Skip to main content

Classification Research on SSL Encrypted Application

  • Conference paper
Trustworthy Computing and Services (ISCTCS 2012)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 320))

Included in the following conference series:

Abstract

With the rapid development of computer and communication technology, people are increasingly dependent on computers, Internet and other infrastructures. At the same time, they also bear the risks and hazards of various kinds of security incidents. Secure Sockets Layer (SSL) is used to encrypt the information on the Internet so that data can be transferred safely. This paper focuses on the study of SSL encrypted traffic and Google is chosen as an example. First, some SSL encrypted applications are studied through SSL certificates, and then we apply the C4.5 machine learning algorithm to the classification of SSL encrypted applications, using packet length, packet inter-arrival time, and the direction of a flow as features. Our classification method yields a high precision and recall rate.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Karagiannis, T., Papagiannaki, K., Faoutsos, M.: BLINC: multilevel traffic classification in the dark. In: ACM SIGCOMM, Philadelphia, USA (2005)

    Google Scholar 

  2. Alshammari, R., Zincir-Heywood, A.N.: Machine Learning Based Encrypted Traffic Classification: Identifying SSH and Skype. In: Proceedings of the 2009 IEEE Symposium on Computation Intelligence in Security and Defense Applications, Ottawa, pp. 1–8 (2009)

    Google Scholar 

  3. Archibald, R., Liu, Y., Corbett, C., Ghosal, D.: Disambiguating HTTP: Classifying Web Applications. In: 2011 7th International on Wireless Communications and Mobile Computing Conference (IWCMC), Istanbul, pp. 1808–1813 (2011)

    Google Scholar 

  4. Schatzmann, D., Mühlbauer, W.: Digging into HTTPS: Flow-Based Classification of Webmail Traffic. In: ACM SIGCOMM, New York, USA, pp. 322–327 (2010)

    Google Scholar 

  5. Okada, Y., Ata, S., Nakamura, N., Nakahira, Y., Oka, I.: Comparisons of Machine Learning Algorithms for Application Identification of Encrypted Traffic. In: International Conference on Machine Learning and Applications, Honolulu, Hi, pp. 358–361 (2011)

    Google Scholar 

  6. Hirvonen, M., Sailio, M.: Two-Phased Method for Identifying SSH Encrypted Application Flows. In: 2011 7th International on Wireless Communications and Mobile Computing Conference (IWCMC), Istanbul, pp. 1033–1038 (2011)

    Google Scholar 

  7. Zander, S., Nguyen, T., Armitage, G.: Automated traffic classification and application identification using machine learning. In: IEEE 30th Conference on Local Computer Networks (LCN 2005), Sydney, Australia (2005)

    Google Scholar 

  8. Nguyen, T.T.T., Armitage, G.: A Survey of techniques for Internet Traffic Classification using Machine Learning. IEEE Communications Surveys & Tutorials 10(4), 56–76 (2008)

    Article  Google Scholar 

  9. Park, B., Hong, J.W., Won, Y.J.: Toward Fine-Grained Traffic Classification. IEEE Communications Magazine, 104–111 (2011)

    Google Scholar 

  10. Liu, C., Shen, B., Hu, N.: Analysis the trusted computing technology and its development. Information Security and Technology (2012) (in Chinese)

    Google Scholar 

  11. WEKA, http://www.cs.waikato.ac.nz/ml/weka/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Fu, P., Guo, L., Xiong, G., Meng, J. (2013). Classification Research on SSL Encrypted Application. In: Yuan, Y., Wu, X., Lu, Y. (eds) Trustworthy Computing and Services. ISCTCS 2012. Communications in Computer and Information Science, vol 320. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35795-4_51

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35795-4_51

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35794-7

  • Online ISBN: 978-3-642-35795-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics