Classifying Encrypted Network Traffic based on Deep Learning
Transcript of Classifying Encrypted Network Traffic based on Deep Learning
![Page 1: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/1.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.
institute oftelecommunications
❈❧❛ss✐❢②✐♥❣ ❊♥❝r②♣t❡❞ ◆❡t✇♦r❦ ❚r❛✣❝ ❜❛s❡❞ ♦♥❉❡❡♣ ▲❡❛r♥✐♥❣
▼❛st❡r ❚❤❡s✐s
❢♦r ♦❜t❛✐♥✐♥❣ t❤❡ ❛❝❛❞❡♠✐❝ ❞❡❣r❡❡
❉✐♣❧✳ ✲✐♥❣✳
❛s ♣❛rt ♦❢ t❤❡ st✉❞②
❊❧❡❝tr✐❝❛❧ ❊♥❣✐♥❡❡r✐♥❣ ❛♥❞ ■♥❢♦r♠❛t✐♦♥ ❚❡❝❤♥♦❧♦❣②
❝❛rr✐❡❞ ♦✉t ❜②
▼✐❧♦s ❈r♥❥❛♥s❦✐st✉❞❡♥t ♥✉♠❜❡r✿ ✵✶✷✷✼✹✸✹
■♥st✐t✉t❡ ♦❢ ❚❡❧❡❝♦♠♠✉♥✐❝❛t✐♦♥s
❛t ❚❯ ❲✐❡♥
❙✉♣❡r✈✐s✐♦♥✿❯♥✐✈✳ Pr♦❢✳ ❉✐♣❧✳✲■♥❣✳ ❉r✳t❡❝❤♥✳ ❚❛♥❥❛ ❩s❡❜②❯♥✐✈✳❆ss✳ ❉♦tt✳♠❛❣✳ ▼❛①✐♠✐❧✐❛♥ ❇❛❝❤❧
![Page 2: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/2.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
❊r❦❧är✉♥❣ ③✉r ❱❡r❢❛ss✉♥❣ ❞❡r ❆r❜❡✐t
❍✐❡r♠✐t ❡r❦❧är❡ ✐❝❤✱ ❞❛ss ❞✐❡ ✈♦r❧✐❡❣❡♥❞❡ ❆r❜❡✐t ❣❡♠äÿ ❞❡♠ ❈♦❞❡ ♦❢ ❈♦♥❞✉❝t ✕ ❘❡❣❡❧♥③✉r ❙✐❝❤❡r✉♥❣ ❣✉t❡r ✇✐ss❡♥s❝❤❛❢t❧✐❝❤❡r Pr❛①✐s ✭✐♥ ❞❡r ❛❦t✉❡❧❧❡♥ ❋❛ss✉♥❣ ❞❡s ❥❡✇❡✐❧✐❣❡♥▼✐tt❡✐❧✉♥❣s❜❧❛tt❡s ❞❡r ❚❯ ❲✐❡♥✮✱ ✐♥s❜❡s♦♥❞❡r❡ ♦❤♥❡ ✉♥③✉❧äss✐❣❡ ❍✐❧❢❡ ❉r✐tt❡r ✉♥❞ ♦❤♥❡❇❡♥✉t③✉♥❣ ❛♥❞❡r❡r ❛❧s ❞❡r ❛♥❣❡❣❡❜❡♥❡♥ ❍✐❧❢s♠✐tt❡❧✱ ❛♥❣❡❢❡rt✐❣t ✇✉r❞❡✳ ❉✐❡ ❛✉s ❛♥❞❡r❡♥◗✉❡❧❧❡♥ ❞✐r❡❦t ♦❞❡r ✐♥❞✐r❡❦t ü❜❡r♥♦♠♠❡♥❡♥ ❉❛t❡♥ ✉♥❞ ❑♦♥③❡♣t❡ s✐♥❞ ✉♥t❡r ❆♥❣❛❜❡❞❡r ◗✉❡❧❧❡ ❣❡❦❡♥♥③❡✐❝❤♥❡t✳ ❉✐❡ ❆r❜❡✐t ✇✉r❞❡ ❜✐s❤❡r ✇❡❞❡r ✐♠ ■♥✕ ♥♦❝❤ ✐♠ ❆✉s❧❛♥❞ ✐♥❣❧❡✐❝❤❡r ♦❞❡r ✐♥ ä❤♥❧✐❝❤❡r ❋♦r♠ ✐♥ ❛♥❞❡r❡♥ Prü❢✉♥❣s✈❡r❢❛❤r❡♥ ✈♦r❣❡❧❡❣t✳
❱✐❡♥♥❛✱ ◆♦✈❡♠❜❡r ✷✵✶✾❆✉t❤♦r✬s s✐❣♥❛t✉r❡
❙t❛t❡♠❡♥t ♦♥ ❆❝❛❞❡♠✐❝ ■♥t❡❣r✐t② ✶
■ ❤❡r❡❜② ❞❡❝❧❛r❡ t❤❛t t❤✐s t❤❡s✐s ✐s ✐♥ ❛❝❝♦r❞❛♥❝❡ ✇✐t❤ t❤❡ ❈♦❞❡ ♦❢ ❈♦♥❞✉❝t r✉❧❡s ❢♦r❣♦♦❞ s❝✐❡♥t✐✜❝ ♣r❛❝t✐❝❡ ✭✐♥ t❤❡ ❝✉rr❡♥t ✈❡rs✐♦♥ ♦❢ t❤❡ r❡s♣❡❝t✐✈❡ ♥❡✇s❧❡tt❡r ♦❢ t❤❡ ❚❯❲✐❡♥✮✳ ■♥ ♣❛rt✐❝✉❧❛r ✐t ✇❛s ♠❛❞❡ ✇✐t❤♦✉t t❤❡ ✉♥❛✉t❤♦r✐③❡❞ ❛ss✐st❛♥❝❡ ♦❢ t❤✐r❞ ♣❛rt✐❡s❛♥❞ ✇✐t❤♦✉t t❤❡ ✉s❡ ♦❢ ♦t❤❡r t❤❛♥ t❤❡ s♣❡❝✐✜❡❞ ❛✐❞s✳ ❉❛t❛ ❛♥❞ ❝♦♥❝❡♣ts ❞✐r❡❝t❧② ♦r✐♥❞✐r❡❝t❧② ❛❝q✉✐r❡❞ ❢r♦♠ ♦t❤❡r s♦✉r❝❡s ❛r❡ ♠❛r❦❡❞ ✇✐t❤ t❤❡ s♦✉r❝❡✳ ❚❤❡ ✇♦r❦ ❤❛s ♥♦t❜❡❡♥ s✉❜♠✐tt❡❞ ✐♥ t❤❡ s❛♠❡ ♦r ✐♥ ❛ s✐♠✐❧❛r ❢♦r♠ t♦ ❛♥② ♦t❤❡r ❛❝❛❞❡♠✐❝ ✐♥st✐t✉t✐♦♥s✳
