Computer Engineering and Applications ›› 2022, Vol. 58 ›› Issue (12): 1-11.DOI: 10.3778/j.issn.1002-8331.2110-0029

• Research Hotspots and Reviews • Previous Articles     Next Articles

TLS Malicious Encrypted Traffic Identification Research

KANG Peng, YANG Wenzhong, MA Hongqiao   

  1. 1.College of Information Science and Engineering, Xinjiang University, Urumqi 830046, China
    2.Key Laboratory of Multilingual Information Technology in Xinjiang Uygur Autonomous Region, College of Information Science and Engineering, Xinjiang University, Urumqi 830046, China
  • Online:2022-06-15 Published:2022-06-15

TLS协议恶意加密流量识别研究综述

康鹏,杨文忠,马红桥   

  1. 1.新疆大学 信息科学与工程学院,乌鲁木齐 830046
    2.新疆大学 信息科学与工程学院 新疆维吾尔自治区多语种信息技术重点实验室,乌鲁木齐 830046

Abstract: With the advent of the 5G era and the increasing public awareness of the Internet, the public has paid more and more attention to the protection of personal privacy. Due to malicious communication in the process of data encryption, to ensure data security and safeguard social and national interests, the research work on encrypted traffic identification is particularly important. Therefore, this paper describes the TLS traffic in detail and analyzes the improved technology of early identification method, including common traffic detection technology, DPI detection technology, proxy technology, and certificate detection technology. It also introduces machine learning models for selecting different TLS encrypted traffic characteristics, as well as many recent research results of deep learning models without feature selection. The deficiencies of the related research work are summarized, and the future research work and development trend of the technology have been prospected.

Key words: 5G era, personal privacy, malicious traffic, data security, TLS encrypted traffic identification

摘要: 随着5G时代的来临,以及公众对互联网的认识日益加深,公众对个人隐私的保护也越来越重视。由于数据加密过程中存在着恶意通信,为确保数据安全,维护社会国家利益,加密流量识别的研究工作尤为重要。针对TLS流量详细的阐述,分析了早期识别方法的改进技术,包括常见的流量检测技术、DPI检测技术、代理技术以及证书检测技术。介绍了选取不同TLS加密流量特征的机器学习模型,以及无需特征选择的深度学习模型等诸多最新研究成果。对相关研究工作的不足进行总结,并对未来技术的研究工作和发展趋势进行了展望。

关键词: 5G时代, 个人隐私, 恶意流量, 数据安全, TLS加密流量识别