Citation Export
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Jung, In Su | - |
dc.contributor.author | Song, Yu Rae | - |
dc.contributor.author | Jilcha, Lelisa Adeba | - |
dc.contributor.author | Kim, Deuk Hun | - |
dc.contributor.author | Im, Sun Young | - |
dc.contributor.author | Shim, Shin Woo | - |
dc.contributor.author | Kim, Young Hwan | - |
dc.contributor.author | Kwak, Jin | - |
dc.date.issued | 2024-06-01 | - |
dc.identifier.issn | 2073-8994 | - |
dc.identifier.uri | https://aurora.ajou.ac.kr/handle/2018.oak/34313 | - |
dc.identifier.uri | https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85197944526&origin=inward | - |
dc.description.abstract | With the continuously growing requirement for encryption in network environments, web browsers are increasingly employing hypertext transfer protocol security. Despite the increase in encrypted malicious network traffic, the encryption itself limits the data accessible for analyzing such behavior. To mitigate this, several studies have examined encrypted network traffic by analyzing metadata and payload bytes. Recent studies have furthered this approach, utilizing graph neural networks to analyze the structural data patterns within malicious encrypted traffic. This study proposed an enhanced encrypted traffic analysis leveraging graph neural networks which can model the symmetric or asymmetric spatial relations between nodes in the traffic network and optimized feature dimensionality reduction. It classified malicious network traffic by leveraging key features, including the IP address, port, CipherSuite, MessageLen, and JA3 features within the transport-layer-security session data, and then analyzed the correlation between normal and malicious network traffic data. The proposed approach outperformed previous models in terms of efficiency, using fewer features while maintaining a high accuracy rate of 99.5%. This demonstrates its research value as it can classify malicious network traffic with a high accuracy based on fewer features. | - |
dc.description.sponsorship | This research was supported by the Korea Research Institute for Defense Technology Planning and Advancement (KRIT)\\u2014Grant funded by Defense Acquisition Program Administration (DAPA) (KRIT-CT-21-037). | - |
dc.language.iso | eng | - |
dc.publisher | Multidisciplinary Digital Publishing Institute (MDPI) | - |
dc.title | Enhanced Encrypted Traffic Analysis Leveraging Graph Neural Networks and Optimized Feature Dimensionality Reduction | - |
dc.type | Article | - |
dc.citation.number | 6 | - |
dc.citation.title | Symmetry | - |
dc.citation.volume | 16 | - |
dc.identifier.bibliographicCitation | Symmetry, Vol.16 No.6 | - |
dc.identifier.doi | 10.3390/sym16060733 | - |
dc.identifier.scopusid | 2-s2.0-85197944526 | - |
dc.identifier.url | http://www.mdpi.com/journal/symmetry/ | - |
dc.subject.keyword | encrypted traffic analysis (ETA) | - |
dc.subject.keyword | graph neural network (GNN) | - |
dc.subject.keyword | GraphSAGE | - |
dc.subject.keyword | metadata | - |
dc.subject.keyword | network traffic classification | - |
dc.subject.keyword | optimized feature dimensionality reduction | - |
dc.type.other | Article | - |
dc.description.isoa | true | - |
dc.subject.subarea | Computer Science (miscellaneous) | - |
dc.subject.subarea | Chemistry (miscellaneous) | - |
dc.subject.subarea | Mathematics (all) | - |
dc.subject.subarea | Physics and Astronomy (miscellaneous) | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.