[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3326285.3329053acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiwqosConference Proceedingsconference-collections
research-article

Encrypted traffic classification of decentralized applications on ethereum using feature fusion

Published: 24 June 2019 Publication History

Abstract

With the prevalence of blockchain, more and more Decentralized Applications (DApps) are deployed on Ethereum to achieve the goal of communicating without supervision. Users habits may be leaked while these applications adopt SSL/TLS to encrypt their transmission data. Encrypted protocol and the same blockchain platform bring challenges to the traffic classification of DApps. Existing encrypted traffic classification methods suffer from low accuracy in the situation of DApps.
In this paper, we design an efficient method to fuse features of different dimensions for DApp fingerprinting. We firstly analyze the reason why existing methods do not perform well before proposing to merge features of different dimensions. Then we fuse these features by a kernel function and propose a fusion feature selection method to select appropriate features to fuse. Applying features that have been fused to the machine learning algorithm can construct a strong classifier. The experiment results show that the accuracy of our method can reach more than 90%, which performs better than state-of-the-art classification approaches.

References

[1]
Giuseppe Aceto, Alberto Dainotti, Walter De Donato, and Antonio Pescape. 2010. PortLoad: Taking the Best of Two Worlds in Traffic Classification. In Infocom IEEE Conference on Computer Communications Workshops, 2010. 1--10.
[2]
Khaled Al-Naami, Swarup Chandra, Ahmad M. Mustafa, Latifur Khan, Zhiqiang Lin, Kevin W. Hamlen, and Bhavani M. Thuraisingham. 2016. Adaptive encrypted traffic fingerprinting with bi-directional dependence. In Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016. 177--188.
[3]
Diogo Barradas, Nuno Santos, and Luís Rodrigues. 2018. Effective Detection of Multimedia Protocol Tunneling using Machine Learning. In 27th USENIX Security Symposium, USENIX Security 2018. 169--185.
[4]
Xiang Cai, Rishab Nithyanand, Tao Wang, Rob Johnson, and Ian Goldberg. 2014. A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. 227--238.
[5]
Mauro Conti, Luigi Vincenzo Mancini, Riccardo Spolaor, and Nino Vincenzo Verde. 2016. Analyzing Android Encrypted Network Traffic to Identify User Actions. IEEE Trans. Information Forensics and Security 11, 1 (2016), 114--125.
[6]
Pietro Danzi, Anders Ellersgaard Kalør, Cedomir Stefanovic, and Petar Popovski. 2018. Analysis of the Communication Traffic for Blockchain Synchronization of IoT Devices. In 2018 IEEE International Conference on Communications, ICC 2018. 1--7.
[7]
Dapps. 2019. https://www.stateofthedapps.com/dapps?page=1.
[8]
Datasets. 2019. https://github.com/MovanZhang/TrafficDataofDapps/.
[9]
Xiaojiang Du and Hsiao-Hwa Chen. 2008. Security in wireless sensor networks. IEEE Wireless Commun. 15, 4 (2008), 60--66.
[10]
Xiaojiang Du, Mohsen Guizani, Yang Xiao, and Hsiao-Hwa Chen. 2009. Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks. IEEE Trans. Wireless Communications 8, 3 (2009), 1223--1229.
[11]
Xiaojiang Du, Yang Xiao, Mohsen Guizani, and Hsiao-Hwa Chen. 2007. An effective key management scheme for heterogeneous sensor networks. Ad Hoc Networks 5, 1 (2007), 24--34.
[12]
Ethereum. 2019. https://www.ethereum.org/.
[13]
Saman Feghhi and Douglas J. Leith. 2014. A Web Traffic Analysis Attack Using Only Timing Information. IEEE Transactions on Information Forensics & Security 11, 8 (2014), 1747--1759.
[14]
Michael Finsterbusch, Chris Richter, Jean Alexander Muller, Klaus Hanssgen, and Eduardo Rocha. 2014. A Survey of Payload-Based Traffic Classification Approaches. IEEE Communications Surveys & Tutorials 16, 2 (2014), 1135--1156.
