首页> 外文OA文献 >VoIP Traffic Detection in Tunneled and Anonymous Networks Using Deep Learning
【2h】

VoIP Traffic Detection in Tunneled and Anonymous Networks Using Deep Learning

机译:使用深度学习的隧道和匿名网络中的VoIP流量检测

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

Network management is facing a great challenge to analyze and identify encrypted network traffic with specific applications and protocols. A significant number of network users applying different encryption techniques to network applications and services to hide the true nature of the network communication. These challenges attract the network community to improve network security and enhance network service quality. Network managers need novel techniques to cope with the failure and shortcomings of the port-based and payload-based classification methods of encrypted network traffic due to emergent security technologies. Mainly, the famous network hopping mechanisms used to make network traffic unknown and anonymous are VPN (virtual private network) and TOR (Onion Router). This paper presents a novel scheme to unveil encrypted network traffic and easily identify the tunneled and anonymous network traffic. The proposed identification scheme uses the highly desirable deep learning techniques to easily and efficiently identify the anonymous network traffic and extract the Voice over IP (VoIP) and Non VoIP ones within encrypted traffic flows. Finally, the captured traffic has been classified into four different categories, i-e., VPN VoIP, VPN Non-VoIP, TOR VoIP, and TOR Non-VoIP. The experimental results show that our identification engine is extremely robust to VPN and TOR network traffic.
机译:网络管理正面临着分析和识别具有特定应用程序和协议的加密网络流量的巨大挑战。大量网络用户将不同的加密技术应用于网络应用程序和服务以隐藏网络通信的真实性质。这些挑战吸引了网络社区,以提高网络安全,提高网络服务质量。网络经理需要新颖的技术来应对基于端口和基于有效载荷的基于有效载荷的分类方法的失败和缺陷,由于紧急安全技术为基于加密的网络流量的加密网络流量的分类方法。主要是,用于使网络流量未知和匿名的着名网络跳跃机制是VPN(虚拟专用网络)和TOR(洋葱路由器)。本文提出了一种新颖的计划,用于揭示加密的网络流量,并且容易识别隧道和匿名网络流量。所提出的识别方案使用非常理想的深度学习技术来容易和有效地识别匿名网络流量,并在加密的业务流中提取IP语音(VoIP)和非VoIP Oner。最后,捕获的流量已被分为四种不同类别,I-E。,VPN VoIP,VPN非VoIP,Tor VoIP和Tor非VoIP。实验结果表明,我们的识别引擎对VPN和TOR网络流量非常强大。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号