Machine learning based encrypted traffic classification: identifying SSH and skype

  • Authors:
  • Riyad Alshammari;A. Nur Zincir-Heywood

  • Affiliations:
  • Dalhousie University, Faculty of Computer Science, Halifax, Canada;Dalhousie University, Faculty of Computer Science, Halifax, Canada

  • Venue:
  • CISDA'09 Proceedings of the Second IEEE international conference on Computational intelligence for security and defense applications
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

The objective of this work is to assess the robustness of machine learning based traffic classification for classifying encrypted traffic where SSH and Skype are taken as good representatives of encrypted traffic. Here what we mean by robustness is that the classifiers are trained on data from one network but tested on data from an entirely different network. To this end, five learning algorithms - AdaBoost, Support Vector Machine, Naïve Bayesian, RIPPER and C4.5 - are evaluated using flow based features, where IP addresses, source/destination ports and payload information are not employed. Results indicate the C4.5 based approach performs much better than other algorithms on the identification of both SSH and Skype traffic on totally different networks.