Robust Machine Learning for Encrypted Traffic Classification
Desktops and laptops can be maliciously exploited to violate privacy. In this paper, we consider the daily battle between the passive attacker who is targeting a specific user against a user that may be adversarial opponent. In this scenario, while the attacker tries to choose the best vector attack...
Gespeichert in:
Hauptverfasser: | , , , , , |
---|---|
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Desktops and laptops can be maliciously exploited to violate privacy. In this
paper, we consider the daily battle between the passive attacker who is
targeting a specific user against a user that may be adversarial opponent. In
this scenario, while the attacker tries to choose the best vector attack by
surreptitiously monitoring the victims encrypted network traffic in order to
identify users parameters such as the Operating System (OS), browser and apps.
The user may use tools such as a Virtual Private Network (VPN) or even change
protocols parameters to protect his/her privacy. We provide a large dataset of
more than 20,000 examples for this task. We run a comprehensive set of
experiments, that achieves high (above 85) classification accuracy, robustness
and resilience to changes of features as a function of different network
conditions at test time. We also show the effect of a small training set on the
accuracy. |
---|---|
DOI: | 10.48550/arxiv.1603.04865 |