✶❚r❛♥s❧❛t✐♦♥ ♦❢ t❤❡ t❡①t ❛❜♦✈❡✳ ❚❤❡ ●❡r♠❛♥ ✈❡rs✐♦♥ ✐s t❤❡ ❧❡❣❛❧❧② ❜✐♥❞✐♥❣ t❡①t✳
![Page 3: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/3.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
❆❝❦♥♦✇❧❡❞❣❡♠❡♥ts
❋✐rst ♦❢ ❛❧❧✱ ■ ❛♠ ❣r❛t❡❢✉❧ ❢♦r t❤❡ ♦♣♣♦rt✉♥✐t② t♦ st✉❞② ❛t ■♥st✐t✉t❡ ♦❢ ❚❡❧❡❝♦♠♠✉♥✐❝❛✲t✐♦♥✱ ❚❯ ❱✐❡♥♥❛✱ ❛♥❞ t♦ ❛❧❧ t❤❡ ♣r♦❢❡ss♦rs ❢♦r s❤❛r✐♥❣ ❛ tr❡♠❡♥❞♦✉s ❦♥♦✇❧❡❞❣❡ ❛♥❞s♣r❡❛❞✐♥❣ ♦✉r ♣r♦❢❡ss✐♦♥❛❧ ❤♦r✐③♦♥s ✐♥ ♠❛♥② ✇❛②s✳
■ ✇♦✉❧❞ ❧✐❦❡ t♦ ❡①♣r❡ss ♠② s♣❡❝✐❛❧ ❛♣♣r❡❝✐❛t✐♦♥ t♦ ♠② s✉♣❡r✈✐s♦r✱ Pr♦❢❡ss♦r ❚❛♥❥❛❩s❡❜②✱ ❢♦r ❣✐✈✐♥❣ ♠❡ t❤❡ ♦♣♣♦rt✉♥✐t② t♦ ❝♦♥❞✉❝t ❛ r❡s❡❛r❝❤ ♦♥ s✉❝❤ ❛♥ ❡①❝✐t✐♥❣ t♦♣✐❝✱❛s ✇❡❧❧ ❛s ❡①❝❡❧❧❡♥t s✉♣♣♦rt✱ ❣✉✐❞❛♥❝❡ ❛♥❞ t❤❡ ❣✐✈❡♥ ❦♥♦✇❧❡❞❣❡✳ ❆ s♣❡❝✐❛❧ t❤❛♥❦s ❣♦❡st♦ ♠② ❛❞✈✐s❡r ▼❛①✐♠✐❧✐❛♥ ❇❛❝❤❧ ❢♦r ❝♦♥t✐♥✉♦✉s s✉♣♣♦rt✱ ♣❛t✐❡♥❝❡ ❛♥❞ ❛❧❧ t❤❡ ❤❡❧♣❢✉❧❤✐♥ts✳
❚❤❛♥❦s t♦ ♠② ❝♦❧❧❡❛❣✉❡s ❢♦r ❛❧❧ t❤❡ ❣♦♦❞ t✐♠❡s s♣❡♥t t♦❣❡t❤❡r ❛♥❞ ❢♦r t❤❡ s✉♣♣♦rt ✐♥❛ ❣r❡❛t ♥✉♠❜❡r ♦❢ s✐t✉❛t✐♦♥s ✇❤❡♥ ■ t❤♦✉❣❤t t❤❛t ❛❧❧ ✇❛s ❧♦st✳
❚❤❡ ❜✐❣❣❡st t❤❛♥❦s ❣♦❡s t♦ ♠② ❢❛♠✐❧②✳ ❲♦r❞s ❝❛♥♥♦t ❡①♣r❡ss ❤♦✇ ❣r❛t❡❢✉❧ ■ ❛♠ ❢♦r❛❧❧ t❤❡ s❛❝r✐✜❝❡s t❤❛t ②♦✉ ❤❛✈❡ ♠❛❞❡ ♦♥ ♠② ❜❡❤❛❧❢✳ ❋✐♥❛❧❧②✱ ■ ✇♦✉❧❞ ❧✐❦❡ t♦ ❡①♣r❡ss♠② ❞❡❡♣❡st ❛♣♣r❡❝✐❛t✐♦♥ t♦ ♠② ❜❡❧♦✈❡❞ ✇✐❢❡ ▼✐r❥❛♥❛ ✇❤♦ s♣❡♥t s❧❡❡♣❧❡ss ♥✐❣❤ts ❜② ♠②s✐❞❡ ❛♥❞ ✇❛s ❛❧✇❛②s s✉♣♣♦rt✐✈❡ ✐♥ t❤❡ ♠♦♠❡♥ts ✇❤❡♥ t❤❡r❡ ✇❛s ♥♦ ♦♥❡ t♦ ❛♥s✇❡r ♠②q✉❡r✐❡s✳
![Page 4: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/4.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
✏❚❤❡ ♦♥❧② ❧✐♠✐t t♦ ❆■ ✐s ❤✉♠❛♥ ✐♠❛❣✐♥❛t✐♦♥✳✑❈❤r✐s ❉✉✛❡②✱ ❙✉♣❡r❤✉♠❛♥ ■♥♥♦✈❛t✐♦♥✿ ❚r❛♥s❢♦r♠✐♥❣ ❇✉s✐♥❡ss ✇✐t❤ ❆rt✐✜❝✐❛❧ ■♥t❡❧❧✐❣❡♥❝❡
