Deep Learning for Encrypted Traffic Classification and Unknown Data Detection

by   Madushi H. Pathmaperuma, et al.

Despite the widespread use of encryption techniques to provide confidentiality over Internet communications, mobile device users are still susceptible to privacy and security risks. In this paper, a new Deep Neural Network (DNN) based user activity detection framework is proposed to identify fine grained user activities performed on mobile applications (known as in-app activities) from a sniffed encrypted Internet traffic stream. One of the challenges is that there are countless applications, and it is practically impossible to collect and train a DNN model using all possible data from them. Therefore, in this work we exploit the probability distribution of DNN output layer to filter the data from applications that are not considered during the model training (i.e., unknown data). The proposed framework uses a time window based approach to divide the traffic flow of an activity into segments, so that in-app activities can be identified just by observing only a fraction of the activity related traffic. Our tests have shown that the DNN based framework has demonstrated an accuracy of 90 in-app activities and an average accuracy of 79 untrained in-app activity traffic as unknown data when this framework is employed.


A Survey on Analyzing Encrypted Network Traffic of Mobile Devices

Over the years, use of smartphones has come to dominate several areas, i...

Activity Detection from Encrypted Remote Desktop Protocol Traffic

An increasing amount of Internet traffic has its content encrypted. We a...

On Multi-Session Website Fingerprinting over TLS Handshake

Analyzing users' Internet traffic data and activities has a certain impa...

C-3PO: Click-sequence-aware DeeP Neural Network (DNN)-based Pop-uPs RecOmmendation

With the emergence of mobile and wearable devices, push notification bec...

DNN-based with Click-sequence-aware Mechanism for Notifications/Pop-ups Recommendation

With the emergence of mobile and wearable devices, push notification bec...

Challenges in Net Neutrality Violation Detection: A Case Study of Wehe Tool

The debate on "Net-neutrality" and events pointing towards its possible ...

Large Scale Measurement on the Adoption of Encrypted DNS

Several encryption proposals for DNS have been presented since 2016, but...