Towards identification of network applications in encrypted traffic

dc.contributor.authorBurgetová, Ivanacs
dc.contributor.authorMatoušek, Petrcs
dc.contributor.authorRyšavý, Ondřejcs
dc.coverage.issue9cs
dc.coverage.volume2025cs
dc.date.issued2025-09-03cs
dc.description.abstractNetwork traffic monitoring for security threat detection and network performance management is challenging due to the encryption of most communications. This article addresses the problem of identifying network applications associated with Transport Layer Security (TLS) connections. The evaluation of three primary approaches to classifying TLS-encrypted traffic was carried out: fingerprinting methods, Server Name Indication (SNI)-based identification, and machine learning-based classifiers. Each method has its own strengths and limitations: fingerprinting relies on a regularly updated database of known hashes, SNI is vulnerable to obfuscation or missing information, and AI techniques such as machine learning require sufficient labeled training data. A comparison of these methods highlights the challenges of identifying individual applications, as the TLS properties are significantly shared between applications. Nevertheless, even when identifying a collection of candidate applications, a valuable insight into network monitoring can be gained, and this can be achieved with high accuracy by all the methods considered. To facilitate further research in this area, a novel publicly available dataset of TLS communications has been created, with the communications annotated for popular desktop and mobile applications. Furthermore, the results of three different approaches to refine TLS traffic classification based on a combination of basic classifiers and context are presented. Finally, practical use cases are proposed, and future research directions are identified to further improve application identification methods.en
dc.description.abstractNetwork traffic monitoring for security threat detection and network performance management is challenging due to the encryption of most communications. This article addresses the problem of identifying network applications associated with Transport Layer Security (TLS) connections. The evaluation of three primary approaches to classifying TLS-encrypted traffic was carried out: fingerprinting methods, Server Name Indication (SNI)-based identification, and machine learning-based classifiers. Each method has its own strengths and limitations: fingerprinting relies on a regularly updated database of known hashes, SNI is vulnerable to obfuscation or missing information, and AI techniques such as machine learning require sufficient labeled training data. A comparison of these methods highlights the challenges of identifying individual applications, as the TLS properties are significantly shared between applications. Nevertheless, even when identifying a collection of candidate applications, a valuable insight into network monitoring can be gained, and this can be achieved with high accuracy by all the methods considered. To facilitate further research in this area, a novel publicly available dataset of TLS communications has been created, with the communications annotated for popular desktop and mobile applications. Furthermore, the results of three different approaches to refine TLS traffic classification based on a combination of basic classifiers and context are presented. Finally, practical use cases are proposed, and future research directions are identified to further improve application identification methods.en
dc.formattextcs
dc.format.extent1-18cs
dc.format.mimetypeapplication/pdfcs
dc.identifier.citationAnnals of Telecommunications. 2025, vol. 2025, issue 9, p. 1-18.en
dc.identifier.doi10.1007/s12243-025-01114-zcs
dc.identifier.issn0003-4347cs
dc.identifier.orcid0000-0002-9947-9837cs
dc.identifier.orcid0000-0003-4589-2041cs
dc.identifier.orcid0000-0001-9652-6418cs
dc.identifier.other198668cs
dc.identifier.researcheridAAL-5652-2020cs
dc.identifier.researcheridF-6544-2015cs
dc.identifier.researcheridC-3823-2009cs
dc.identifier.scopus34977560700cs
dc.identifier.scopus23009426700cs
dc.identifier.scopus9639380300cs
dc.identifier.urihttp://hdl.handle.net/11012/255531
dc.language.isoencs
dc.publisherSpringer Naturecs
dc.relation.ispartofAnnals of Telecommunicationscs
dc.relation.urihttps://link.springer.com/article/10.1007/s12243-025-01114-zcs
dc.rightsCreative Commons Attribution 4.0 Internationalcs
dc.rights.accessopenAccesscs
dc.rights.sherpahttp://www.sherpa.ac.uk/romeo/issn/0003-4347/cs
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/cs
dc.subjectTLS fingerprintingen
dc.subjectJA4en
dc.subjectencrypted trafficen
dc.subjectapplication identificationen
dc.subjectmachine learningen
dc.subjectTLS fingerprinting
dc.subjectJA4
dc.subjectencrypted traffic
dc.subjectapplication identification
dc.subjectmachine learning
dc.titleTowards identification of network applications in encrypted trafficen
dc.title.alternativeTowards identification of network applications in encrypted trafficen
dc.type.driverarticleen
dc.type.statusPeer-revieweden
dc.type.versionpublishedVersionen
eprints.grantNumberinfo:eu-repo/grantAgreement/TA0/TM/TM05000014cs
sync.item.dbidVAV-198668en
sync.item.dbtypeVAVen
sync.item.insts2025.10.14 14:13:15en
sync.item.modts2025.10.14 10:46:06en
thesis.grantorVysoké učení technické v Brně. Fakulta informačních technologií. Ústav informačních systémůcs

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
s1224302501114z.pdf
Size:
1.07 MB
Format:
Adobe Portable Document Format
Description:
file s1224302501114z.pdf