{"title":"VPN Traffic Identification Based on Tunneling Protocol Characteristics","authors":"Yu Li, Fei Wang, Shuhui Chen","doi":"10.1109/CCET55412.2022.9906397","DOIUrl":null,"url":null,"abstract":"Virtual Private Network (VPN) provides a secure, encrypted, and anonymous communication between remote networks. More and more people are inclined to use, with the raising network security and privacy protection awareness. However, VPNs are also widely abused by malicious pursuers, and thereby distinguishing VPN traffic for father judgment is of the utmost importance for network supervision. In this paper, we focus on the characteristics of VPN tunneling protocols, and then extract four categories of traffic features, including two novel entropy features, for VPN traffic identification. Feature evaluation upon real-world VPN traffic demonstrates, that all these features can notably embody differences between VPN and Non-VPN traffic, and the entropy features work still well even when applications traffic is mixed. Finally, the proposed VPN traffic identification method achieves the accuracy of 99.02% and 95.32% respectively on self-gathered and public VPN datasets, remarkably higher than the existing research.","PeriodicalId":329327,"journal":{"name":"2022 IEEE 5th International Conference on Computer and Communication Engineering Technology (CCET)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE 5th International Conference on Computer and Communication Engineering Technology (CCET)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCET55412.2022.9906397","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Virtual Private Network (VPN) provides a secure, encrypted, and anonymous communication between remote networks. More and more people are inclined to use, with the raising network security and privacy protection awareness. However, VPNs are also widely abused by malicious pursuers, and thereby distinguishing VPN traffic for father judgment is of the utmost importance for network supervision. In this paper, we focus on the characteristics of VPN tunneling protocols, and then extract four categories of traffic features, including two novel entropy features, for VPN traffic identification. Feature evaluation upon real-world VPN traffic demonstrates, that all these features can notably embody differences between VPN and Non-VPN traffic, and the entropy features work still well even when applications traffic is mixed. Finally, the proposed VPN traffic identification method achieves the accuracy of 99.02% and 95.32% respectively on self-gathered and public VPN datasets, remarkably higher than the existing research.