A novel dataset for encrypted virtual private network traffic analysis

. 2023 Apr ; 47 () : 108945. [epub] 20230201

Status PubMed-not-MEDLINE Jazyk angličtina Země Nizozemsko Médium electronic-ecollection

Typ dokumentu časopisecké články

Perzistentní odkaz   https://www.medvik.cz/link/pmid36798601
Odkazy

PubMed 36798601
PubMed Central PMC9925847
DOI 10.1016/j.dib.2023.108945
PII: S2352-3409(23)00063-X
Knihovny.cz E-zdroje

Encryption of network traffic should guarantee anonymity and prevent potential interception of information. Encrypted virtual private networks (VPNs) are designed to create special data tunnels that allow reliable transmission between networks and/or end users. However, as has been shown in a number of scientific papers, encryption alone may not be sufficient to secure data transmissions in the sense that certain information may be exposed. Our team has constructed a large dataset that contains generated encrypted network traffic data. This dataset contains a general network traffic model consisting of different types of network traffic such as web, emailing, video conferencing, video streaming, and terminal services. For the same network traffic model, data are measured for different scenarios, i.e., for data traffic through different types of VPNs and without VPNs. Additionally, the dataset contains the initial handshake of the VPN connections. The dataset can be used by various data scientists dealing with the classification of encrypted network traffic and encrypted VPNs.

Zobrazit více v PubMed

Brownlee N. Flow-based measurement: IPFIX development and deployment. IEICE Trans. Commun. 2011:2190–2198. 94.8.

Iliyasu A.S, Deng H. Semi-supervised encrypted traffic classification with deep convolutional generative adversarial networks. IEEE Access. 2019;8:118–126.

Maonan W., et al. Proceedings of the 2021 IEEE 6th International Conference on Computer and Communication Systems (ICCCS) IEEE; 2021. CENTIME: a direct comprehensive traffic features extraction for encrypted traffic classification.

Xue Diwen, et al. Proceedings of the 31st USENIX Security Symposium (USENIX Security 22) 2022. {OpenVPN} is open to {VPN} fingerprinting.

IETF . IETF; 1999. RFC 2661, Layer Two Tunneling Protocol “L2TP”.https://datatracker.ietf.org/doc/html/rfc2661 Accessed October 2022.

PPTP, Router OS, (Accessed October 2022), https://help.mikrotik.com/docs/display/ROS/PPTP.

MS-SSTP, (Accessed October 2022), https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-sstp/70adc1df-c4fe-4b02-8872-f1d8b9ad806a.

Donenfeld J.A. Wireguard: next generation kernel network tunnel. NDSS. 2017:1–12.

OpenVPN Cloud Knowledge Base, (Accessed October 2022), https://openvpn.net/cloud-docs/.

Draper-Gil G., et al. Proceedings of the 2nd international conference on information systems security and privacy (ICISSP) 2016. Characterization of encrypted and vpn traffic using time-related.

Afandi Waleed, et al. Fingerprinting technique for youtube videos identification in network traffic. IEEE Access. 2022;10:76731–76741.

ISO, ISO . ISO Standard. ISO; 1994. IEC 7498-1: 1994 information technology–open systems interconnection–basic reference model: the basic model. /IEC7498-1.

Microsoft Says Don't Use PPTP and MS-CHAP (Accessed October 2022), http://www.h-online.com/security/news/item/Microsoft-says-don-t-use-PPTP-and-MS-CHAP-1672257.html.

Schumann, Luca, et al. "Impact of evolving protocols and COVID-19 on internet traffic shares." arXiv preprintarXiv:2201.00142 (2022).

Najít záznam

Citační ukazatele

Pouze přihlášení uživatelé

Možnosti archivace

Nahrávání dat ...