Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3634737.3637664acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article
Open access

CapsuleFormer: A Capsule and Transformer combined model for Decentralized Application encrypted traffic classification

Published: 01 July 2024 Publication History

Abstract

Network traffic classification plays a crucial role in both network management and monitoring. Recently, an increasing number of Decentralized Applications (DApps) are appearing on various blockchain platforms. DApps employ encryption techniques such as SSL/TLS to safeguard the data transmitted over the network, making it more challenging to do traffic classification. In this paper, to tackle the challenge of insufficient classification accuracy in the existing classification of encrypted DApp traffic, we present Capsule-Former, a novel encrypted traffic classification model for DApps. CapsuleFormer utilizes capsule neurons instead of traditional scalar neurons, where the neurons within the capsule embody various attributes of particular entities. Furthermore, Transformer blocks are adopted to generate a high-dimensional representation of the capsule activation vector. Thus, CapsuleFormer has the capability to extract potential features from the encrypted traffic patterns of DApps. Moreover, we collect and open a dataset of more than 700,000 encrypted traffic flows from 10 different types of DApps. The results of the experiments on the dataset demonstrate that CapsuleFormer is superior to the current methods, with an accuracy rate of 98.7%.

References

[1]
[n. d.]. Dapps. https://www.dapp.com/dapps Accessed on November 20, 2022.
[2]
Wei Cai, Gaopeng Gou, Minghao Jiang, Chang Liu, Gang Xiong, and Zhen Li. 2021. MEMG: Mobile Encrypted Traffic Classification With Markov Chains and Graph Neural Network. In 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys). IEEE, 478--486.
[3]
Xiang Cai, Xin Cheng Zhang, Brijesh Joshi, and Rob Johnson. 2012. Touching from a distance: Website fingerprinting attacks and defenses. In Proceedings of the 2012 ACM conference on Computer and communications security. 605--616.
[4]
Yige Chen, Tianning Zang, Yongzheng Zhang, Yuan Zhou, Linshu Ouyang, and Peng Yang. 2021. Incremental learning for mobile encrypted traffic classification. In ICC 2021-IEEE International Conference on Communications. IEEE, 1--6.
[5]
Scott E Coull and Kevin P Dyer. 2014. Traffic analysis of encrypted messaging services: Apple imessage and beyond. ACM SIGCOMM Computer Communication Review 44, 5 (2014), 5--11.
[6]
Susu Cui, Bo Jiang, Zhenzhen Cai, Zhigang Lu, Song Liu, and Jian Liu. 2019. A session-packets-based encrypted traffic classification using capsule neural networks. In 2019 IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems (HPCC/SmartCity/DSS). IEEE, 429--436.
[7]
Yanjie Fu, Junming Liu, Xiaolin Li, and Hui Xiong. 2018. A multi-label multi-view learning framework for in-app service usage analysis. ACM Transactions on Intelligent Systems and Technology (TIST) 9, 4 (2018), 1--24.
[8]
Jiajun Gong, Wuqi Zhang, Charles Zhang, and Tao Wang. 2022. Surakav: Generating Realistic Traces for a Strong Website Fingerprinting Defense. In 2022 IEEE Symposium on Security and Privacy (SP). IEEE, 1558--1573.
[9]
Jamie Hayes, George Danezis, et al. 2016. k-fingerprinting: A Robust Scalable Website Fingerprinting Technique. In USENIX security symposium. 1187--1203.
[10]
Xiaofei He, Deng Cai, and Partha Niyogi. 2005. Laplacian score for feature selection. Advances in neural information processing systems 18 (2005).
[11]
Geoffrey E Hinton, Sara Sabour, and Nicholas Frosst. 2018. Matrix capsules with EM routing. In International conference on learning representations.
[12]