![Page 5: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/5.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
❆❜str❛❝t
❆♥ ❡♥♦r♠♦✉s ■P tr❛✣❝ ❣r♦✇t❤ ✐♥ t❤❡ ❧❛st ❞❡❝❛❞❡ ❤❛s r❡s✉❧t❡❞ ✐♥ ♥❡✇ r❡q✉✐r❡♠❡♥tsr❡❣❛r❞✐♥❣ ♥❡t✇♦r❦ s❡❝✉r✐t②✳ ❲✐t❤ t❤❡ tr❛✣❝ ❣r♦✇t❤✱ t❤❡ ❝②❜❡rs❡❝✉r✐t② ✐s ❛❧s♦ ❝❤❛♥❣✐♥❣✳■t✐s ❞✐✣❝✉❧t t♦ ❛♣♣❧② s❡❝✉r✐t② ♠❡❛s✉r❡s ❜❡❝❛✉s❡ ♦❢ t❤❡ ❜✐❣❣❡r tr❛✣❝ ❛♠♦✉♥t ❛♥❞ ♥❡✇❛♣♣❧✐❝❛t✐♦♥s ❛♥❞ s❡r✈✐❝❡s✳ ❆ ❧❛r❣❡ ♣❡r❝❡♥t❛❣❡ ♦❢ ♥❡t✇♦r❦ tr❛✣❝✱ ❛s ✇❡❧❧ ❛s ♥❡t✇♦r❦❛tt❛❝❦s✱ ✐s ❡♥❝r②♣t❡❞✱ ❛♥❞ ✐t ✐s ✐♠♣♦rt❛♥t t♦ r❡❝♦❣♥✐③❡ ❛♥ ❛tt❛❝❦ q✉✐❝❦❧② t♦ ♣r❡✈❡♥t ❛♥②❞❛♠❛❣❡ t♦ t❤❡ r✉♥♥✐♥❣ s②st❡♠✳ ❲✐t❤ tr❛❞✐t✐♦♥❛❧ ♠❡t❤♦❞s ♦❢ tr❛✣❝ ❝❧❛ss✐✜❝❛t✐♦♥✱ s✉❝❤❛s t❤❡ ♣♦rt✲❜❛s❡❞ tr❛✣❝ ❞❡t❡❝t✐♦♥ ❛♥❞ ❞❡❡♣ ♣❛❝❦❡t ✐♥s♣❡❝t✐♦♥✱ ✐t ✐s ✈❡r② ❞✐✣❝✉❧t t♦❢♦❧❧♦✇ t❤❡ ❞❡♠❛♥❞ ♦❢ t❤❡ ♠♦❞❡r♥ tr❛✣❝ ❝❧❛ss✐✜❝❛t✐♦♥✳■♥ t❤✐s t❤❡s✐s✱ ♠❛❝❤✐♥❡ ❧❡❛r♥✐♥❣ ✐s ✉s❡❞ ❛s ❛ s♦❧✉t✐♦♥ t♦ t❤✐s ♣r♦❜❧❡♠✳ ❲❡ ❞❡✈❡❧♦♣❡❞ ❛♠❛❝❤✐♥❡ ❧❡❛r♥✐♥❣ ♠♦❞❡❧ ❜❛s❡❞ ♦♥ ❜✐♥❛r② ❝❧❛ss✐✜❝❛t✐♦♥ ✇❤✐❝❤ ✐s ❛❜❧❡ t♦ ❞❡t❡❝t ❛tt❛❝❦s ✐♥❡♥❝r②♣t❡❞ ♥❡t✇♦r❦ tr❛✣❝✳ ❖✉r ❝❧❛ss✐✜❝❛t✐♦♥ ✉s❡s ❛ ♥❡✇ ❢❡❛t✉r❡ s❡t✱ ✇❤✐❝❤ ❝♦♥s✐sts ♦❢t❤❡ ❢♦❧❧♦✇✐♥❣✿ t❤❡ ❢r❛♠❡ ❧❡♥❣t❤✱ t❤❡ t✐♠❡ ❜❡t✇❡❡♥ ♣❛❝❦❡ts ✐♥ t❤❡ ✢♦✇ ❛♥❞ t❤❡ ❞✐r❡❝t✐♦♥♦❢ t❤❡ ✢♦✇✳ ❚❤❡s❡ ❛r❡ ✐♠♣♦rt❛♥t ❢❡❛t✉r❡s ❢♦r ✉s ❜❡❝❛✉s❡ t❤❡✐r ✈❛❧✉❡s ❞♦ ♥♦t ❝❤❛♥❣❡✐♥ ❡♥❝r②♣t❡❞ tr❛✣❝✳ ❚❤❡ r❡s✉❧ts ♦♣❡♥ ♥❡✇ ❞✐s❝✉ss✐♦♥s ❛♥❞ ❝❤❛♥❣❡ t❤❡ ✈✐❡✇ ♦♥ t♦❞❛②✬str❛✣❝ ❝❧❛ss✐✜❝❛t✐♦♥✳
![Page 6: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/6.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
❩✉s❛♠♠❡♥❢❛ss✉♥❣
❊✐♥ ❡♥♦r♠❡s ❲❛❝❤st✉♠ ❞❡s ■P✲❱❡r❦❡❤rs ✐♥ ❞❡♥ ❧❡t③t❡♥ ③❡❤♥ ❏❛❤r❡♥ ❤❛t ③✉ ♥❡✉❡♥ ❆♥✲❢♦r❞❡r✉♥❣❡♥ ❛♥ ❞✐❡ ◆❡t③✇❡r❦s✐❝❤❡r❤❡✐t ❣❡❢ü❤rt✳ ▼✐t ❞❡♠ ◆❡t③✇❡r❦✈❡r❦❡❤rs✇❛❝❤st✉♠ä♥❞❡rt s✐❝❤ ❛✉❝❤ ❞✐❡ ❈②❜❡rs✐❝❤❡r❤❡✐t ✉♥❞ ❡s ✐st s❝❤✇✐❡r✐❣✱ ❙✐❝❤❡r❤❡✐ts♠❛ÿ♥❛❤♠❡♥ ❛♥✲③✉✇❡♥❞❡♥✱ ❞❛ ❞❡r ◆❡t③✇❡r❦✈❡r❦❡❤r ❣röÿ❡r ✐st ✉♥❞ ♥❡✉❡ ❆♥✇❡♥❞✉♥❣❡♥ ✉♥❞ ❉✐❡♥st❡❤✐♥③✉❦♦♠♠❡♥✳ ❊✐♥ ❣r♦ÿ❡r ❚❡✐❧ ❞❡s ◆❡t③✇❡r❦✈❡r❦❡❤rs s♦✇✐❡ ◆❡t③✇❡r❦❛♥❣r✐✛❡ ✇❡r❞❡♥✈❡rs❝❤❧üss❡❧t✱ ✉♥❞ ❡s ✐st ✇✐❝❤t✐❣✱ ❡✐♥❡♥ ❆♥❣r✐✛ s❝❤♥❡❧❧ ③✉ ❡r❦❡♥♥❡♥✱ ✉♠ ❙❝❤ä❞❡♥ ❛♠❧❛✉❢❡♥❞❡♥ ❙②st❡♠ ③✉ ✈❡r♠❡✐❞❡♥✳ ▼✐t tr❛❞✐t✐♦♥❡❧❧❡♥ ▼❡t❤♦❞❡♥ ❞❡r ❱❡r❦❡❤rs❦❧❛ss✐✜③✐❡✲r✉♥❣✱ ✇✐❡ ❞❡r P♦rt✲❜❛s✐❡rt❡♥ ❱❡r❦❡❤rs❞❡t❡❦t✐♦♥ ✉♥❞ ❞❡r ❉❡❡♣ P❛❝❦❡t ■♥s♣❡❝t✐♦♥✱ ✐st ❡ss❡❤r s❝❤✇✐❡r✐❣✱ ❞❡♥ ❆♥❢♦r❞❡r✉♥❣❡♥ ❞❡r ♠♦❞❡r♥❡♥ ❱❡r❦❡❤rs❦❧❛ss✐✜③✐❡r✉♥❣ ③✉ ❣❡♥✉❣❡♥✳■♥ ❞✐❡s❡r ❆r❜❡✐t ✇✐r❞ ♠❛s❝❤✐♥❡❧❧❡s ▲❡r♥❡♥ ❛❧s ▲ös✉♥❣ ❢ür ❞✐❡s❡s Pr♦❜❧❡♠ ❡✐♥❣❡s❡t③t✳❲✐r ❤❛❜❡♥ ❡✐♥ ♠❛s❝❤✐♥❡❧❧❡s ▲❡r♥♠♦❞❡❧❧ ❛✉❢ ❇❛s✐s ❞❡r ❜✐♥är❡♥ ❑❧❛ss✐✜③✐❡r✉♥❣ ❡♥t✇✐✲❝❦❡❧t✱ ❞❛s ✐♥ ❞❡r ▲❛❣❡ ✐st✱ ❆♥❣r✐✛❡ ✐♠ ✈❡rs❝❤❧üss❡❧t❡♥ ◆❡t③✇❡r❦✈❡r❦❡❤r ③✉ ❡r❦❡♥♥❡♥✳❯♥s❡r❡ ❑❧❛ss✐✜③✐❡r✉♥❣ ✈❡r✇❡♥❞❡t ❡✐♥ ♥❡✉❛rt✐❣❡s ❋❡❛t✉r❡✲❙❡t✱ ❞❛s ❛✉s ❞❡♥ ❢♦❧❣❡♥❞❡♥❋❡❛t✉r❡s ❜❡st❡❤t✿ ❞❡r P❛❝❦❡t❧ä♥❣❡✱ ❞❡r ❩❡✐t ③✇✐s❝❤❡♥ ❞❡♥ P❛❦❡t❡♥ ✐♠ ❋❧♦✇ ✉♥❞ ❞❡r❘✐❝❤t✉♥❣ ❞❡s ❋❧♦✇s✳ ❉✐❡s s✐♥❞ ❢ür ✉♥s ✇✐❝❤t✐❣❡ ❋❡❛t✉r❡s✱ ❞❛ ❞✐❡s❡ ❲❡rt❡ ❛✉❝❤ ❜❡✐ ✈❡r✲s❝❤❧üss❡❧t❡♥ ❉❛t❡♥ ♥♦❝❤ ✈❡r❢ü❣❜❛r s✐♥❞✳ ❉✐❡ ❊r❣❡❜♥✐ss❡ ❡rö✛♥❡♥ ♥❡✉❡ P❡rs♣❡❦t✐✈❡♥ ✉♥❞✈❡rä♥❞❡r♥ ❞❡♥ ❇❧✐❝❦ ❛✉❢ ❞✐❡ ❤❡✉t✐❣❡ ❱❡r❦❡❤rs❦❧❛ss✐✜③✐❡r✉♥❣✳
![Page 7: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/7.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
❈♦♥t❡♥ts
✶ ■♥tr♦❞✉❝t✐♦♥ ✷✶✳✶ ▼♦t✐✈❛t✐♦♥ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✷✶✳✷ ❆✐♠ ♦❢ t❤❡ ✇♦r❦ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✸✶✳✸ ❙tr✉❝t✉r❡ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✹
✷ ❇❛❝❦❣r♦✉♥❞ ✺✷✳✶ ■❚ ❙❡❝✉r✐t② ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✻
✷✳✶✳✶ ❇❛s✐❝ ❈♦♥❝❡♣ts ♦❢ ◆❡t✇♦r❦ ❙❡❝✉r✐t② ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✻✷✳✶✳✷ ■♥tr✉s✐♦♥ ❉❡t❡❝t✐♦♥ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✼
✷✳✷ ❚r❛✣❝ ❊♥❝r②♣t✐♦♥ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✶✵✷✳✷✳✶ ■♥t❡r♥❡t Pr♦t♦❝♦❧ ❙❡❝✉r✐t② ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✶✵✷✳✷✳✷ ❚r❛♥s♣♦rt ▲❛②❡r ❙❡❝✉r✐t② ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✶✶
