A Mobile Application-Classifying Method Based on a Graph Attention Network from Encrypted Network Traffic

Classifying mobile applications from encrypted network traffic is a common and basic requirement in network security and network management. Existing works classify mobile applications from flows, based on which application fingerprints and classifiers are created. However, mobile applications often...

Full description

Bibliographic Details
Main Authors: Guoliang Xu, Ming Xu, Yunzhi Chen, Jiaqi Zhao
Format: Article
Language:English
Published: MDPI AG 2023-05-01
Series:Electronics
Subjects:
Online Access:https://www.mdpi.com/2079-9292/12/10/2313
_version_ 1797600372370440192
author Guoliang Xu
Ming Xu
Yunzhi Chen
Jiaqi Zhao
author_facet Guoliang Xu
Ming Xu
Yunzhi Chen
Jiaqi Zhao
author_sort Guoliang Xu
collection DOAJ
description Classifying mobile applications from encrypted network traffic is a common and basic requirement in network security and network management. Existing works classify mobile applications from flows, based on which application fingerprints and classifiers are created. However, mobile applications often generate concurrent flows with varying degrees of ties, such as low discriminative flows across applications and application-specific flows. So flow-based methods suffer from low accuracy. In this paper, a novel mobile application-classifying method is proposed, capturing relationships between flows and paying attention to their importance. To capture the inter-flow relationships, the proposed method slices raw mobile traffic into traffic chunks to represent flows as nodes, embeds statistical features into nodes, and adds edges according to cross-correlations between the nodes. To pay different attention to the various flows, the proposed method builds a deep learning model based on graph attention networks, implicitly assigning importance values to flows via graph attention layers. Compared to recently developed techniques on a large dataset with 101 popular apps using the Android platform, the proposed method improved by 4–20% for accuracy, precision, recall, and F1 score, and spent much less time training.
first_indexed 2024-03-11T03:47:10Z
format Article
id doaj.art-ddadcd778ced4d2aa37f157289e201c3
institution Directory Open Access Journal
issn 2079-9292
language English
last_indexed 2024-03-11T03:47:10Z
publishDate 2023-05-01
publisher MDPI AG
record_format Article
series Electronics
spelling doaj.art-ddadcd778ced4d2aa37f157289e201c32023-11-18T01:10:39ZengMDPI AGElectronics2079-92922023-05-011210231310.3390/electronics12102313A Mobile Application-Classifying Method Based on a Graph Attention Network from Encrypted Network TrafficGuoliang Xu0Ming Xu1Yunzhi Chen2Jiaqi Zhao3School of Cyberspace, Hangzhou Dianzi University, Hangzhou 310018, ChinaSchool of Cyberspace, Hangzhou Dianzi University, Hangzhou 310018, ChinaSchool of lnformation Engineering, Hangzhou Vocational & Technical College, Hangzhou 310018, ChinaSchool of Cyberspace, Hangzhou Dianzi University, Hangzhou 310018, ChinaClassifying mobile applications from encrypted network traffic is a common and basic requirement in network security and network management. Existing works classify mobile applications from flows, based on which application fingerprints and classifiers are created. However, mobile applications often generate concurrent flows with varying degrees of ties, such as low discriminative flows across applications and application-specific flows. So flow-based methods suffer from low accuracy. In this paper, a novel mobile application-classifying method is proposed, capturing relationships between flows and paying attention to their importance. To capture the inter-flow relationships, the proposed method slices raw mobile traffic into traffic chunks to represent flows as nodes, embeds statistical features into nodes, and adds edges according to cross-correlations between the nodes. To pay different attention to the various flows, the proposed method builds a deep learning model based on graph attention networks, implicitly assigning importance values to flows via graph attention layers. Compared to recently developed techniques on a large dataset with 101 popular apps using the Android platform, the proposed method improved by 4–20% for accuracy, precision, recall, and F1 score, and spent much less time training.https://www.mdpi.com/2079-9292/12/10/2313traffic classificationmobile application identificationencrypted trafficgraph attention networks
spellingShingle Guoliang Xu
Ming Xu
Yunzhi Chen
Jiaqi Zhao
A Mobile Application-Classifying Method Based on a Graph Attention Network from Encrypted Network Traffic
Electronics
traffic classification
mobile application identification
encrypted traffic
graph attention networks
title A Mobile Application-Classifying Method Based on a Graph Attention Network from Encrypted Network Traffic
title_full A Mobile Application-Classifying Method Based on a Graph Attention Network from Encrypted Network Traffic
title_fullStr A Mobile Application-Classifying Method Based on a Graph Attention Network from Encrypted Network Traffic
title_full_unstemmed A Mobile Application-Classifying Method Based on a Graph Attention Network from Encrypted Network Traffic
title_short A Mobile Application-Classifying Method Based on a Graph Attention Network from Encrypted Network Traffic
title_sort mobile application classifying method based on a graph attention network from encrypted network traffic
topic traffic classification
mobile application identification
encrypted traffic
graph attention networks
url https://www.mdpi.com/2079-9292/12/10/2313
work_keys_str_mv AT guoliangxu amobileapplicationclassifyingmethodbasedonagraphattentionnetworkfromencryptednetworktraffic
AT mingxu amobileapplicationclassifyingmethodbasedonagraphattentionnetworkfromencryptednetworktraffic
AT yunzhichen amobileapplicationclassifyingmethodbasedonagraphattentionnetworkfromencryptednetworktraffic
AT jiaqizhao amobileapplicationclassifyingmethodbasedonagraphattentionnetworkfromencryptednetworktraffic
AT guoliangxu mobileapplicationclassifyingmethodbasedonagraphattentionnetworkfromencryptednetworktraffic
AT mingxu mobileapplicationclassifyingmethodbasedonagraphattentionnetworkfromencryptednetworktraffic
AT yunzhichen mobileapplicationclassifyingmethodbasedonagraphattentionnetworkfromencryptednetworktraffic
AT jiaqizhao mobileapplicationclassifyingmethodbasedonagraphattentionnetworkfromencryptednetworktraffic