Ting-Li Huoh, Yan Luo, and Tong Zhang. 2021. Encrypted Network Traffic Classification Using a Geometric Learning Model. In 2021 IFIP/IEEE International Symposium on Integrated Network Management (IM). IEEE, 376--383.
[13]
Amirhossein Khajehpour, Farid Zandi, Navid Malekghaini, Mahdi Hemmatyar, Naeimeh Omidvar, and Mahdi Jafari Siavoshani. 2022. Deep Inside Tor: Exploring Website Fingerprinting Attacks on Tor Traffic in Realistic Settings. In 2022 12th International Conference on Computer and Knowledge Engineering (ICCKE). IEEE, 148--156.
[14]
Maciej Korczyński and Andrzej Duda. 2014. Markov chain fingerprinting to classify encrypted traffic. In IEEE INFOCOM 2014-IEEE Conference on Computer Communications. IEEE, 781--789.
[15]
Wenbin Li and Gaspard Quenard. 2021. Towards a Multi-Label Dataset of Internet Traffic for Digital Behavior Classification. In 2021 3rd International Conference on Computer Communication and the Internet (ICCCI). IEEE, 38--46.
[16]
Zhen Ling, Gui Xiao, Wenjia Wu, Xiaodan Gu, Ming Yang, and Xinwen Fu. 2022. Towards an efficient defense against deep learning based website fingerprinting. In IEEE INFOCOM 2022-IEEE Conference on Computer Communications. IEEE, 310--319.
[17]
Chang Liu, Longtao He, Gang Xiong, Zigang Cao, and Zhen Li. 2019. Fs-net: A flow sequence network for encrypted traffic classification. In IEEE INFOCOM 2019-IEEE Conference On Computer Communications. IEEE, 1171--1179.
[18]
Xue Liu, Shigeng Zhang, Huihui Li, and Weiping Wang. 2021. Fast Application Activity Recognition with Encrypted Traffic. In Wireless Algorithms, Systems, and Applications: 16th International Conference, WASA 2021, Nanjing, China, June 25--27, 2021, Proceedings, Part II 16. Springer, 314--325.
[19]
Jie Lu, Gaopeng Gou, Majing Su, Dong Song, Chang Liu, Chen Yang, and Yangyang Guan. 2021. GAP-WF: Graph attention pooling network for fine-grained SSL/TLS Website fingerprinting. In 2021 International Joint Conference on Neural Networks (IJCNN). IEEE, 1--8.
[20]
Andriy Panchenko, Fabian Lanze, Jan Pennekamp, Thomas Engel, Andreas Zinnen, Martin Henze, and Klaus Wehrle. 2016. Website Fingerprinting at Internet Scale. In NDSS.
[21]
Vera Rimmer, Davy Preuveneers, Marc Juarez, Tom Van Goethem, and Wouter Joosen. 2017. Automated website fingerprinting through deep learning. arXiv preprint arXiv:1708.06376 (2017).
[22]
Sara Sabour, Nicholas Frosst, and Geoffrey E Hinton. 2017. Dynamic routing between capsules. Advances in neural information processing systems 30 (2017).
[23]
Meng Shen, Mingwei Wei, Liehuang Zhu, and Mingzhong Wang. 2017. Classification of encrypted traffic with second-order markov chains and application attribute bigrams. IEEE Transactions on Information Forensics and Security 12, 8 (2017), 1830--1843.
[24]
Meng Shen, Mingwei Wei, Liehuang Zhu, Mingzhong Wang, and Fuliang Li. 2016. Certificate-aware encrypted traffic classification using second-order markov chain. In 2016 IEEE/ACM 24th International Symposium on Quality of Service (IWQoS). IEEE, 1--10.
[25]
Meng Shen, Jinpeng Zhang, Liehuang Zhu, Ke Xu, and Xiaojiang Du. 2021. Accurate decentralized application identification via encrypted traffic analysis using graph neural networks. IEEE Transactions on Information Forensics and Security 16 (2021), 2367--2380.
[26]
Meng Shen, Jinpeng Zhang, Liehuang Zhu, Ke Xu, Xiaojiang Du, and Yiting Liu. 2019. Encrypted traffic classification of decentralized applications on ethereum using feature fusion. In Proceedings of the International Symposium on Quality of Service. 1--10.
[27]
Payap Sirinam, Mohsen Imani, Marc Juarez, and Matthew Wright. 2018. Deep fingerprinting: Undermining website fingerprinting defenses with deep learning. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. 1928--1943.
[28]
Heyi Tang, Yong Cui, Jianping Wu, Xiaowei Yang, and Zhenjie Yang. 2019. Trigger relationship aware mobile traffic classification. In Proceedings of the International Symposium on Quality of Service. 1--10.
