Peng Zhu, G. Wang, Jing He, Yu Chang, Lingfei Kong, Jiewei Liu
{"title":"Encrypted Traffic Protocol Identification Based on Temporal and Spatial Features","authors":"Peng Zhu, G. Wang, Jing He, Yu Chang, Lingfei Kong, Jiewei Liu","doi":"10.1109/AINIT59027.2023.10212827","DOIUrl":null,"url":null,"abstract":"Cryptographic technology is the foundation and key to securing cyberspace, but there are still widespread cases of non-compliance and incorrectness in cryptographic applications, especially commercial cryptographic applications, etc. Detecting the compliance of encryption protocol cipher suites is an important part of carrying out cryptographic evaluation. Aiming at the difficult problems such as insufficient and insignificant extraction of encrypted traffic protocol features and poor effect of encrypted traffic protocol identification model, the concept of network traffic temporal relationship is invoked to comprehensively extract and learn the encrypted traffic protocol temporal features and control the redundant feature weights to highlight the key features in order to improve the identification accuracy. Through comparative experiments, we analyze the influence of temporal and spatial features on recognition effect, fuse spatio-temporal features of traffic, and propose a Transformer and Attention_CNN (TAC) fusion model of encrypted traffic protocol recognition to solve the problem of low accuracy of single feature recognition. The experimental results show that the proposed scheme can effectively distinguish various network protocols and accomplish the purpose of verifying the compliance of cipher suites in encryption protocols.","PeriodicalId":276778,"journal":{"name":"2023 4th International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 4th International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AINIT59027.2023.10212827","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Cryptographic technology is the foundation and key to securing cyberspace, but there are still widespread cases of non-compliance and incorrectness in cryptographic applications, especially commercial cryptographic applications, etc. Detecting the compliance of encryption protocol cipher suites is an important part of carrying out cryptographic evaluation. Aiming at the difficult problems such as insufficient and insignificant extraction of encrypted traffic protocol features and poor effect of encrypted traffic protocol identification model, the concept of network traffic temporal relationship is invoked to comprehensively extract and learn the encrypted traffic protocol temporal features and control the redundant feature weights to highlight the key features in order to improve the identification accuracy. Through comparative experiments, we analyze the influence of temporal and spatial features on recognition effect, fuse spatio-temporal features of traffic, and propose a Transformer and Attention_CNN (TAC) fusion model of encrypted traffic protocol recognition to solve the problem of low accuracy of single feature recognition. The experimental results show that the proposed scheme can effectively distinguish various network protocols and accomplish the purpose of verifying the compliance of cipher suites in encryption protocols.