Skip to main content

Encrypted Traffic Identification Based on Sparse Logistical Regression and Extreme Learning Machine

  • Conference paper
Proceedings of ELM-2014 Volume 2

Part of the book series: Proceedings in Adaptation, Learning and Optimization ((PALO,volume 4))

Abstract

In this work, a new encrypted traffic identification algorithm using sparse logistical regression and extreme learning machine (ELM) is introduced. The proposed method is based on randomness characteristics of encrypted traffic. we utilize ℓ1-norm regularized logistic regression to select sparse features. The identification is performed with the help of Extreme Learning Machine (ELM) because of its better identification and faster speed. In ELM, the input weights and the bias values are randomly chosen and the output weights are analytically calculated. Extensive experiments are performed using the proposed encrypted traffic identification algorithm and results are compared against state of the art techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Alshammari, R., Zincir-Heywood, A.N.: Generalization of signatures for ssh encrypted traffic identification. In: IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009, pp. 167–174. IEEE (March 2009)

    Google Scholar 

  2. Karagiannis, T., Broido, A., Faloutsos, M.: Transport layer identification of P2P traffic. In: Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement, pp. 121–134. ACM (October 2004)

    Google Scholar 

  3. Karagiannis, T., Papagiannaki, K., Faloutsos, M.: BLINC: multilevel traffic classification in the dark. ACM SIGCOMM Computer Communication Review 35(4), 229–240 (2005)

    Article  Google Scholar 

  4. Kang, H.J., Kim, M.S., Hong, J.W.: Streaming media and multimedia conferencing traffic analysis using payload examination. ETRI Journal 26(3), 203–217 (2004)

    Article  Google Scholar 

  5. McGregor, A., Hall, M., Lorier, P., Brunskill, J.: Flow clustering using machine learning techniques. In: Barakat, C., Pratt, I. (eds.) PAM 2004. LNCS, vol. 3015, pp. 205–214. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  6. Bernaille, L., Teixeira, R., Salamatian, K.: Early application identification. In: Proceedings of the 2006 ACM CoNEXT Conference, p. 6. ACM (December 2006)

    Google Scholar 

  7. Bacquet, C., Gumus, K., Tizer, D., Zincir-Heywood, A.N., Heywood, M.I.: A comparison of unsupervised learning techniques for encrypted traffic identification. Journal of Information Assurance and Security 5, 464–472 (2010)

    Google Scholar 

  8. Maiolini, G., Baiocchi, A., Iacovazzi, A., Rizzi, A.: Real time identification of SSH encrypted application flows by using cluster analysis techniques. In: Fratta, L., Schulzrinne, H., Takahashi, Y., Spaniol, O. (eds.) NETWORKING 2009. LNCS, vol. 5550, pp. 182–194. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  9. Rukhin, A., Soto, J., Nechvatal, J., Smid, M., Barker, E.: A statistical test suite for random and pseudorandom number generators for cryptographic applications. Booz-Allen and Hamilton Inc., Mclean Va (2001)

    Google Scholar 

  10. Marsaglia, G.: DIEHARD: a battery of tests of randomness (1996), http://stat.fsu.edu/?geo/diehard.html

  11. Crypt-X Test [CP/OL], http://www.isrc.qut.edu.au/cryptx/index.html

  12. L’Ecuyer, P., Simard, R.: TestU01: AC library for empirical testing of random number generators. ACM Transactions on Mathematical Software (TOMS) 33(4), 22 (2007)

    Article  MathSciNet  Google Scholar 

  13. Lee, S.I., Lee, H., Abbeel, P., Ng, A.Y.: Efficient L  1 Regularized Logistic Regression. In: Proceedings of the National Conference on Artificial Intelligence, vol. 21(1), p. 401. AAAI Press, MIT Press, Menlo Park, Cambridge (2006)

    Google Scholar 

  14. Torgo, L., Gama, J.: Regression by classification. In: Borges, D.L., Kaestner, C.A.A. (eds.) SBIA 1996. LNCS, vol. 1159, pp. 51–60. Springer, Heidelberg (1996)

    Chapter  Google Scholar 

  15. Liu, J., Ji, S., Ye, J.: SLEP: Sparse learning with efficient projections. Arizona State University, 6 (2009)

    Google Scholar 

  16. Huang, G.B., Zhu, Q.Y., Siew, C.K.: Extreme learning machine: a new learning scheme of feedforward neural networks. In: Proceedings of the 2004 IEEE International Joint Conference on Neural Networks, vol. 2, pp. 985–990. IEEE (July 2004)

    Google Scholar 

  17. Huang, G.B., Siew, C.K.: Extreme learning machine: RBF network case. In: ICARCV 2004 8th Control, Automation, Robotics and Vision Conference, vol. 2, pp. 1029–1036. IEEE (2004)

    Google Scholar 

  18. Huang, G.B., Siew, C.K.: Extreme learning machine with randomly assigned RBF kernels. International Journal of Information Technology 11(1), 16–24 (2005)

    Google Scholar 

  19. Huang, G.B., Chen, L., Siew, C.K.: Universal approximation using incremental constructive feedforward networks with random hidden nodes. IEEE Transactions on Neural Networks 17(4), 879–892 (2006)

    Article  Google Scholar 

  20. Serre, D.: Matrices: Theory and Applications. Springer-Verlag New York, Inc. (2002)

    Google Scholar 

  21. Tax, D.M., Duin, R.P.: Data domain description using support vectors. In: ESANN, vol. 99, pp. 251–256 (April 1999)

    Google Scholar 

  22. Reynolds, D.: Gaussian mixture models. In: Encyclopedia of Biometrics, pp. 659–663 (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Meng, J., Yang, L., Zhou, Y., Pan, Z. (2015). Encrypted Traffic Identification Based on Sparse Logistical Regression and Extreme Learning Machine. In: Cao, J., Mao, K., Cambria, E., Man, Z., Toh, KA. (eds) Proceedings of ELM-2014 Volume 2. Proceedings in Adaptation, Learning and Optimization, vol 4. Springer, Cham. https://doi.org/10.1007/978-3-319-14066-7_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-14066-7_7

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-14065-0

  • Online ISBN: 978-3-319-14066-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics