Robust Machine Learning for Encrypted Traffic Classification

Citation Author(s):
Amit Dvir, Yehonatan Zion, Jonathan Muehlstein, Ofir Pele, Ran Dubin
Submitted by:
Amit Dvir
Last updated:
Tue, 05/17/2022 - 22:17
DOI:
10.21227/H2M37M
Data Format:
Research Article Link:
Links:
License:
0
0 ratings - Please login to submit your rating.

Abstract 

Desktops and laptops can be maliciously exploited to violate privacy. In this paper, we consider the daily battle between the passive attacker who is targeting a specific user against a user that may be adversarial opponent. In this scenario, while the attacker tries to choose the best vector attack by surreptitiously monitoring the victim’s encrypted network traffic in order to identify user’s parameters such as the Operating System (OS), browser and apps. The user may use tools such as a Virtual Private Network (VPN) or even change protocols parameters to protect his/her privacy. We provide a large dataset of more than 20,000 examples for this task. We run a comprehensive set of experiments, that achieves high (above 85%) classification accuracy, robustness and resilience to changes of features as a function of different network conditions at test time. We also show the effect of a small training set on the accuracy.

Instructions: 

The following files are raw cpapture files used in our research.