.Trustworthy Computing and Services.Heidelberg:Springer Berlin Heidelberg,2013:124-131.
    [26]CHEN Xuejiao,WANG Pan,YU Jiahui.CNN-based Entrypted Traffic Identification Method[J].Journal of Nanjing University of Posts and Telecommunications(Natural Science Edition),2018,38(6):36-41.陈雪娇,王攀,俞家辉.基于卷积神经网络的加密流量识别方法[J].南京邮电大学学报(自然科学版),2018,38(6):36-41.
    [27]NGUYEN T T T,ARMITAGE G J.A Survey of Techniques for Internet Traffic Classification Using Machine Learning[J].IEEECommunications Surveys&Tutorials,2008,10(3):56-76.
    [28]ALSHAMMARI R,ZINCIR-HEYWOOD A N.Machine Learning-based Encrypted Traffic Classification:Identifying SSHand Skype[C]//IEEE.2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications,July 8-10,2009,Ottawa,ON,Canada.NJ:IEEE,2009:1-8.
    [29]ALSHAMMARI R,ZINCIR-HEYWOOD A N.An Investigation on the Identification of VoIP Traffic:Case Study on Gtalk and Skype[C]//IEEE.2010 International Conference on Network&Service Management,October 25-29,2010,Niagara Falls,ON,Canada.NJ:IEEE,2010:310-313.
    [30]OKADA Y,ATA S,NAKAMURA N,et al.Comparisons of Machine Learning Algorithms for Application Identification of Encrypted Traffic[C]//IEEE.2011 10th International Conference on Machine Learning&Applications&Workshops,December 18-21,2011,Honolulu,HI,USA.NJ:IEEE,2011:358-361.
    [31]ALSHAMMARI R,ZINCIRHEYWOOD A N.Can Encrypted Traffic Be Identified without Port Numbers,IP Addresses and Payload Inspection?[J].Computer Networks,2011,55(6):1326-1350.
    [32]HAFFNER P,SEN S,SPATSCHECK O,et al.ACAS:Automated Construction of Application Signatures[C]//ACM.ACMSIGCOMM Workshop on Mining Network Data,August 26,2005,Philadelphia,Pennsylvania,USA.New York:ACM,2005:197-202.
    [33]KARAGIANNIS T.BLINC:Multilevel Traffic Classification in the Dark[J].Acm Sigcomm Computer Communication Review,2005,35(4):229-240.
    [34]WRIGHT C V,MONROSE F,MASSON G M.Using Visual Motifs to Classify Encrypted Traffic[C]//ACM.The 3rd International Workshop on Visualization for Computer Security,November 3,2006,Alexandria,Virginia,USA.New York:ACM,2006:41-50.
    [35]SCHATZMANN D,Mühlbauer W,SPYROPOULOS T,et al.Digging into HTTPS:Flow-based Classification of Webmail Traffic[C]//ACM.ACM SIGCOMM Conference on Internet Measurement,November 1-30,2010,Melbourne,Australia.New York:ACM,2010:322-327.
    [36]BERMOLEN P,MELLIA M,MEO M,et al.Abacus:Accurate Behavioral Classification of P2P-TV Traffic[J].Computer Networks,2011,55(6):1394-1411.
    [37]XIONG Gang,HUANG Wenting,ZHAO Yong,et al.RealTime Detection of Encrypted Thunder Traffic Based on Trustworthy Behavior Association[M]//Springer.Trustworthy Computing and Services.Heidelberg:Springer,Berlin,Heidelberg,2012:132-139.
    [38]QIN Tao,WANG Lei,LIU Zhaoli,et al.Robust Application Identification Methods for P2P and VoIP Traffic Classification in Backbone Networks[J].Knowledge-based Systems,2015,82:152-162.
    [39]GAO Changxi,WU Yabiao,WANG Cong.Encrypted Traffic Classification Based on Packet Length Distribution of Sampling Sequence[J].Journal on Communications,2015,36(9):65-75.高长喜,吴亚飚,王枞.基于抽样分组长度分布的加密流量应用识别[J].通信学报,2015,36(9):65-75.
    [40]SUN Guanglu,XUE Yibo,DONG Yingfei,et al.An Novel Hybrid Method for Effectively Classifying Encrypted Traffic[C]//IEEE.2010 IEEE Global Telecommunications Conference GLOBECOM2010,December 6-10,2010,Miami,FL,USA.NJ:IEEE,2010:1-5.
    [41]HE Jie,YANG Yuexiang,QIAO Yong,et al.Fine-grained P2P Traffic Classification by Simply Counting Flows[J].Frontiers of Information Technology&Electronic Engineering,2016,16(5):391-403.
    [42]CALLADO A,KELNER J,SADOK D,et al.Better Network Traff ic Identif ication through the Independent Combination of Techniques[J].Journal of Network and Computer Applications,2010,33(4):433-446.
    [43]BERNAILLE L,TEIXEIRA R.Early Recognition of Encrypted Applications[C]//PAM.International Conference on Passive and Active Network Measurement,April 5-6,2007,Louvain-la-Neuve,Belgium.Heidelberg:Springer,Berlin,Heidelberg,2007:165-175.
    [44]DRAPER-GIL G,LASHKARI A H,MAMUN M S I,et al.Characterization of Encrypted and VPN Traffic Using Time-Related Features[EB/OL].http://www.scitepress.org/DigitalLibrary/Link.asp x?doi=10.5220/0005740704070414,2018-12-31.
    [45]DING Rusheng.Classification of Encrypted Traffic Application Service Based on Spark Platform[D].Beijing:Beijing University of Posts and Telecommunications,2017.丁汝盛.基于Spark平台的加密流量应用服务分类[D].北京:北京邮电大学,2017.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700