[15]
Edita Grolman, Andrey Finkelstein, Rami Puzis, Asaf Shabtai, Gershon Celniker, Ziv Katzir, and Liron Rosenfeld. 2018. Transfer Learning for User Action Identication in Mobile Apps via Encrypted Trafc Analysis. IEEE Intelligent Systems 33, 2 (2018), 40--53.
[16]
Jamie Hayes and George Danezis. 2016. k-fingerprinting: A Robust Scalable Website Fingerprinting Technique. In 25th USENIX Security Symposium, USENIX Security 16. 1187--1203.
[17]
Maciej Korczynski and Andrzej Duda. 2014. Markov chain fingerprinting to classify encrypted traffic. In 2014 IEEE Conference on Computer Communications, INFOCOM 2014. 781--789.
[18]
Philip Koshy, Diana Koshy, and Patrick D. McDaniel. 2014. An Analysis of Anonymity in Bitcoin Using P2P Network Traffic. In Financial Cryptography and Data Security - 18th International Conference, FC 2014. 469--485.
[19]
Sarah Meiklejohn, Marjori Pomarole, Grant Jordan, Kirill Levchenko, Damon McCoy, Geoffrey M. Voelker, and Stefan Savage. 2013. A fistful of bitcoins: characterizing payments among men with no names. In Proceedings of the 2013 Internet Measurement Conference, IMC 2013. 127--140.
[20]
Andriy Panchenko, Fabian Lanze, Jan Pennekamp, Thomas Engel, Andreas Zinnen, Martin Henze, and Klaus Wehrle. 2016. Website Fingerprinting at Internet Scale. In 23rd Annual Network and Distributed System Security Symposium, NDSS 2016. 1--15.
[21]
Roei Schuster, Vitaly Shmatikov, and Eran Tromer. 2017. Beauty and the Burst: Remote Identification of Encrypted Video Streams. In 26th USENIX Security Symposium (USENIX Security 17). USENIX Association, Vancouver, BC, 1357--1374.
[22]
Meng Shen, Baoli Ma, Liehuang Zhu, Rashid Mijumbi, Xiaojiang Du, and Jiankun Hu. 2018. Cloud-Based Approximate Constrained Shortest Distance Queries Over Encrypted Graphs With Privacy Protection. IEEE Trans. Information Forensics and Security 13, 4 (2018), 940--953.
[23]
Meng Shen, Xiangyun Tang, Liehuang Zhu, Xiaojiang Du, and Mohsen Guizani. 2019. Privacy-Preserving Support Vector Machine Training over Blockchain-Based Encrypted IoT Data in Smart Cities. IEEE Internet of Things Journal (2019), 1--1.
[24]
Meng Shen, Mingwei Wei, Liehuang Zhu, and Mingzhong Wang. 2017. Classification of Encrypted Traffic With Second-Order Markov Chains and Application Attribute Bigrams. IEEE Trans. Information Forensics and Security 12, 8 (2017), 1830--1843.
[25]
Meng Shen, Mingwei Wei, Liehuang Zhu, Mingzhong Wang, and Fuliang Li. 2016. Certificate-aware encrypted traffic classification using Second-Order Markov Chain. In 24th IEEE/ACM International Symposium on Quality of Service, IWQoS 2016. 1--10.
[26]
Vincent F. Taylor, Riccardo Spolaor, Mauro Conti, and Ivan Martinovic. 2016. AppScanner: Automatic Fingerprinting of Smartphone Apps from Encrypted Network Traffic. In IEEE European Symposium on Security and Privacy, EuroS&P 2016, Saarbrücken, Germany, March 21--24, 2016. 439--454.
[27]
Tao Wang and Ian Goldberg. 2016. On Realistically Attacking Tor with Website Fingerprinting. PoPETs 2016, 4 (2016), 21--36.
[28]
Yang Xiao, Venkata Krishna Rayi, Bo Sun, Xiaojiang Du, Fei Hu, and Michael Galloway. 2007. A survey of key management schemes in wireless sensor networks. Computer Communications 30, 11--12 (2007), 2314--2341.
[29]
Hongyi Yao, Gyan Ranjan, Alok Tongaonkar, Yong Liao, and Zhuoqing Morley Mao. 2015. SAMPLES: Self Adaptive Mining of Persistent LExical Snippets for Classifying Mobile Application Traffic. In Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, MobiCom 2015. 439--451.
[30]
Liehuang Zhu, Xiangyun Tang, Meng Shen, Xiaojiang Du, and Mohsen Guizani. 2018. Privacy-Preserving DDoS Attack Detection Using Cross-Domain Traffic in Software Defined Networks. IEEE Journal on Selected Areas in Communications 36, 3 (2018), 628--643.

