Abstract
With the rapid development of computer and communication technology, people are increasingly dependent on computers, Internet and other infrastructures. At the same time, they also bear the risks and hazards of various kinds of security incidents. Secure Sockets Layer (SSL) is used to encrypt the information on the Internet so that data can be transferred safely. This paper focuses on the study of SSL encrypted traffic and Google is chosen as an example. First, some SSL encrypted applications are studied through SSL certificates, and then we apply the C4.5 machine learning algorithm to the classification of SSL encrypted applications, using packet length, packet inter-arrival time, and the direction of a flow as features. Our classification method yields a high precision and recall rate.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Karagiannis, T., Papagiannaki, K., Faoutsos, M.: BLINC: multilevel traffic classification in the dark. In: ACM SIGCOMM, Philadelphia, USA (2005)
Alshammari, R., Zincir-Heywood, A.N.: Machine Learning Based Encrypted Traffic Classification: Identifying SSH and Skype. In: Proceedings of the 2009 IEEE Symposium on Computation Intelligence in Security and Defense Applications, Ottawa, pp. 1–8 (2009)
Archibald, R., Liu, Y., Corbett, C., Ghosal, D.: Disambiguating HTTP: Classifying Web Applications. In: 2011 7th International on Wireless Communications and Mobile Computing Conference (IWCMC), Istanbul, pp. 1808–1813 (2011)
Schatzmann, D., Mühlbauer, W.: Digging into HTTPS: Flow-Based Classification of Webmail Traffic. In: ACM SIGCOMM, New York, USA, pp. 322–327 (2010)
Okada, Y., Ata, S., Nakamura, N., Nakahira, Y., Oka, I.: Comparisons of Machine Learning Algorithms for Application Identification of Encrypted Traffic. In: International Conference on Machine Learning and Applications, Honolulu, Hi, pp. 358–361 (2011)
Hirvonen, M., Sailio, M.: Two-Phased Method for Identifying SSH Encrypted Application Flows. In: 2011 7th International on Wireless Communications and Mobile Computing Conference (IWCMC), Istanbul, pp. 1033–1038 (2011)
Zander, S., Nguyen, T., Armitage, G.: Automated traffic classification and application identification using machine learning. In: IEEE 30th Conference on Local Computer Networks (LCN 2005), Sydney, Australia (2005)
Nguyen, T.T.T., Armitage, G.: A Survey of techniques for Internet Traffic Classification using Machine Learning. IEEE Communications Surveys & Tutorials 10(4), 56–76 (2008)
Park, B., Hong, J.W., Won, Y.J.: Toward Fine-Grained Traffic Classification. IEEE Communications Magazine, 104–111 (2011)
Liu, C., Shen, B., Hu, N.: Analysis the trusted computing technology and its development. Information Security and Technology (2012) (in Chinese)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Fu, P., Guo, L., Xiong, G., Meng, J. (2013). Classification Research on SSL Encrypted Application. In: Yuan, Y., Wu, X., Lu, Y. (eds) Trustworthy Computing and Services. ISCTCS 2012. Communications in Computer and Information Science, vol 320. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35795-4_51
Download citation
DOI: https://doi.org/10.1007/978-3-642-35795-4_51
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35794-7
Online ISBN: 978-3-642-35795-4
eBook Packages: Computer ScienceComputer Science (R0)