✷✳✸ ◆❡t✇♦r❦ ❚r❛✣❝ ❈❧❛ss✐✜❝❛t✐♦♥ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✶✸✷✳✸✳✶ ❋❧♦✇✲❜❛s❡❞ ❈❧❛ss✐✜❝❛t✐♦♥ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✶✹
✷✳✹ ▼❛❝❤✐♥❡ ❧❡❛r♥✐♥❣ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✶✽✷✳✹✳✶ ❉❡❡♣ ▲❡❛r♥✐♥❣ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✶✾✷✳✹✳✷ ❘❡❝✉rr❡♥t ◆❡✉r❛❧ ◆❡t✇♦r❦ ❛♥❞ ▲❙❚▼ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✷✻
✸ ❙t❛t❡ ♦❢ t❤❡ ❛rt ✸✶
✹ ❘❡s❡❛r❝❤ ▼❡t❤♦❞♦❧♦❣② ❛♥❞ ❊①♣❡r✐♠❡♥t ✸✸✹✳✶ ❈♦♥❝❡♣t ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✸✸✹✳✷ Pr❡♣r♦❝❡ss✐♥❣ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✸✽✹✳✸ ❚r❛✐♥✐♥❣ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✹✵
✹✳✸✳✶ ❚r❛✐♥✐♥❣ t❤❡ ♠♦❞❡❧ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✹✵✹✳✹ ❊✈❛❧✉❛t✐♦♥ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✹✸✹✳✺ ◆♦r♠❛❧✐③❛t✐♦♥ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✹✻
✺ ❘❡s✉❧ts ✺✶✺✳✶ ❙❡t✉♣ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✺✶
✺✳✶✳✶ ❉❡❡♣ ❧❡❛r♥✐♥❣ ❢r❛♠❡✇♦r❦ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✺✷✺✳✷ P❡r❢♦r♠❛♥❝❡ ❡✈❛❧✉❛t✐♦♥ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✺✸
✺✳✷✳✶ ▼♦❞❡❧ ✶ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✺✹✺✳✷✳✷ ▼♦❞❡❧ ✷ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✺✾✺✳✷✳✸ ▼♦❞❡❧ ✸ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✻✷✺✳✷✳✹ ▼♦❞❡❧ ✹ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✻✹
✺✳✸ ❙✉♠♠❛r② ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✻✻
✻ ❈♦♥❝❧✉s✐♦♥ ✻✽✻✳✶ ❋✉t✉r❡ ❲♦r❦ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✻✾
![Page 8: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/8.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
