Ajou University repository

Enhanced Encrypted Traffic Analysis Leveraging Graph Neural Networks and Optimized Feature Dimensionality Reductionoa mark
  • Jung, In Su ;
  • Song, Yu Rae ;
  • Jilcha, Lelisa Adeba ;
  • Kim, Deuk Hun ;
  • Im, Sun Young ;
  • Shim, Shin Woo ;
  • Kim, Young Hwan ;
  • Kwak, Jin
Citations

SCOPUS

2

Citation Export

Publication Year
2024-06-01
Journal
Symmetry
Publisher
Multidisciplinary Digital Publishing Institute (MDPI)
Citation
Symmetry, Vol.16 No.6
Keyword
encrypted traffic analysis (ETA)graph neural network (GNN)GraphSAGEmetadatanetwork traffic classificationoptimized feature dimensionality reduction
All Science Classification Codes (ASJC)
Computer Science (miscellaneous)Chemistry (miscellaneous)Mathematics (all)Physics and Astronomy (miscellaneous)
Abstract
With the continuously growing requirement for encryption in network environments, web browsers are increasingly employing hypertext transfer protocol security. Despite the increase in encrypted malicious network traffic, the encryption itself limits the data accessible for analyzing such behavior. To mitigate this, several studies have examined encrypted network traffic by analyzing metadata and payload bytes. Recent studies have furthered this approach, utilizing graph neural networks to analyze the structural data patterns within malicious encrypted traffic. This study proposed an enhanced encrypted traffic analysis leveraging graph neural networks which can model the symmetric or asymmetric spatial relations between nodes in the traffic network and optimized feature dimensionality reduction. It classified malicious network traffic by leveraging key features, including the IP address, port, CipherSuite, MessageLen, and JA3 features within the transport-layer-security session data, and then analyzed the correlation between normal and malicious network traffic data. The proposed approach outperformed previous models in terms of efficiency, using fewer features while maintaining a high accuracy rate of 99.5%. This demonstrates its research value as it can classify malicious network traffic with a high accuracy based on fewer features.
ISSN
2073-8994
Language
eng
URI
https://aurora.ajou.ac.kr/handle/2018.oak/34313
https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85197944526&origin=inward
DOI
https://doi.org/10.3390/sym16060733
Journal URL
http://www.mdpi.com/journal/symmetry/
Type
Article
Funding
This research was supported by the Korea Research Institute for Defense Technology Planning and Advancement (KRIT)\\u2014Grant funded by Defense Acquisition Program Administration (DAPA) (KRIT-CT-21-037).
Show full item record

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

KWAK, JIN Image
KWAK, JIN곽진
Department of Cyber Security
Read More

Total Views & Downloads

File Download