Computer Science ›› 2025, Vol. 52 ›› Issue (11A): 241200126-7.doi: 10.11896/jsjkx.241200126

• Information Security • Previous Articles     Next Articles

Classification of Encrypted Application Traffic Enhanced by Multi-level GraphRepresentation

WANG Zhihong1, LIU Shengran2, CHI Zegui3, YANG Ying1   

  1. 1 R&D Center of Network Investigation Technology,The Third Research Institute of The Ministry of Public Security,Shanghai 200000,China
    2 NET Police Corps,Guangdong Provincial Public Security,Guangzhou 510000,China
    3 NET Police Troops,Huizhou Municipal Public Security Bureau,Huizhou,Guangdong 516000,China
  • Online:2025-11-15 Published:2025-11-10
  • Supported by:
    Ministry of Public Security Science and Technology Strengthening Police Project(2023JC21)and National Key R&D Program of China(2021YFB101405).

Abstract: With the increasing demand for privacy protection and data security,more and more applications and services use traffic encryption technology.While protecting users’ privacy,it also provides convenience for illegal users,seriously threatening network security defense and supervision.Due to the limitation of single and multiple records in representation,this paper proposes a model of encrypted application traffic enhanced by the multi-level graph representation.The proposed method constructs packet graphs based on multi-type interactive information in a single record,such as payload length,direction,sequence,and cluster information.Furtherly,multi-record graphs are constructed based on flow sequence association to break through the limitation of a single record.Finally,the graph neural network is introduced to realize the representation of traffic based on packet graphs and record graphs.Experiments are carried out on the ISCX VPN-nonVPN 2016 dataset,which is a widely used open-source dataset in the encrypted traffic classification area.Experimental results show the overall classification accuracy of the proposed method on VPN and non-VPN reach 98.1% and 89.2% respectively,and the F1 score is significantly improved compared with Text-based-CNN,k-GNN etc.

Key words: Encrypted traffic, Encrypted application classification, Graph neural network, Package graph, Record graph

CLC Number: 