✼ ❘❡❢❡r❡♥❝❡s ✼✶
❆ ❆♣♣❡♥❞✐① ✼✺
![Page 9: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/9.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
✶ ■◆❚❘❖❉❯❈❚■❖◆
✶ ■♥tr♦❞✉❝t✐♦♥
■♥ t❤✐s ❝❤❛♣t❡r✱ t❤❡ ♦✈❡r✈✐❡✇ ♦❢ t❤❡ t❤❡s✐s ✐s ❣✐✈❡♥✳ ■t st❛rts ✇✐t❤ t❤❡ ♠♦t✐✈❛t✐♦♥ ❛♥❞❞❡♠❛♥❞ ❢♦r r❡s❡❛r❝❤ ✐♥ t❤✐s ✜❡❧❞✳ ❚❤❡ ♥❡①t ♣❛rt ✐s t❤❡ ❛✐♠ ♦❢ ♦✉r ✇♦r❦✱ ✇❤❡r❡ ✇❡ ❞✐s❝✉sst❤❡ ❦❡② q✉❡st✐♦♥s ❛♥❞ ❣♦❛❧s ♦❢ t❤✐s t❤❡s✐s✳ ■♥ t❤❡ ✜♥❛❧ ♣❛rt ✇❡ ❡①♣❧❛✐♥ t❤❡ str✉❝t✉r❡ ♦❢t❤❡ t❤❡s✐s✳
✶✳✶ ▼♦t✐✈❛t✐♦♥
❉✉r✐♥❣ t❤❡ ❧❛st ❢❡✇ ②❡❛rs✱ t❤❡ ■♥t❡r♥❡t tr❛✣❝ ❤❛s ❡①♣❡r✐❡♥❝❡❞ ❛ tr❡♠❡♥❞♦✉s ❛♥♥✉❛❧❣r♦✇t❤ r❛t❡ ♦❢ ❛♣♣r♦①✐♠❛t❡❧② ✷✻ ♣❡r❝❡♥t ❬✶✾❪✳ ❲✐t❤ t❤❡ tr❛✣❝ ❣r♦✇t❤✱ ❝♦♥t❡♥t ♦❢tr❛✣❝ ✐s ❝❤❛♥❣✐♥❣ ❛♥❞ t❤❡ ♥✉♠❜❡r ♦❢ ♥❡✇ ❛♣♣❧✐❝❛t✐♦♥s ✐s ❡①♣♦♥❡♥t✐❛❧❧② r✐s✐♥❣ ❬✶✾❪✳ ❚❤❡♣❤✐❧♦s♦♣❤② ♦❢ s❡❝✉r✐t② t❤r❡❛ts ✐s ❛❧s♦ ❝❤❛♥❣✐♥❣ ❛s ✇❡❧❧✳ ❈②❜❡r❛tt❛❝❦s ❛r❡ ❜❡✐♥❣ ❞✐r❡❝t❡❞♠♦r❡ t♦✇❛r❞s s♠❛❧❧❡r ❝♦♠♣❛♥✐❡s ❬✶✽❪ ✱ ❛♥❞ t❤❡② ❛r❡ ❡♥❝r②♣t❡❞ ❛♥❞ ♠♦r❡ ❞✐✣❝✉❧t t♦r❡❝♦❣♥✐③❡✳❚❤❛t ✐s ✇❤② ♥❡t✇♦r❦ tr❛✣❝ ❝❧❛ss✐✜❝❛t✐♦♥ ❤❛s ❜❡❝♦♠❡ ❛♥ ✐♠♣♦rt❛♥t t♦♦❧ ❢♦r r❡❝✲♦❣♥✐③✐♥❣ t❤❡ ♣♦t❡♥t✐❛❧ t❤r❡❛ts ✐♥ tr❛✣❝✳ ■t r❡♣r❡s❡♥ts t❤❡ ❢♦✉♥❞❛t✐♦♥ ❢♦r ✐♠♣♦rt❛♥t♥❡t✇♦r❦ ❛❝t✐✈✐t✐❡s✱ s✉❝❤ ❛s ♥❡t✇♦r❦ ♣❧❛♥♥✐♥❣✱ ♥❡t✇♦r❦ s❡❝✉r✐t②✱ ♥❡t✇♦r❦ ♠❛♥❛❣❡♠❡♥t✱q✉❛❧✐t② ♦❢ s❡r✈✐❝❡✱ ❛❝❝♦✉♥t✐♥❣✱ ❡t❝✳ ❍♦✇❡✈❡r✱ ❝❧❛ss✐✜❝❛t✐♦♥ r❡♠❛✐♥s ❞✐✣❝✉❧t ❜❡❝❛✉s❡♦❢ t❤❡ ❢❛st ❞❡✈❡❧♦♣♠❡♥t ♦❢ t❡❝❤♥♦❧♦❣✐❡s✱ ♥❡✇ ♣r♦t♦❝♦❧s✱ ❛♣♣❧✐❝❛t✐♦♥s ❛♥❞ ❛tt❛❝❦❡rs❤✐❞✐♥❣ ✐♥ t❤♦s❡ ❛♣♣❧✐❝❛t✐♦♥✱ ❛s ✇❡❧❧ ❛s ❜❡❝❛✉s❡ ♦❢ ♦✉r ❧✐♠✐t❡❞ ❦♥♦✇❧❡❞❣❡ ❛♥❞ t❡❝❤♥♦❧♦❣②✳
❚❤❡r❡ ❛r❡ ❞✐✛❡r❡♥t ❛♣♣r♦❛❝❤❡s t♦✇❛r❞s ♥❡t✇♦r❦ tr❛✣❝ ❝❧❛ss✐✜❝❛t✐♦♥✳ ■♥ ❬✷✵❪✱ t❤❡❛✉t❤♦r ✐s ♣r♦✈✐❞✐♥❣ t❤❡ ♦✈❡r✈✐❡✇ ♦❢ tr❛✣❝ ❝❧❛ss✐✜❝❛t✐♦♥ ❝❤❛❧❧❡♥❣❡s✳ ❚❤❡ ♦❧❞❡st✱ ❛♥❞st✐❧❧ ✈❡r② ♣♦♣✉❧❛r✱ ❛♣♣r♦❛❝❤ ✐s ♣♦rt✲❜❛s❡❞ ❝❧❛ss✐✜❝❛t✐♦♥✱ ❛♥❞ ✐t ✐s ❜❛s❡❞ ♦♥ t❤❡❢❛❝t t❤❛t ♠♦st ❛♣♣❧✐❝❛t✐♦♥s ❤❛✈❡ ❛♥ ❛ss✐❣♥❡❞ ♣♦rt ♥✉♠❜❡r✳ ■t ✐s s✐♠♣❧❡ ❛♥❞ ❢❛st✱❜✉t ♥♦t ❡♥t✐r❡❧② r❡❧✐❛❜❧❡✳ ◆❡✇ ❛♣♣❧✐❝❛t✐♦♥s ❛r❡ ✉s✐♥❣ ❞②♥❛♠✐❝ ♣♦rt ❛ss✐❣♥♠❡♥t ❛♥❞❛tt❛❝❦❡rs ❝❛♥ ❡❛s✐❧② ❜r❛❦❡ t❤❡ ♣❛tt❡r♥ ❜② ✉s✐♥❣ ❛♥♦t❤❡r ♣♦rt ❛♥❞ ❞✐✛❡r❡♥t t✉♥♥❡❧❧✐♥❣♠❡t❤♦❞s✳ ❆ ♠♦r❡ r❡❧✐❛❜❧❡ ❛♣♣r♦❛❝❤ ✇♦✉❧❞ ❜❡ ♣❛②❧♦❛❞✲❜❛s❡❞ ✐♥s♣❡❝t✐♦♥✱ ✐♥ ✇❤✐❝❤t❤❡ ❝♦♥t❡♥t ♦❢ ❛ ♣❛❝❦❡t ❤❡❛❞❡r ✐s ❛♥❛❧②③❡❞✱ ❛♥❞ ✇❡❧❧ ❦♥♦✇♥ s✐❣♥❛t✉r❡s ❛r❡ ✉s❡❞ t♦❝❧❛ss✐❢② t❤❡ tr❛✣❝✳ ❚❤✐s ♠❡t❤♦❞ ✐s ❤✐❣❤❧② ❛❝❝✉r❛t❡ ❜✉t t❤❡r❡ ❛r❡ ✈❛r✐♦✉s ❞♦✇♥s✐❞❡s✿ ✐t✐s ♠♦r❡ ❝♦♠♣✉t❛t✐♦♥❛❧❧② ❡①♣❡♥s✐✈❡✱ t❤❡ ❝❧❛ss✐✜❝❛t✐♦♥ ✐s ♥♦t ♣♦ss✐❜❧❡ ✐❢ t❤❡ s✐❣♥❛t✉r❡✐s ✉♥❦♥♦✇♥✱ ✐t ✈❡r② ❞✐✣❝✉❧t t♦ ♣❡r❢♦r♠ ✐♥ ❡♥❝r②♣t❡❞ tr❛✣❝✱ ❛♥❞✱ ♠♦st ✐♠♣♦rt❛♥t❧②✱ ✐t✈✐♦❧❛t❡s t❤❡ ♣r✐✈❛❝② ♣r✐♥❝✐♣❧❡✳
❋♦r t❤♦s❡ ❛♥❞ ♠❛♥② ♦t❤❡r r❡❛s♦♥s ✐t ✐s ✐♠♣♦rt❛♥t t♦ ❝❤❛♥❣❡ t❤❡ ❛♣♣r♦❛❝❤ r❡❣❛r❞✐♥❣t❤❡ ♥❡t✇♦r❦ tr❛✣❝ ❝❧❛ss✐✜❝❛t✐♦♥✳
❖♥❡ ♥❡✇ ❛♣♣r♦❛❝❤ ✐s t♦ ✉s❡ ♠❛❝❤✐♥❡ ❧❡❛r♥✐♥❣✳ ❆ ❤✉❣❡ ❣r♦✇t❤ ♦❢ ❞❛t❛ ❝♦❧❧❡❝t❡❞t❤r♦✉❣❤ ♦✉r ❞❛✐❧② ♥❡t✇♦r❦ ❛❝t✐✈✐t✐❡s ❤❛s ❝r❡❛t❡❞ ❞❡♠❛♥❞ ❢♦r ❞❡✈❡❧♦♣✐♥❣ ♥❡✇ ♠❡t❤♦❞s❢♦r ❛♥❛❧②③✐♥❣ ❞❛t❛ t♦ r❡❝♦❣♥✐③❡ ❛♥❞ ❧❡❛r♥ ❛❜♦✉t ❜❛s✐❝ ❤✉♠❛♥ ❜❡❤❛✈✐♦r✳ ❚❤❡ r❡s✉❧ts ♦❢
✷
![Page 10: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/10.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
✶✳✷ ❆✐♠ ♦❢ t❤❡ ✇♦r❦ ✶ ■◆❚❘❖❉❯❈❚■❖◆
t❤❡ ❛♥❛❧②s✐s ✇♦✉❧❞ s✉❜s❡q✉❡♥t❧② ❜❡ ✉s❡❞ ❢♦r ❝♦♠♠❡r❝✐❛❧ ♣✉r♣♦s❡s✳ ❆ s✉❜s❡t ♦❢ ▼▲✱❞❡❡♣ ❧❡❛r♥✐♥❣ ♣r♦✈✐❞❡s ❛ s✐♠✉❧❛t✐♦♥ ♦❢ t❤❡ ❤✉♠❛♥ ♥❡✉r❛❧ s②st❡♠✱ ✇❤✐❝❤ ❝❛♥ ❜❡ ❛♣♣❧✐❡❞t♦ ♦✉r ♣r♦❜❧❡♠✳
❖✉r r❡s❡❛r❝❤ ❢♦❝✉s❡s ♦♥ ❜✐♥❛r② ❝❧❛ss✐✜❝❛t✐♦♥ ♦❢ t❤❡ ♥❡t✇♦r❦ tr❛✣❝ ❜❛s❡❞ ♦♥ ❞❡❡♣❧❡❛r♥✐♥❣ t❡❝❤♥✐q✉❡s t♦ ❞✐st✐♥❣✉✐s❤ ❛tt❛❝❦ tr❛✣❝ ❢r♦♠ ❜❡♥✐❣♥ tr❛✣❝✳ ❚❤❡ ❞❛t❛ t❤❛t ✇❡✉s❡ ❝♦♥t❛✐♥s ♥♦r♠❛❧ ❛♥❞ ♠❛❧✐❝✐♦✉s tr❛✣❝ ✐♥ t❤❡ ❢♦r♠ ♦❢ ♥✐♥❡ ❞✐✛❡r❡♥t ❝②❜❡r❛tt❛❝❦❢❛♠✐❧✐❡s✳ ❚❤❡ ❞❛t❛ ✇❛s ♣r♦❝❡ss❡❞ t♦ r❡tr✐❡✈❡ t❤❡ ❞❡s✐r❡❞ ❢❡❛t✉r❡s ♦❢ t❤❡ tr❛✣❝ ❛♥❞ ✐t✇❛s ❢❡❞ t♦ ❛ r❡❝✉rr❡♥t ♥❡✉r❛❧ ♥❡t✇♦r❦✳ ❚❤✐s s♣❡❝✐✜❝ ♠❡t❤♦❞ ✇❛s ✉s❡❞ ❜❡❝❛✉s❡ ✐t ✐s❜❡tt❡r ❛♣♣❧✐❡❞ t♦ s❡q✉❡♥t✐❛❧ ❞❛t❛ ❛♥❞ ✐t ✜ts ✇❡❧❧ t♦ ❛♥ ♦♥❧✐♥❡ ❝❧❛ss✐✜❝❛t✐♦♥✳ ❉✐✛❡r❡♥tt②♣❡s ♦❢ ❘◆◆s ✇❡r❡ t❡st❡❞✱ ✐♥❝❧✉❞✐♥❣ ❧♦♥❣✲s❤♦rt t❡r♠ ♠❡♠♦r② ❝❡❧❧s✱ ❣❛t❡❞ r❡❝✉rr❡♥t✉♥✐t ❝❡❧❧s ❛♥❞ ❞✐✛❡r❡♥t r❡❣✉❧❛r✐③❛t✐♦♥ t❡❝❤♥✐q✉❡s✳ ❚❤❡ r❡s✉❧t ✇❛s ❛♥ ❛❝❝✉r❛t❡ ❛♥❞ ❢❛st♥❡t✇♦r❦ ❝❧❛ss✐✜❝❛t✐♦♥✳
