Abstract
In this work, a new encrypted traffic identification algorithm using sparse logistical regression and extreme learning machine (ELM) is introduced. The proposed method is based on randomness characteristics of encrypted traffic. we utilize ℓ1-norm regularized logistic regression to select sparse features. The identification is performed with the help of Extreme Learning Machine (ELM) because of its better identification and faster speed. In ELM, the input weights and the bias values are randomly chosen and the output weights are analytically calculated. Extensive experiments are performed using the proposed encrypted traffic identification algorithm and results are compared against state of the art techniques.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Alshammari, R., Zincir-Heywood, A.N.: Generalization of signatures for ssh encrypted traffic identification. In: IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009, pp. 167–174. IEEE (March 2009)
Karagiannis, T., Broido, A., Faloutsos, M.: Transport layer identification of P2P traffic. In: Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement, pp. 121–134. ACM (October 2004)
Karagiannis, T., Papagiannaki, K., Faloutsos, M.: BLINC: multilevel traffic classification in the dark. ACM SIGCOMM Computer Communication Review 35(4), 229–240 (2005)
Kang, H.J., Kim, M.S., Hong, J.W.: Streaming media and multimedia conferencing traffic analysis using payload examination. ETRI Journal 26(3), 203–217 (2004)
McGregor, A., Hall, M., Lorier, P., Brunskill, J.: Flow clustering using machine learning techniques. In: Barakat, C., Pratt, I. (eds.) PAM 2004. LNCS, vol. 3015, pp. 205–214. Springer, Heidelberg (2004)
Bernaille, L., Teixeira, R., Salamatian, K.: Early application identification. In: Proceedings of the 2006 ACM CoNEXT Conference, p. 6. ACM (December 2006)
Bacquet, C., Gumus, K., Tizer, D., Zincir-Heywood, A.N., Heywood, M.I.: A comparison of unsupervised learning techniques for encrypted traffic identification. Journal of Information Assurance and Security 5, 464–472 (2010)
Maiolini, G., Baiocchi, A., Iacovazzi, A., Rizzi, A.: Real time identification of SSH encrypted application flows by using cluster analysis techniques. In: Fratta, L., Schulzrinne, H., Takahashi, Y., Spaniol, O. (eds.) NETWORKING 2009. LNCS, vol. 5550, pp. 182–194. Springer, Heidelberg (2009)
Rukhin, A., Soto, J., Nechvatal, J., Smid, M., Barker, E.: A statistical test suite for random and pseudorandom number generators for cryptographic applications. Booz-Allen and Hamilton Inc., Mclean Va (2001)
Marsaglia, G.: DIEHARD: a battery of tests of randomness (1996), http://stat.fsu.edu/?geo/diehard.html
Crypt-X Test [CP/OL], http://www.isrc.qut.edu.au/cryptx/index.html
L’Ecuyer, P., Simard, R.: TestU01: AC library for empirical testing of random number generators. ACM Transactions on Mathematical Software (TOMS) 33(4), 22 (2007)
Lee, S.I., Lee, H., Abbeel, P., Ng, A.Y.: Efficient L 1 Regularized Logistic Regression. In: Proceedings of the National Conference on Artificial Intelligence, vol. 21(1), p. 401. AAAI Press, MIT Press, Menlo Park, Cambridge (2006)
Torgo, L., Gama, J.: Regression by classification. In: Borges, D.L., Kaestner, C.A.A. (eds.) SBIA 1996. LNCS, vol. 1159, pp. 51–60. Springer, Heidelberg (1996)
Liu, J., Ji, S., Ye, J.: SLEP: Sparse learning with efficient projections. Arizona State University, 6 (2009)
Huang, G.B., Zhu, Q.Y., Siew, C.K.: Extreme learning machine: a new learning scheme of feedforward neural networks. In: Proceedings of the 2004 IEEE International Joint Conference on Neural Networks, vol. 2, pp. 985–990. IEEE (July 2004)
Huang, G.B., Siew, C.K.: Extreme learning machine: RBF network case. In: ICARCV 2004 8th Control, Automation, Robotics and Vision Conference, vol. 2, pp. 1029–1036. IEEE (2004)
Huang, G.B., Siew, C.K.: Extreme learning machine with randomly assigned RBF kernels. International Journal of Information Technology 11(1), 16–24 (2005)
Huang, G.B., Chen, L., Siew, C.K.: Universal approximation using incremental constructive feedforward networks with random hidden nodes. IEEE Transactions on Neural Networks 17(4), 879–892 (2006)
Serre, D.: Matrices: Theory and Applications. Springer-Verlag New York, Inc. (2002)
Tax, D.M., Duin, R.P.: Data domain description using support vectors. In: ESANN, vol. 99, pp. 251–256 (April 1999)
Reynolds, D.: Gaussian mixture models. In: Encyclopedia of Biometrics, pp. 659–663 (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Meng, J., Yang, L., Zhou, Y., Pan, Z. (2015). Encrypted Traffic Identification Based on Sparse Logistical Regression and Extreme Learning Machine. In: Cao, J., Mao, K., Cambria, E., Man, Z., Toh, KA. (eds) Proceedings of ELM-2014 Volume 2. Proceedings in Adaptation, Learning and Optimization, vol 4. Springer, Cham. https://doi.org/10.1007/978-3-319-14066-7_7
Download citation
DOI: https://doi.org/10.1007/978-3-319-14066-7_7
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-14065-0
Online ISBN: 978-3-319-14066-7
eBook Packages: EngineeringEngineering (R0)