Characterization of Encrypted and VPN Traffic using Time-related Features

  title={Characterization of Encrypted and VPN Traffic using Time-related Features},
  author={Gerard Draper-Gil and Arash Habibi Lashkari and Mohammad Saiful Islam Mamun and Ali A. Ghorbani},
  booktitle={ICISS 2016},
Traffic characterization is one of the major challenges in today’s security industry. The continuous evolution and generation of new applications and services, together with the expansion of encrypted communications makes it a difficult task. Virtual Private Networks (VPNs) are an example of encrypted communication service that is becoming popular, as method for bypassing censorship as well as accessing services that are geographically locked. In this paper, we study the effectiveness of flow… CONTINUE READING
Highly Cited
This paper has 34 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.


Publications citing this paper.
Showing 1-10 of 22 extracted citations

End-to-end encrypted traffic classification with one-dimensional convolution neural networks

2017 IEEE International Conference on Intelligence and Security Informatics (ISI) • 2017
View 7 Excerpts
Method Support
Highly Influenced

Mobile Encrypted Traffic Classification Using Deep Learning

2018 Network Traffic Measurement and Analysis Conference (TMA) • 2018
View 3 Excerpts
Highly Influenced

Towards a Network-Based Framework for Android Malware Detection and Characterization

2017 15th Annual Conference on Privacy, Security and Trust (PST) • 2017
View 3 Excerpts
Method Support
Highly Influenced

A Hierarchical Approach to Encrypted Data Packet Classification in Smart Home Gateways

2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech) • 2018
View 1 Excerpt

Deep Learning for Intelligent Wireless Networks: A Comprehensive Survey

IEEE Communications Surveys & Tutorials • 2018
View 3 Excerpts


Publications referenced by this paper.
Showing 1-10 of 26 references

A Proxy Identifier Based on Patterns in Traffic Flows

2015 IEEE 16th International Symposium on High Assurance Systems Engineering • 2015
View 2 Excerpts

Revealing encrypted WebRTC traffic via machine learning tools

2015 12th International Joint Conference on e-Business and Telecommunications (ICETE) • 2015
View 1 Excerpt

Characterizing Application Behaviors for classifying P2P traffic

2014 International Conference on Computing, Networking and Communications (ICNC) • 2014
View 3 Excerpts

PortLoad: Taking the Best of Two Worlds in Traffic Classification

2010 INFOCOM IEEE Conference on Computer Communications Workshops • 2010
View 2 Excerpts