{"title":"一种基于机器学习的虚拟专用网流量检测、分类和隐藏方法","authors":"J. Fesl , M. Naas","doi":"10.1016/j.comnet.2025.111530","DOIUrl":null,"url":null,"abstract":"<div><div>Virtual private networks (VPNs) are often used today for remote access to corporate networks or to access information resources limited to specific IP ranges or specific geolocations. Reliable detection and classification of normal or encrypted VPN traffic is a non-trivial task that has not yet been reliably solved. In our research, we created a large dataset containing samples of network traffic of different VPN protocols. We used the dataset to build nine machine learning (ML) models and compared their efficiency. Our best ML models can detect VPN network traffic with very high accuracy, subsequently classify the type of VPN protocol, and evaluate the content of traffic transported via the encrypted VPN protocols. To validate the robustness of our models, we invented and applied various VPN traffic detection obfuscation methods whose usage may interfere with network traffic identification and classification. Such methods can also be used to design and implement more secure next-generation VPN protocols that will be potentially not detectable by methods based on ML models.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"270 ","pages":"Article 111530"},"PeriodicalIF":4.4000,"publicationDate":"2025-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A comprehensive machine learning-based approach for virtual private network traffic detection, classification and hiding\",\"authors\":\"J. Fesl , M. Naas\",\"doi\":\"10.1016/j.comnet.2025.111530\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>Virtual private networks (VPNs) are often used today for remote access to corporate networks or to access information resources limited to specific IP ranges or specific geolocations. Reliable detection and classification of normal or encrypted VPN traffic is a non-trivial task that has not yet been reliably solved. In our research, we created a large dataset containing samples of network traffic of different VPN protocols. We used the dataset to build nine machine learning (ML) models and compared their efficiency. Our best ML models can detect VPN network traffic with very high accuracy, subsequently classify the type of VPN protocol, and evaluate the content of traffic transported via the encrypted VPN protocols. To validate the robustness of our models, we invented and applied various VPN traffic detection obfuscation methods whose usage may interfere with network traffic identification and classification. Such methods can also be used to design and implement more secure next-generation VPN protocols that will be potentially not detectable by methods based on ML models.</div></div>\",\"PeriodicalId\":50637,\"journal\":{\"name\":\"Computer Networks\",\"volume\":\"270 \",\"pages\":\"Article 111530\"},\"PeriodicalIF\":4.4000,\"publicationDate\":\"2025-07-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computer Networks\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S1389128625004979\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Networks","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1389128625004979","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
A comprehensive machine learning-based approach for virtual private network traffic detection, classification and hiding
Virtual private networks (VPNs) are often used today for remote access to corporate networks or to access information resources limited to specific IP ranges or specific geolocations. Reliable detection and classification of normal or encrypted VPN traffic is a non-trivial task that has not yet been reliably solved. In our research, we created a large dataset containing samples of network traffic of different VPN protocols. We used the dataset to build nine machine learning (ML) models and compared their efficiency. Our best ML models can detect VPN network traffic with very high accuracy, subsequently classify the type of VPN protocol, and evaluate the content of traffic transported via the encrypted VPN protocols. To validate the robustness of our models, we invented and applied various VPN traffic detection obfuscation methods whose usage may interfere with network traffic identification and classification. Such methods can also be used to design and implement more secure next-generation VPN protocols that will be potentially not detectable by methods based on ML models.
期刊介绍:
Computer Networks is an international, archival journal providing a publication vehicle for complete coverage of all topics of interest to those involved in the computer communications networking area. The audience includes researchers, managers and operators of networks as well as designers and implementors. The Editorial Board will consider any material for publication that is of interest to those groups.