Chinese Journal of Network and Information Security ›› 2021, Vol. 7 ›› Issue (4): 101-113.doi: 10.11959/j.issn.2096-109x.2021057

• TopicⅡ: Technology and Application of Cryptology • Previous Articles     Next Articles

Study on privacy preserving encrypted traffic detection

Xinyu ZHANG, Bingsheng ZHANG, Quanrun MENG, Kui REN   

  1. School of Cyber Science and Technology, Zhejiang University, Hangzhou 310000, China
  • Revised:2020-09-22 Online:2021-08-15 Published:2021-08-01
  • Supported by:
    The National Natural Science Foundation of China(62032021);Zhejiang Key R&D Plan(2019C03133);Alibaba-Zhejiang University Joint Institute of Frontier Technologies, Research Institute of Cyberspace Gover-nance in Zhejiang University, Leading Innovative and Entrepreneur Team Introduction Program of Zhejiang(2018R01005);2020 Open Project of the National Engineering Laboratory of Mobile Internet System and Application Security

Abstract:

Existing encrypted traffic detection technologies lack privacy protection for data and models, which will violate the privacy preserving regulations and increase the security risk of privacy leakage.A privacy-preserving encrypted traffic detection system was proposed.It promoted the privacy of the encrypted traffic detection model by combining the gradient boosting decision tree (GBDT) algorithm with differential privacy.The privacy-protected encrypted traffic detection system was designed and implemented.The performance and the efficiency of proposed system using the CICIDS2017 dataset were evaluated, which contained the malicious traffic of the DDoS attack and the port scan.The results show that when the privacy budget value is set to 1, the system accuracy rates are 91.7% and 92.4% respectively.The training and the prediction of our model is efficient.The training time of proposed model is 5.16 s and 5.59 s, that is only 2-3 times of GBDT algorithm.The prediction time is close to the GBDT algorithm.

Key words: privacy-preserving, encrypted traffic detection, gradient boosting decision tree, differential privacy

CLC Number: 

No Suggested Reading articles found!