  • TP391
[1]MADHUKAR A,WILLIAMSON C.A longitudinal study ofP2P traffic classification[C]//Proceedings of the 14th IEEE International Symposium on Modeling,Analysis,and Simulation.Piscataway:IEEE,2006:179-188.
[2]GU C,ZHANG S,SUN Y.Realtime encrypted traffic identification using machine learning[J].Journal of Software,2011,6(6):1009-1016.
[3]HAYES J,DANEZIES G.k-fingerprinting:A robust scalablewebsite fingerprinting technique[C]//Proceedings of the 25th USENIX Security Symposium.New York:ACM,2016:1187-1203.
[4]SUN G L,XUE Y,DONG Y,et al.An novel hybrid method for effectively classifying encrypted traffic[C]//Proceedings of the 2010 IEEE Global Telecommunications Conference.Piscataway:IEEE,2010:1-5.
[5]NGUYEN T T T,ARMITAGE G.A survey of techniques for internet traffic classification using machine learning[J].IEEE communications surveys & tutorials,2008,10(4):56-76.
[6]WANG Z.The applications of deep learning on traffic identification[J].BlackHat,2015,24(11):1-10.
[7]SONG M,RAN J,LI S.Encrypted traffic classification based on text convolution neural networks[C]//Proceedings of the 2019 IEEE 7th International Conference on Computer Science and Network Technology.Piscataway:IEEE,2019:432-436.
[8]XUE W L,YU J,GUO Z Q,et al.End-to End Encrypted Traffic Classification Based on Feature Fusion Convolutional Neural Network[J].Computer Engineering and Applications,2023,9(1):32-41.
[9]SHI G Z,LI K Y,LIU Y,et al.Encrypted traffic identification method based on deep residual capsule network with attention mechanism[J].Chinese Journal of Network and Information Security,2023,9(1):32-41.
[10]LIU C,HE L,XIONG G,et al.Fs-net:A flow sequence network for encrypted traffic classification[C]//The Proceeding of the 2019-IEEE Conference on Computer Communications.Piscataway:IEEE,2019:1171-1179.
[11]ZHANG S R,BO Y J,CHEN B,et al.Encrypted Traffic Classification Method Based on Multi-Layer Bidirectional SRU and Attention Model[J].Computer Engineering,2022,48(11):127-136.
[12]LIN P,YE K,HU Y,et al.A Novel Multimodal deep learning framework for encrypted traffic classification[J].IEEE/ACM Transactions on Networking,2023,31(3):1369-1384.
[13]HUOH T L,LUO Y,LI P,et al.Flow-based encrypted network traffic classification with graph neural networks[J].IEEE Transactions on Network and Service Management,2022,20(2):1224-1237.
[14]OKONKWO Z,FOO E,HOU Z,et al.Encrypted network traffic classification with higher order graph neural network[C]//The Proceeding of the 2023 Australasian Conference on Information Security and Privacy.Cham:Springer,2023:630-650.
[15]YU X W,CHEN D W.Research on Encrypted Traffic Classification of Graph Neural Network Based on Attention Mechanism[J].Journal of Information Security Research,2023,9(1):9-13.
[16]YANG Y,YAN Y,GAO Z,et al.A network traffic classificationmethod based on dual-mode feature extraction and hybrid neural networks[J].IEEE Transactions on Network and Service Mana-gement,2023,20(4):4073-4084.
[17]DENG X,LIU C H,OU Y Y,et al.Encrypted malicious trafficidentification based on CNN CBAM-BiGRU attention[J].Computer Engineering,2023,49(11):178-186.
[18]CHEN S Y,MA H L,ZHANG J H.Encrypted traffic classification based on CNN and BiGRU based on attention mechanism[J].Computer Science,2024,51(8):396-402.
[19]HU G,XIAO X,SHEN M,et al.TCGNN:Packet-grained network traffic classification via graph neural networks[J].Engineering Applications of Artificial Intelligence,2023,123:106531.
[20]CHEN Z,CHENG G,NIU D,et al.WFF-EGNN:encryptedtraffic classification based on weaved flow fragment via ensemble graph neural networks[J].IEEE Transactions on Machine Learning in Communications and Networking,2023,1:389-411.
[21]CAI W,GOU G,JIANG M,et al.Memg:mobile encrypted traffic classification with markov chains and graph neural network[C]//The Proceeding of the 2021 IEEE 23rd International Conference on High Performance Computing & Communications;7th Int Conf on Data Science & Systems;19th Int Conf on Smart City;7th Int Conf on Dependability in Sensor,Cloud & Big Data Systems & Application(HPCC/DSS/SmartCity/DependSys).Piscataway:IEEE,2021:478-486.
