Deep Learning for Encrypted Traffic Classification and Unknown Data
Detection
- URL: http://arxiv.org/abs/2203.15501v1
- Date: Fri, 25 Mar 2022 10:55:18 GMT
- Title: Deep Learning for Encrypted Traffic Classification and Unknown Data
Detection
- Authors: Madushi H. Pathmaperuma and Yogachandran Rahulamathavan and Safak
Dogan and Ahmet M. Kondoz, and Rongxing Lu
- Abstract summary: A new Deep Neural Network based user activity detection framework is proposed to identify fine grained user activities performed on mobile applications.
The proposed framework uses a time window based approach to divide the traffic flow of an activity into segments, so that in-app activities can be identified just by observing only a fraction of the activity related traffic.
- Score: 13.36152072056685
- License: http://creativecommons.org/licenses/by-sa/4.0/
- Abstract: Despite the widespread use of encryption techniques to provide
confidentiality over Internet communications, mobile device users are still
susceptible to privacy and security risks. In this paper, a new Deep Neural
Network (DNN) based user activity detection framework is proposed to identify
fine grained user activities performed on mobile applications (known as in-app
activities) from a sniffed encrypted Internet traffic stream. One of the
challenges is that there are countless applications, and it is practically
impossible to collect and train a DNN model using all possible data from them.
Therefore, in this work we exploit the probability distribution of DNN output
layer to filter the data from applications that are not considered during the
model training (i.e., unknown data). The proposed framework uses a time window
based approach to divide the traffic flow of an activity into segments, so that
in-app activities can be identified just by observing only a fraction of the
activity related traffic. Our tests have shown that the DNN based framework has
demonstrated an accuracy of 90% or above in identifying previously trained
in-app activities and an average accuracy of 79% in identifying previously
untrained in-app activity traffic as unknown data when this framework is
employed.
Related papers
- What If We Had Used a Different App? Reliable Counterfactual KPI Analysis in Wireless Systems [52.499838151272016]
This paper addresses the "what-if" problem of estimating the values of key performance indicators (KPIs) that would have been obtained if a different app had been implemented by the radio access network (RAN)
We propose a conformal-prediction-based counterfactual analysis method for wireless systems that provides reliable "error bars" for the estimated, containing the true with a user-defined probability.
arXiv Detail & Related papers (2024-09-30T18:47:26Z) - A near-autonomous and incremental intrusion detection system through active learning of known and unknown attacks [2.686686221415684]
Intrusion detection is a traditional practice of security experts, however, there are several issues which still need to be tackled.
We present an architecture for a hybrid Intrusion Detection System (IDS) for an adaptive and incremental detection of both known and unknown attacks.
arXiv Detail & Related papers (2023-10-26T14:37:54Z) - Activity Detection for Grant-Free NOMA in Massive IoT Networks [14.43600694600554]
We propose a deep learning (DL)-based method called convolutional neural network (CNN)-activity detection (AD)
Our simulations verify that our proposed CNN-AD method can achieve higher performance compared to the existing non-Bayesian greedy-based methods.
arXiv Detail & Related papers (2022-12-23T03:44:00Z) - Black-box Dataset Ownership Verification via Backdoor Watermarking [67.69308278379957]
We formulate the protection of released datasets as verifying whether they are adopted for training a (suspicious) third-party model.
We propose to embed external patterns via backdoor watermarking for the ownership verification to protect them.
Specifically, we exploit poison-only backdoor attacks ($e.g.$, BadNets) for dataset watermarking and design a hypothesis-test-guided method for dataset verification.
arXiv Detail & Related papers (2022-08-04T05:32:20Z) - Collaborative Self Organizing Map with DeepNNs for Fake Task Prevention
in Mobile Crowdsensing [26.6224977032229]
Mobile Crowdsensing (MCS) is a sensing paradigm that has transformed the way that various service providers collect, process, and analyze data.
Various threats, such as data poisoning, clogging task attacks and fake sensing tasks adversely affect the performance of MCS systems.
In this work, Self Organizing Feature Map (SOFM), an artificial neural network that is trained in an unsupervised manner, is utilized to pre-cluster the legitimate data in the dataset.
arXiv Detail & Related papers (2022-02-17T04:56:28Z) - Active Learning for Deep Neural Networks on Edge Devices [0.0]
This paper formalizes a practical active learning problem for neural networks on edge devices.
We propose a general task-agnostic framework to tackle this problem, which reduces it to a stream submodular property.
We evaluate our approach on both classification and object detection tasks in a practical setting to simulate a real-life scenario.
arXiv Detail & Related papers (2021-06-21T03:55:33Z) - Out-of-Distribution Detection for Automotive Perception [58.34808836642603]
Neural networks (NNs) are widely used for object classification in autonomous driving.
NNs can fail on input data not well represented by the training dataset, known as out-of-distribution (OOD) data.
This paper presents a method for determining whether inputs are OOD, which does not require OOD data during training and does not increase the computational cost of inference.
arXiv Detail & Related papers (2020-11-03T01:46:35Z) - ZSTAD: Zero-Shot Temporal Activity Detection [107.63759089583382]
We propose a novel task setting called zero-shot temporal activity detection (ZSTAD), where activities that have never been seen in training can still be detected.
We design an end-to-end deep network based on R-C3D as the architecture for this solution.
Experiments on both the THUMOS14 and the Charades datasets show promising performance in terms of detecting unseen activities.
arXiv Detail & Related papers (2020-03-12T02:40:36Z) - CryptoSPN: Privacy-preserving Sum-Product Network Inference [84.88362774693914]
We present a framework for privacy-preserving inference of sum-product networks (SPNs)
CryptoSPN achieves highly efficient and accurate inference in the order of seconds for medium-sized SPNs.
arXiv Detail & Related papers (2020-02-03T14:49:18Z) - An Intelligent and Time-Efficient DDoS Identification Framework for
Real-Time Enterprise Networks SAD-F: Spark Based Anomaly Detection Framework [0.5811502603310248]
We will be exploring security analytic techniques for DDoS anomaly detection using different machine learning techniques.
In this paper, we are proposing a novel approach which deals with real traffic as input to the system.
We study and compare the performance factor of our proposed framework on three different testbeds.
arXiv Detail & Related papers (2020-01-21T06:05:48Z) - Deep Learning based Pedestrian Inertial Navigation: Methods, Dataset and
On-Device Inference [49.88536971774444]
Inertial measurements units (IMUs) are small, cheap, energy efficient, and widely employed in smart devices and mobile robots.
Exploiting inertial data for accurate and reliable pedestrian navigation supports is a key component for emerging Internet-of-Things applications and services.
We present and release the Oxford Inertial Odometry dataset (OxIOD), a first-of-its-kind public dataset for deep learning based inertial navigation research.
arXiv Detail & Related papers (2020-01-13T04:41:54Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.