{"title":"使用深度学习加密5G超顶级语音流量分类","authors":"Zhuang Qiao, Shunliang Zhang, Liuqun Zhai, Xiaohui Zhang","doi":"10.52953/eyif3681","DOIUrl":null,"url":null,"abstract":"With the commercialization of fifth-generation (5G), the rapid popularity of mobile Over-The-Top (OTT) voice applications brings huge impacts on the traditional telecommunication voice call services. Tunnel encryption technology such as Virtual Private Networks (VPNs) allow OTT users to escape the supervision of network operators easily, which may cause potential security risks to cyberspace. To monitor harmful OTT applications in the context of 5G, it is critical to identify encrypted OTT voice traffic. However, there is no comprehensive study on typical OTT voice traffic identification. This paper mainly focuses on analyzing OTT voice traffic in the 5G network specifically. We propose employing Long Short-Term Memory (LSTM) and Convolutional Neural Networks (CNNs) to identify encrypted 5G OTT voice traffic, study the identification performance of used deep learning methods in three different scenarios. To verify the performance of the proposed approach, we collect 28 types of typical OTT and non-OTT voice traffic from the experimental 5G network. Experimental results prove the effectiveness and robustness of the proposed approach in encrypted 5G OTT voice traffic identification.","PeriodicalId":274720,"journal":{"name":"ITU Journal on Future and Evolving Technologies","volume":"188 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Encrypted 5G over-the-top voice traffic classification using deep learning\",\"authors\":\"Zhuang Qiao, Shunliang Zhang, Liuqun Zhai, Xiaohui Zhang\",\"doi\":\"10.52953/eyif3681\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the commercialization of fifth-generation (5G), the rapid popularity of mobile Over-The-Top (OTT) voice applications brings huge impacts on the traditional telecommunication voice call services. Tunnel encryption technology such as Virtual Private Networks (VPNs) allow OTT users to escape the supervision of network operators easily, which may cause potential security risks to cyberspace. To monitor harmful OTT applications in the context of 5G, it is critical to identify encrypted OTT voice traffic. However, there is no comprehensive study on typical OTT voice traffic identification. This paper mainly focuses on analyzing OTT voice traffic in the 5G network specifically. We propose employing Long Short-Term Memory (LSTM) and Convolutional Neural Networks (CNNs) to identify encrypted 5G OTT voice traffic, study the identification performance of used deep learning methods in three different scenarios. To verify the performance of the proposed approach, we collect 28 types of typical OTT and non-OTT voice traffic from the experimental 5G network. Experimental results prove the effectiveness and robustness of the proposed approach in encrypted 5G OTT voice traffic identification.\",\"PeriodicalId\":274720,\"journal\":{\"name\":\"ITU Journal on Future and Evolving Technologies\",\"volume\":\"188 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-12-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"ITU Journal on Future and Evolving Technologies\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.52953/eyif3681\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"ITU Journal on Future and Evolving Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.52953/eyif3681","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Encrypted 5G over-the-top voice traffic classification using deep learning
With the commercialization of fifth-generation (5G), the rapid popularity of mobile Over-The-Top (OTT) voice applications brings huge impacts on the traditional telecommunication voice call services. Tunnel encryption technology such as Virtual Private Networks (VPNs) allow OTT users to escape the supervision of network operators easily, which may cause potential security risks to cyberspace. To monitor harmful OTT applications in the context of 5G, it is critical to identify encrypted OTT voice traffic. However, there is no comprehensive study on typical OTT voice traffic identification. This paper mainly focuses on analyzing OTT voice traffic in the 5G network specifically. We propose employing Long Short-Term Memory (LSTM) and Convolutional Neural Networks (CNNs) to identify encrypted 5G OTT voice traffic, study the identification performance of used deep learning methods in three different scenarios. To verify the performance of the proposed approach, we collect 28 types of typical OTT and non-OTT voice traffic from the experimental 5G network. Experimental results prove the effectiveness and robustness of the proposed approach in encrypted 5G OTT voice traffic identification.