Title :
Genetic optimization and hierarchical clustering applied to encrypted traffic identification
Author :
Bacquet, Carlos ; Zincir-Heywood, A. Nur ; Heywood, Malcolm I.
Author_Institution :
Fac. of Comput. Sci., Dalhousie Univ., Halifax, NS, Canada
Abstract :
An important part of network management requires the accurate identification and classification of network traffic for decisions regarding bandwidth management, quality of service, and security. This work explores the use of a Multi-Objective Genetic Algorithm (MOGA) for both, feature selection and cluster count optimization, for an unsupervised machine learning technique, K-Means, applied to encrypted traffic identification. Specifically, a hierarchical K-Means algorithm is employed, comparing its performance to the MOGA with a non-hierarchical (flat) K-Means algorithm. The latter has already been benchmarked against common unsupervised techniques found in the literature, where results have favored the proposed MOGA. The purpose of this paper is to explore the gains, if any, obtained by increasing cluster purity in the proposed model by means of a second layer of clusters. In this work, SSH is chosen as an example of an encrypted application. However, nothing prevents the proposed model to work with other types of encrypted traffic, such as SSL or Skype. Results show that with the hierarchical MOGA, significant gains are observed in terms of the classification performance of the system.
Keywords :
genetic algorithms; pattern clustering; quality of service; telecommunication computing; telecommunication network management; telecommunication traffic; unsupervised learning; QoS; SSL; Skype; bandwidth management; cluster count optimization; encrypted traffic identification; feature selection; hierarchical clustering; k-means algorithm; multiobjective genetic algorithm; network management; network traffic; quality of service; unsupervised machine learning; Accuracy; Clustering algorithms; Cryptography; Genetic algorithms; Machine learning; Optimization; Payloads;
Conference_Titel :
Computational Intelligence in Cyber Security (CICS), 2011 IEEE Symposium on
Conference_Location :
Paris
Print_ISBN :
978-1-4244-9905-2
DOI :
10.1109/CICYBS.2011.5949391