{"title":"Recognition of Abnormal Proxy Voice Traffic in 5G Environment Based on Deep Learning*","authors":"Hongce Zhao, Shunliang Zhang, Xianjin Huang, Zhuang Qiao, Xiaohui Zhang, Guanglei Wu","doi":"10.1109/MSN57253.2022.00070","DOIUrl":null,"url":null,"abstract":"With the commercial use of the fifth generation (5G), the rapid popularization of mobile Over- The- Top (OTT) voice applications has brought high-quality voice communication methods to users. The intelligent Internet in the 5G era makes communication terminals not limited to mobile phones. The complex communication environment has higher requirements for the security of data transmission between various terminals to prevent the system from being monitored or breached. At present, many OTT users use encrypted proxy technology to get rid of certain restrictions of network operators, prevent their private information from leaking, and ensure communication security. However, in some cases the encryption proxy may be subject to configuration error or maliciously attacked makes the encryption ineffective. The resulting abnormal proxy traffic may cause privacy leakage when users use voice services. However, little effort has been put on fingerprint the effectiveness of encryption for proxy voice traffic in a 5G environment. To this end, we adopt the VGG deep learning method to identify agent speech traffic, compare it with common deep learning methods, and study the impact on model performance with less abnormal traffic. Extensive experimental results show that the deep learning method we use can identify abnormal encrypted proxy voice traffic with the accuracy up to 99.77%. Moreover, VGG outperform other DL methods on indentifying the encryption algorithms of normal encrypted proxy traffic.","PeriodicalId":114459,"journal":{"name":"2022 18th International Conference on Mobility, Sensing and Networking (MSN)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 18th International Conference on Mobility, Sensing and Networking (MSN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MSN57253.2022.00070","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
With the commercial use of the fifth generation (5G), the rapid popularization of mobile Over- The- Top (OTT) voice applications has brought high-quality voice communication methods to users. The intelligent Internet in the 5G era makes communication terminals not limited to mobile phones. The complex communication environment has higher requirements for the security of data transmission between various terminals to prevent the system from being monitored or breached. At present, many OTT users use encrypted proxy technology to get rid of certain restrictions of network operators, prevent their private information from leaking, and ensure communication security. However, in some cases the encryption proxy may be subject to configuration error or maliciously attacked makes the encryption ineffective. The resulting abnormal proxy traffic may cause privacy leakage when users use voice services. However, little effort has been put on fingerprint the effectiveness of encryption for proxy voice traffic in a 5G environment. To this end, we adopt the VGG deep learning method to identify agent speech traffic, compare it with common deep learning methods, and study the impact on model performance with less abnormal traffic. Extensive experimental results show that the deep learning method we use can identify abnormal encrypted proxy voice traffic with the accuracy up to 99.77%. Moreover, VGG outperform other DL methods on indentifying the encryption algorithms of normal encrypted proxy traffic.
随着第五代(5G)技术的商用,移动OTT (Over- the - Top)语音应用的快速普及,为用户带来了高质量的语音通信方式。5G时代的智能互联网使得通信终端不再局限于手机。复杂的通信环境对各终端之间数据传输的安全性提出了更高的要求,以防止系统被监控或破坏。目前,很多OTT用户使用加密代理技术来摆脱网络运营商的一定限制,防止自己的私人信息泄露,保证通信安全。但是,在某些情况下,加密代理可能会受到配置错误或恶意攻击,使加密无效。由此导致的代理流量异常,可能导致用户使用语音业务时隐私泄露。然而,在5G环境下代理语音流量加密的有效性方面,几乎没有人付出努力。为此,我们采用VGG深度学习方法识别智能体语音流量,并与常用的深度学习方法进行比较,研究异常流量较少对模型性能的影响。大量的实验结果表明,我们使用的深度学习方法可以识别异常加密代理语音流量,准确率高达99.77%。此外,VGG在识别普通加密代理流量的加密算法方面优于其他DL方法。