Javascript must be enabled to continue!
Enhanced Encrypted Traffic Analysis Leveraging Graph Neural Networks and Optimized Feature Dimensionality Reduction
View through CrossRef
With the continuously growing requirement for encryption in network environments, web browsers are increasingly employing hypertext transfer protocol security. Despite the increase in encrypted malicious network traffic, the encryption itself limits the data accessible for analyzing such behavior. To mitigate this, several studies have examined encrypted network traffic by analyzing metadata and payload bytes. Recent studies have furthered this approach, utilizing graph neural networks to analyze the structural data patterns within malicious encrypted traffic. This study proposed an enhanced encrypted traffic analysis leveraging graph neural networks which can model the symmetric or asymmetric spatial relations between nodes in the traffic network and optimized feature dimensionality reduction. It classified malicious network traffic by leveraging key features, including the IP address, port, CipherSuite, MessageLen, and JA3 features within the transport-layer-security session data, and then analyzed the correlation between normal and malicious network traffic data. The proposed approach outperformed previous models in terms of efficiency, using fewer features while maintaining a high accuracy rate of 99.5%. This demonstrates its research value as it can classify malicious network traffic with a high accuracy based on fewer features.
Title: Enhanced Encrypted Traffic Analysis Leveraging Graph Neural Networks and Optimized Feature Dimensionality Reduction
Description:
With the continuously growing requirement for encryption in network environments, web browsers are increasingly employing hypertext transfer protocol security.
Despite the increase in encrypted malicious network traffic, the encryption itself limits the data accessible for analyzing such behavior.
To mitigate this, several studies have examined encrypted network traffic by analyzing metadata and payload bytes.
Recent studies have furthered this approach, utilizing graph neural networks to analyze the structural data patterns within malicious encrypted traffic.
This study proposed an enhanced encrypted traffic analysis leveraging graph neural networks which can model the symmetric or asymmetric spatial relations between nodes in the traffic network and optimized feature dimensionality reduction.
It classified malicious network traffic by leveraging key features, including the IP address, port, CipherSuite, MessageLen, and JA3 features within the transport-layer-security session data, and then analyzed the correlation between normal and malicious network traffic data.
The proposed approach outperformed previous models in terms of efficiency, using fewer features while maintaining a high accuracy rate of 99.
5%.
This demonstrates its research value as it can classify malicious network traffic with a high accuracy based on fewer features.
Related Results
Traffic Prediction in 5G Networks Using Machine Learning
Traffic Prediction in 5G Networks Using Machine Learning
The advent of 5G technology promises a paradigm shift in the realm of
telecommunications, offering unprecedented speeds and connectivity. However, the
...
TYPES OF AI ALGORİTHMS USED İN TRAFFİC FLOW PREDİCTİON
TYPES OF AI ALGORİTHMS USED İN TRAFFİC FLOW PREDİCTİON
The increasing complexity of urban transportation systems and the growing volume of vehicles have made traffic congestion a persistent challenge in modern cities. Efficient traffic...
Fuzzy Chaotic Neural Networks
Fuzzy Chaotic Neural Networks
An understanding of the human brain’s local function has improved in recent years. But the cognition of human brain’s working process as a whole is still obscure. Both fuzzy logic ...
A high-dimensionality-trait-driven learning paradigm for high dimensional credit classification
A high-dimensionality-trait-driven learning paradigm for high dimensional credit classification
AbstractTo solve the high-dimensionality issue and improve its accuracy in credit risk assessment, a high-dimensionality-trait-driven learning paradigm is proposed for feature extr...
Explainable Anomaly Detection in Encrypted Network Traffic Using Data Analytics
Explainable Anomaly Detection in Encrypted Network Traffic Using Data Analytics
The unsanctioned growth of the encrypted network traffic is a two-sided problem for the cybersecurity, on one hand, it preserves the privacy of the users, and, on the other hand, i...
On the role of network dynamics for information processing in artificial and biological neural networks
On the role of network dynamics for information processing in artificial and biological neural networks
Understanding how interactions in complex systems give rise to various collective behaviours has been of interest for researchers across a wide range of fields. However, despite ma...
Advanced Feature Selection Techniques for Machine Learning-Based Detection of Encrypted Malicious Traffic
Advanced Feature Selection Techniques for Machine Learning-Based Detection of Encrypted Malicious Traffic
The increasing prevalence of encrypted traffic in modern networks presents significant challenges in detecting malicious activities, necessitating advanced techniques for effective...
MODELİNG OF TRAFFİC LİGHT CONTROL SYSTEMS
MODELİNG OF TRAFFİC LİGHT CONTROL SYSTEMS
Traffic light control systems are commonly utilized to monitor and manage the flow of autos across multiple road intersections. Since traffic jams are ubiquitous in daily life, A c...

