代理(统计)
加密
代理重新加密
计算机科学
交通分类
网络数据包
互联网
计算机网络
数据挖掘
鉴定(生物学)
计算机安全
机器学习
公钥密码术
操作系统
植物
生物
作者
Ping Luo,Fei Wang,Shuhui Chen,Zhenxing Liu
出处
期刊:International Conference on Communication Software and Networks
日期:2021-06-04
被引量:2
标识
DOI:10.1109/iccsn52437.2021.9463594
摘要
Encrypted proxy is often used to hide malicious behavior or criminal activity on the Internet. Therefore, identifying encrypted proxy traffic is essential for network management and communication security. Existing researches usually use statistical features to profile network flows, which only have limited effects on encrypted proxy traffic, and are not suitable for real-time identification. In this paper, a novel behavior-based approach for encrypted proxy traffic detection is proposed. Two unique behavior features, IP proxy and data encryption behaviors, which are highly related to the activity of accessing network through encrypted proxies, are defined as learning features. Machine learning techniques are adopted for encrypted proxy traffic identification. The experiments on a real V2Ray traffic dataset demonstrate that the behavior-based method can identify encrypted proxy traffic with high accuracy, up to 99.86%. Besides, the method can timely seek out target flows, as all those behavior features can be obtained in the first packet.
科研通智能强力驱动
Strongly Powered by AbleSci AI