Towards identification of network applications in encrypted traffic
| dc.contributor.author | Burgetová, Ivana | cs |
| dc.contributor.author | Matoušek, Petr | cs |
| dc.contributor.author | Ryšavý, Ondřej | cs |
| dc.coverage.issue | 9 | cs |
| dc.coverage.volume | 2025 | cs |
| dc.date.issued | 2025-09-03 | cs |
| dc.description.abstract | Network traffic monitoring for security threat detection and network performance management is challenging due to the encryption of most communications. This article addresses the problem of identifying network applications associated with Transport Layer Security (TLS) connections. The evaluation of three primary approaches to classifying TLS-encrypted traffic was carried out: fingerprinting methods, Server Name Indication (SNI)-based identification, and machine learning-based classifiers. Each method has its own strengths and limitations: fingerprinting relies on a regularly updated database of known hashes, SNI is vulnerable to obfuscation or missing information, and AI techniques such as machine learning require sufficient labeled training data. A comparison of these methods highlights the challenges of identifying individual applications, as the TLS properties are significantly shared between applications. Nevertheless, even when identifying a collection of candidate applications, a valuable insight into network monitoring can be gained, and this can be achieved with high accuracy by all the methods considered. To facilitate further research in this area, a novel publicly available dataset of TLS communications has been created, with the communications annotated for popular desktop and mobile applications. Furthermore, the results of three different approaches to refine TLS traffic classification based on a combination of basic classifiers and context are presented. Finally, practical use cases are proposed, and future research directions are identified to further improve application identification methods. | en |
| dc.description.abstract | Network traffic monitoring for security threat detection and network performance management is challenging due to the encryption of most communications. This article addresses the problem of identifying network applications associated with Transport Layer Security (TLS) connections. The evaluation of three primary approaches to classifying TLS-encrypted traffic was carried out: fingerprinting methods, Server Name Indication (SNI)-based identification, and machine learning-based classifiers. Each method has its own strengths and limitations: fingerprinting relies on a regularly updated database of known hashes, SNI is vulnerable to obfuscation or missing information, and AI techniques such as machine learning require sufficient labeled training data. A comparison of these methods highlights the challenges of identifying individual applications, as the TLS properties are significantly shared between applications. Nevertheless, even when identifying a collection of candidate applications, a valuable insight into network monitoring can be gained, and this can be achieved with high accuracy by all the methods considered. To facilitate further research in this area, a novel publicly available dataset of TLS communications has been created, with the communications annotated for popular desktop and mobile applications. Furthermore, the results of three different approaches to refine TLS traffic classification based on a combination of basic classifiers and context are presented. Finally, practical use cases are proposed, and future research directions are identified to further improve application identification methods. | en |
| dc.format | text | cs |
| dc.format.extent | 1-18 | cs |
| dc.format.mimetype | application/pdf | cs |
| dc.identifier.citation | Annals of Telecommunications. 2025, vol. 2025, issue 9, p. 1-18. | en |
| dc.identifier.doi | 10.1007/s12243-025-01114-z | cs |
| dc.identifier.issn | 0003-4347 | cs |
| dc.identifier.orcid | 0000-0002-9947-9837 | cs |
| dc.identifier.orcid | 0000-0003-4589-2041 | cs |
| dc.identifier.orcid | 0000-0001-9652-6418 | cs |
| dc.identifier.other | 198668 | cs |
| dc.identifier.researcherid | AAL-5652-2020 | cs |
| dc.identifier.researcherid | F-6544-2015 | cs |
| dc.identifier.researcherid | C-3823-2009 | cs |
| dc.identifier.scopus | 34977560700 | cs |
| dc.identifier.scopus | 23009426700 | cs |
| dc.identifier.scopus | 9639380300 | cs |
| dc.identifier.uri | http://hdl.handle.net/11012/255531 | |
| dc.language.iso | en | cs |
| dc.publisher | Springer Nature | cs |
| dc.relation.ispartof | Annals of Telecommunications | cs |
| dc.relation.uri | https://link.springer.com/article/10.1007/s12243-025-01114-z | cs |
| dc.rights | Creative Commons Attribution 4.0 International | cs |
| dc.rights.access | openAccess | cs |
| dc.rights.sherpa | http://www.sherpa.ac.uk/romeo/issn/0003-4347/ | cs |
| dc.rights.uri | http://creativecommons.org/licenses/by/4.0/ | cs |
| dc.subject | TLS fingerprinting | en |
| dc.subject | JA4 | en |
| dc.subject | encrypted traffic | en |
| dc.subject | application identification | en |
| dc.subject | machine learning | en |
| dc.subject | TLS fingerprinting | |
| dc.subject | JA4 | |
| dc.subject | encrypted traffic | |
| dc.subject | application identification | |
| dc.subject | machine learning | |
| dc.title | Towards identification of network applications in encrypted traffic | en |
| dc.title.alternative | Towards identification of network applications in encrypted traffic | en |
| dc.type.driver | article | en |
| dc.type.status | Peer-reviewed | en |
| dc.type.version | publishedVersion | en |
| eprints.grantNumber | info:eu-repo/grantAgreement/TA0/TM/TM05000014 | cs |
| sync.item.dbid | VAV-198668 | en |
| sync.item.dbtype | VAV | en |
| sync.item.insts | 2025.10.14 14:13:15 | en |
| sync.item.modts | 2025.10.14 10:46:06 | en |
| thesis.grantor | Vysoké učení technické v Brně. Fakulta informačních technologií. Ústav informačních systémů | cs |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- s1224302501114z.pdf
- Size:
- 1.07 MB
- Format:
- Adobe Portable Document Format
- Description:
- file s1224302501114z.pdf
