Home / Journals / CMC / Online First / doi:10.32604/cmc.2024.059417
Special Issues
Table of Content

Open Access

ARTICLE

TB-Graph: Enhancing Encrypted Malicious Traffic Classification through Relational Graph Attention Networks

Ming Liu, Qichao Yang, Wenqing Wang, Shengli Liu*
School of Cyber Science and Technology, Information Engineering University, Zhengzhou, 450001, China
* Corresponding Author: Shengli Liu. Email: email

Computers, Materials & Continua https://doi.org/10.32604/cmc.2024.059417

Received 07 October 2024; Accepted 26 November 2024; Published online 17 December 2024

Abstract

The proliferation of internet traffic encryption has become a double-edged sword. While it significantly enhances user privacy, it also inadvertently shields cyber-attacks from detection, presenting a formidable challenge to cybersecurity. Traditional machine learning and deep learning techniques often fall short in identifying encrypted malicious traffic due to their inability to fully extract and utilize the implicit relational and positional information embedded within data packets. This limitation has led to an unresolved challenge in the cybersecurity community: how to effectively extract valuable insights from the complex patterns of traffic packet transmission. Consequently, this paper introduces the TB-Graph model, an encrypted malicious traffic classification model based on a relational graph attention network. The model is a heterogeneous traffic burst graph that embeds side-channel features, which are unaffected by encryption, into the graph nodes and connects them with three different types of burst edges. Subsequently, we design a relational positional coding that prevents the loss of temporal relationships between the original traffic flows during graph transformation. Ultimately, TB-Graph leverages the powerful graph representation learning capabilities of Relational Graph Attention Network (RGAT) to extract latent behavioral features from the burst graph nodes and edge relationships. Experimental results show that TB-Graph outperforms various state-of-the-art methods in fine-grained encrypted malicious traffic classification tasks on two public datasets, indicating its enhanced capability for identifying encrypted malicious traffic.

Keywords

Encrypted malicious traffic classification; traffic burst graph; graph representation learning; deep learning
  • 49

    View

  • 9

    Download

  • 0

    Like

Share Link