[29]
Vincent F Taylor, Riccardo Spolaor, Mauro Conti, and Ivan Martinovic. 2016. Appscanner: Automatic fingerprinting of smartphone apps from encrypted network traffic. In 2016 IEEE European Symposium on Security and Privacy (EuroS&P). IEEE, 439--454.
[30]
Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N Gomez, Łukasz Kaiser, and Illia Polosukhin. 2017. Attention is all you need. Advances in neural information processing systems 30 (2017).
[31]
Shihao Wang, Liangmin Wang, Shangnan Yin, Hui Zhao, and Hao Shentu. 2020. CPWF: Cross-platform website fingerprinting based on multi-similarity loss. In 2020 International Conference on Networking and Network Applications (NaNA). IEEE, 73--80.
[32]
Yu Wang, Zhenzhen Li, Gaopeng Gou, Gang Xiong, Chencheng Wang, and Zhen Li. 2020. Identifying DApps and user behaviors on ethereum via encrypted traffic. In Security and Privacy in Communication Networks: 16th EAI International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part II 16. Springer, 62--83.
[33]
Yu Wang, Chencheng Wang, Gang Xiong, and Zhen Li. 2021. Multi-scene Classification of Blockchain Encrypted Traffic. In Blockchain and Trustworthy Systems: Third International Conference, BlockSys 2021, Guangzhou, China, August 5--6, 2021, Revised Selected Papers 3. Springer, 329--337.
[34]
Yu Wang, Gang Xiong, Chang Liu, Zhen Li, Mingxin Cui, and Gaopeng Gou. 2021. CQNet: A clustering-based quadruplet network for decentralized application classification via encrypted traffic. In Machine Learning and Knowledge Discovery in Databases. Applied Data Science Track: European Conference, ECML PKDD 2021, Bilbao, Spain, September 13--17, 2021, Proceedings, Part IV 21. Springer, 518--534.
[35]
Chengcheng Xu, Shuhui Chen, Jinshu Su, Siu-Ming Yiu, and Lucas CK Hui. 2016. A survey on regular expression matching for deep packet inspection: Applications, algorithms, and hardware platforms. IEEE Communications Surveys & Tutorials 18, 4 (2016), 2991--3029.
[36]
Feipeng Yan, Ming Xu, Tong Qiao, Ting Wu, Xue Yang, Ning Zheng, and Kim-Kwang Raymond Choo. 2018. Identifying wechat red packets and fund transfers via analyzing encrypted network traffic. In 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE). IEEE, 1426--1432.
[37]
Chen Yang, Can Wang, Weidong Zhang, Huiyi Zhang, and Xuangou Wu. 2023. Decentralized Application Identification via Burst Feature Aggregation. In 2023 26th International Conference on Computer Supported Cooperative Work in Design (CSCWD). IEEE, 1551--1556.

Index Terms

  1. CapsuleFormer: A Capsule and Transformer combined model for Decentralized Application encrypted traffic classification

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    ASIA CCS '24: Proceedings of the 19th ACM Asia Conference on Computer and Communications Security
    July 2024
    1987 pages
    ISBN:9798400704826
    DOI:10.1145/3634737
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 01 July 2024

    Check for updates

    Author Tags

    1. blockchain
    2. decentralized applications (DApps)
    3. traffic classification

    Qualifiers

    • Research-article

    Funding Sources

    • National Natural Science Foundation of China
    • Overseas Research Cooperation Fund of Tsinghua Shenzhen International Graduate School
    • Singapore Ministry of Education AcRF Tier 2
    • Guangdong Basic and Applied Basic Research Foundation
    • Key Project of Shenzhen Municipality

    Conference

    ASIA CCS '24
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 418 of 2,322 submissions, 18%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 252
      Total Downloads
    • Downloads (Last 12 months)252
    • Downloads (Last 6 weeks)57
    Reflects downloads up to 01 Jan 2025

    Other Metrics

    Citations

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media