[22]SHEN M,ZHANG J,ZHU L,et al.Accurate decentralized application identification via encrypted traffic analysis using graph neural networks[J].IEEE Transactions on Information Forensics and Security,2021,16:2367-2380.
[23]WANG Q F,ZHAI J T,CHEN W,et al.An encrypted trafficclassification method based on graph convolutional neural networks[J].Electronic measurement technology,2022,45(14):109-115.
[24]LIN H G,ZHANG Y L,GUO N X,et al.P2P Botnet Detection Method Based on Graph Neural Network[J].Advanced Engineering Sciences,2022,54(2):65-72.
[25]LI M X,PENG C,WANG H,et al.A robust encrypted traffic identification scheme based on graph neural network[J].Telecommunications Science,2024,40(6):89-99.
[26]GIOACCHINI L,CAVALLO A,MELLIA M,et al.Exploringtemporal GNN embeddings for darknet traffic analysis[C]//Proceedings of the 2nd on Graph Neural Networking Workshop.New York:ACM,2023:31-36.
[27]ZHAO J J,LI Q,LIU S L,et al.Towards traffic supervision in 6G:a graph neural network-based encrypted malicious traffic detection method[J].Scientia Sinica Informationis,2022,52:270-286.
[28]TAO Y,DU L M,SHEN T T.Encrypted Traffic Identification Based on Two-branch Multi-stage Spatiotemporal Feature Fusion[J].Journal of Chinese Computer Systems,2024,45(6):1489-1495.
[29]HE H Y,YANG Z G,CHEN X N.PERT:payload encoding rep-resentation from transformer for encrypted traffic classification [J].ZTE Communications,2022,19(4):90-97.
[1] LI Yaru, WANG Qianqian, CHE Chao, ZHU Deheng. Graph-based Compound-Protein Interaction Prediction with Drug Substructures and Protein 3D Information [J]. Computer Science, 2025, 52(9): 71-79.
[2] WU Hanyu, LIU Tianci, JIAO Tuocheng, CHE Chao. DHMP:Dynamic Hypergraph-enhanced Medication-aware Model for Temporal Health EventPrediction [J]. Computer Science, 2025, 52(9): 88-95.
[3] SU Shiyu, YU Jiong, LI Shu, JIU Shicheng. Cross-domain Graph Anomaly Detection Via Dual Classification and Reconstruction [J]. Computer Science, 2025, 52(8): 374-384.
[4] TANG Boyuan, LI Qi. Review on Application of Spatial-Temporal Graph Neural Network in PM2.5 ConcentrationForecasting [J]. Computer Science, 2025, 52(8): 71-85.
[5] GUO Husheng, ZHANG Xufei, SUN Yujie, WANG Wenjian. Continuously Evolution Streaming Graph Neural Network [J]. Computer Science, 2025, 52(8): 118-126.
[6] LUO Xuyang, TAN Zhiyi. Knowledge-aware Graph Refinement Network for Recommendation [J]. Computer Science, 2025, 52(7): 103-109.
[7] HAO Jiahui, WAN Yuan, ZHANG Yuhang. Research on Node Learning of Graph Neural Networks Fusing Positional and StructuralInformation [J]. Computer Science, 2025, 52(7): 110-118.
[8] JIANG Kun, ZHAO Zhengpeng, PU Yuanyuan, HUANG Jian, GU Jinjing, XU Dan. Cross-modal Hypergraph Optimisation Learning for Multimodal Sentiment Analysis [J]. Computer Science, 2025, 52(7): 210-217.
[9] ZHENG Chuangrui, DENG Xiuqin, CHEN Lei. Traffic Prediction Model Based on Decoupled Adaptive Dynamic Graph Convolution [J]. Computer Science, 2025, 52(6A): 240400149-8.
[10] TENG Minjun, SUN Tengzhong, LI Yanchen, CHEN Yuan, SONG Mofei. Internet Application User Profiling Analysis Based on Selection State Space Graph Neural Network [J]. Computer Science, 2025, 52(6A): 240900060-8.
[11] SHI Enyi, CHANG Shuyu, CHEN Kejia, ZHANG Yang, HUANG Haiping. BiGCN-TL:Bipartite Graph Convolutional Neural Network Transformer Localization Model for Software Bug Partial Localization Scenarios [J]. Computer Science, 2025, 52(6A): 250200086-11.
[12] WANG Jinghong, WU Zhibing, WANG Xizhao, LI Haokang. Semantic-aware Heterogeneous Graph Attention Network Based on Multi-view RepresentationLearning [J]. Computer Science, 2025, 52(6): 167-178.
[13] QIAO Yu, XU Tao, ZHANG Ya, WEN Fengpeng, LI Qiangwei. Graph Neural Network Defect Prediction Method Combined with Developer Dependencies [J]. Computer Science, 2025, 52(6): 52-57.
[14] HUANG Qian, SU Xinkai, LI Chang, WU Yirui. Hypergraph Convolutional Network with Multi-perspective Topology Refinement forSkeleton-based Action Recognition [J]. Computer Science, 2025, 52(5): 220-226.
[15] WU Pengyuan, FANG Wei. Study on Graph Collaborative Filtering Model Based on FeatureNet Contrastive Learning [J]. Computer Science, 2025, 52(5): 139-148.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!