Cited By

View all
  • (2025)Bottom Aggregating, Top Separating: An Aggregator and Separator Network for Encrypted Traffic UnderstandingIEEE Transactions on Information Forensics and Security10.1109/TIFS.2025.352931620(1794-1806)Online publication date: 2025
  • (2025)A steganographic backdoor attack scheme on encrypted trafficPeer-to-Peer Networking and Applications10.1007/s12083-024-01893-718:2Online publication date: 17-Jan-2025
  • (2025)Encrypted Malware Traffic Detection Via Time-Frequency Domain AnalysisAlgorithms and Architectures for Parallel Processing10.1007/978-981-96-1548-3_7(98-110)Online publication date: 17-Feb-2025
  • Show More Cited By
  1. Encrypted traffic classification of decentralized applications on ethereum using feature fusion

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    IWQoS '19: Proceedings of the International Symposium on Quality of Service
    June 2019
    420 pages
    ISBN:9781450367783
    DOI:10.1145/3326285
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 24 June 2019

    Permissions

    Request permissions for this article.

    Check for updates

    Qualifiers

    • Research-article

    Conference

    IWQoS '19

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)43
    • Downloads (Last 6 weeks)3
    Reflects downloads up to 08 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2025)Bottom Aggregating, Top Separating: An Aggregator and Separator Network for Encrypted Traffic UnderstandingIEEE Transactions on Information Forensics and Security10.1109/TIFS.2025.352931620(1794-1806)Online publication date: 2025
    • (2025)A steganographic backdoor attack scheme on encrypted trafficPeer-to-Peer Networking and Applications10.1007/s12083-024-01893-718:2Online publication date: 17-Jan-2025
    • (2025)Encrypted Malware Traffic Detection Via Time-Frequency Domain AnalysisAlgorithms and Architectures for Parallel Processing10.1007/978-981-96-1548-3_7(98-110)Online publication date: 17-Feb-2025
    • (2024)CapsuleFormer: A Capsule and Transformer combined model for Decentralized Application encrypted traffic classificationProceedings of the 19th ACM Asia Conference on Computer and Communications Security10.1145/3634737.3637664(1418-1429)Online publication date: 1-Jul-2024
    • (2024)DGNN: Accurate Darknet Application Classification Adopting Attention Graph Neural NetworkIEEE Transactions on Network and Service Management10.1109/TNSM.2023.334458021:2(1660-1671)Online publication date: Apr-2024
    • (2024)gShock: A GNN-Based Fingerprinting System for Permissioned Blockchain Networks Over Encrypted ChannelsIEEE Access10.1109/ACCESS.2024.346958312(146328-146342)Online publication date: 2024
    • (2024)Method for multi-task learning fusion network traffic classification to address small sample labelsScientific Reports10.1038/s41598-024-51933-814:1Online publication date: 30-Jan-2024
    • (2024)User Behavior Identification via Traffic Analysis in Web 3.0Security and Privacy in Web 3.010.1007/978-981-97-5752-7_6(95-116)Online publication date: 10-Jul-2024
    • (2024)Anti-Packet-Loss Encrypted Traffic Classification via Masked AutoencoderWireless Artificial Intelligent Computing Systems and Applications10.1007/978-3-031-71464-1_7(79-92)Online publication date: 13-Nov-2024
    • (2024)A Cost-Sensitive Sparse Auto-encoder Based Feature Extraction for Network Traffic Classification Using CNNProceedings of 4th International Conference on Artificial Intelligence and Smart Energy10.1007/978-3-031-61471-2_17(231-244)Online publication date: 12-Jun-2024
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media