Recognition of Abnormal Proxy Voice Traffic in 5G Environment Based on Deep Learning*

Hongce Zhao, Shunliang Zhang, Xianjin Huang, Zhuang Qiao, Xiaohui Zhang, Guanglei Wu
{"title":"Recognition of Abnormal Proxy Voice Traffic in 5G Environment Based on Deep Learning*","authors":"Hongce Zhao, Shunliang Zhang, Xianjin Huang, Zhuang Qiao, Xiaohui Zhang, Guanglei Wu","doi":"10.1109/MSN57253.2022.00070","DOIUrl":null,"url":null,"abstract":"With the commercial use of the fifth generation (5G), the rapid popularization of mobile Over- The- Top (OTT) voice applications has brought high-quality voice communication methods to users. The intelligent Internet in the 5G era makes communication terminals not limited to mobile phones. The complex communication environment has higher requirements for the security of data transmission between various terminals to prevent the system from being monitored or breached. At present, many OTT users use encrypted proxy technology to get rid of certain restrictions of network operators, prevent their private information from leaking, and ensure communication security. However, in some cases the encryption proxy may be subject to configuration error or maliciously attacked makes the encryption ineffective. The resulting abnormal proxy traffic may cause privacy leakage when users use voice services. However, little effort has been put on fingerprint the effectiveness of encryption for proxy voice traffic in a 5G environment. To this end, we adopt the VGG deep learning method to identify agent speech traffic, compare it with common deep learning methods, and study the impact on model performance with less abnormal traffic. Extensive experimental results show that the deep learning method we use can identify abnormal encrypted proxy voice traffic with the accuracy up to 99.77%. Moreover, VGG outperform other DL methods on indentifying the encryption algorithms of normal encrypted proxy traffic.","PeriodicalId":114459,"journal":{"name":"2022 18th International Conference on Mobility, Sensing and Networking (MSN)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 18th International Conference on Mobility, Sensing and Networking (MSN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MSN57253.2022.00070","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

With the commercial use of the fifth generation (5G), the rapid popularization of mobile Over- The- Top (OTT) voice applications has brought high-quality voice communication methods to users. The intelligent Internet in the 5G era makes communication terminals not limited to mobile phones. The complex communication environment has higher requirements for the security of data transmission between various terminals to prevent the system from being monitored or breached. At present, many OTT users use encrypted proxy technology to get rid of certain restrictions of network operators, prevent their private information from leaking, and ensure communication security. However, in some cases the encryption proxy may be subject to configuration error or maliciously attacked makes the encryption ineffective. The resulting abnormal proxy traffic may cause privacy leakage when users use voice services. However, little effort has been put on fingerprint the effectiveness of encryption for proxy voice traffic in a 5G environment. To this end, we adopt the VGG deep learning method to identify agent speech traffic, compare it with common deep learning methods, and study the impact on model performance with less abnormal traffic. Extensive experimental results show that the deep learning method we use can identify abnormal encrypted proxy voice traffic with the accuracy up to 99.77%. Moreover, VGG outperform other DL methods on indentifying the encryption algorithms of normal encrypted proxy traffic.
基于深度学习的5G环境下异常代理语音流量识别*
随着第五代(5G)技术的商用,移动OTT (Over- the - Top)语音应用的快速普及,为用户带来了高质量的语音通信方式。5G时代的智能互联网使得通信终端不再局限于手机。复杂的通信环境对各终端之间数据传输的安全性提出了更高的要求,以防止系统被监控或破坏。目前,很多OTT用户使用加密代理技术来摆脱网络运营商的一定限制,防止自己的私人信息泄露,保证通信安全。但是,在某些情况下,加密代理可能会受到配置错误或恶意攻击,使加密无效。由此导致的代理流量异常,可能导致用户使用语音业务时隐私泄露。然而,在5G环境下代理语音流量加密的有效性方面,几乎没有人付出努力。为此,我们采用VGG深度学习方法识别智能体语音流量,并与常用的深度学习方法进行比较,研究异常流量较少对模型性能的影响。大量的实验结果表明,我们使用的深度学习方法可以识别异常加密代理语音流量,准确率高达99.77%。此外,VGG在识别普通加密代理流量的加密算法方面优于其他DL方法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信