❚❤❡ ❝♦♥tr✐❜✉t✐♦♥ ♦❢ ♦✉r ✇♦r❦ ✐s t❤r❡❡✲❢♦❧❞✿
❼ ❛ ♥❡✇ ❢❡❛t✉r❡ s❡t ✇❛s t❡st❡❞✳ ■t ❝♦♥s✐sts ♦❢ t❤❡ ♣❛❝❦❡t ❧❡♥❣t❤✱ ♣❛❝❦❡t ✐♥t❡r✲❛rr✐✈❛❧t✐♠❡ ❛♥❞ ✢♦✇ ❞✐r❡❝t✐♦♥✳ ❚❤❡ ♠❛✐♥ ❛❞✈❛♥t❛❣❡ ♦❢ t❤✐s s❡t ✐s t❤❛t t❤❡ ❢❡❛t✉r❡s ❛r❡❛✈❛✐❧❛❜❧❡ ✐♥ ❜♦t❤✱ ❡♥❝r②♣t❡❞ ❛♥❞ ❞❡❝r②♣t❡❞ tr❛✣❝
❼ ❛♥ ❡✣❝✐❡♥t ♠❛❝❤✐♥❡ ❧❡❛r♥✐♥❣ ♠♦❞❡❧ ✇❛s ❞❡✈❡❧♦♣❡❞✱ ❜❛s❡❞ ♦♥ ❧❛♥❣✉❛❣❡ ♣r♦❝❡ss✲✐♥❣ ✉s✐♥❣ ❛ r❡❝✉rr❡♥t ♥❡✉r❛❧ ♥❡t✇♦r❦ ❛♥❞ ❧♦♥❣✲s❤♦rt t❡r♠ ♠❡♠♦r② ❝❡❧❧s✳ ❚❤❡s❡t❡❝❤♥✐q✉❡s ✉t✐❧✐③❡ s♣❡❝✐✜❝ ❝❡❧❧ str✉❝t✉r❡s ✇❤✐❝❤ ❡♥❛❜❧❡ ♠❡♠♦r✐③✐♥❣ ❢❡❛t✉r❡s ♦❢❣✐✈❡♥ tr❛✣❝✳
❼ ❞✐✛❡r❡♥t r❡❣✉❧❛r✐③❛t✐♦♥ ♠❡t❤♦❞s ❤❛✈❡ ❜❡❡♥ ❛♥❛❧②③❡❞ ❛♥❞ ✐♠♣❧❡♠❡♥t❡❞✱ s✉❝❤ ❛s❜❛t❝❤ ♥♦r♠❛❧✐③❛t✐♦♥ ❛♥❞ ❧❛②❡r ♥♦r♠❛❧✐③❛t✐♦♥ ✇❤✐❝❤ s♠♦♦t❤ t❤❡ ❞❛t❛ ✐♥♣✉t st❛t✐s✲t✐❝s ❛♥❞ ❤❡❧♣ t❤❡ ♠♦❞❡❧ ❧❡❛r♥ ♠♦r❡ ❡✣❝✐❡♥t❧②✳
✶✳✷ ❆✐♠ ♦❢ t❤❡ ✇♦r❦
❚❤❡ r❡s❡❛r❝❤✱ ✐♥ ❣❡♥❡r❛❧✱ ♣r♦♣♦s❡s t❤❡ ❛♥s✇❡r t♦ t❤r❡❡ ✐♠♣♦rt❛♥t q✉❡st✐♦♥s✿
❼ ◗✶✿ ❆r❡ r❡❝✉rr❡♥t ♥❡✉r❛❧ ♥❡t✇♦r❦s ❡✣❝✐❡♥t ✐♥ tr❛✣❝ ❝❧❛ss✐✜❝❛t✐♦♥❄ ❇② ❡✣❝✐❡♥t♠♦❞❡❧✱ ✇❡ ❞❡✜♥❡ ❛ ♠♦❞❡❧ ✇❤✐❝❤ ❝♦✉❧❞ ❛❝❤✐❡✈❡ ♠♦r❡ t❤❛♥ ✾✻✪ ♦❢ ❛❝❝✉r❛❝② ❛♥❞✾✵✪ ❥✲st❛t✐st✐❝ ✭❞❡t❛✐❧s ❛r❡ ♣r♦✈✐❞❡❞✿✹✳✹✮✳ ❉✉r✐♥❣ ❛ tr❛✣❝ ❛♥❛❧②s✐s✱ ✇❡ ❞❡❛❧ ✇✐t❤❛ ❤✉❣❡ ❛♠♦✉♥t ♦❢ ❞❛t❛✳ ❚❤❡r❡ ❛r❡ ♥❡✇ ❛♥❞ ✉♥❦♥♦✇♥ ❛tt❛❝❦s ❛♥❞ t❤r❡❛ts✱ ✇❤♦s❡♦✉t❝♦♠❡ ✐s ✈❡r② ❞✐✣❝✉❧t t♦ ♣r❡❞✐❝t✳
❼ ◗✷✿ ❲❤✐❝❤ ❢❡❛t✉r❡s ♦❢ ❞❛t❛ ❛r❡ ♠♦st ✐♠♣♦rt❛♥t ❢♦r t❤❡ ❡♥❝r②♣t❡❞ tr❛✣❝ ❝❧❛ss✐✜✲❝❛t✐♦♥❄ ❚❤✐s r❡s❡❛r❝❤ ✇✐❧❧ ✐♥tr♦❞✉❝❡ ❛ ♥❡✇ ❢❡❛t✉r❡ s❡t ❜❛s❡❞ ♦♥ t❤❡ ❢r❛♠❡ ❧❡♥❣t❤✱✐♥t❡r✲❛rr✐✈❛❧ ♣❛❝❦❡t t✐♠❡ ❛♥❞ ❞✐r❡❝t✐♦♥ ♦❢ t❤❡ tr❛✣❝ ✐♥ t❤❡ ✢♦✇✳
✸
![Page 11: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/11.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
✶✳✸ ❙tr✉❝t✉r❡ ✶ ■◆❚❘❖❉❯❈❚■❖◆
❼ ◗✸✿ ❲❤❛t ❝❛♥ ✇❡ ❞♦ t♦ ✐♠♣r♦✈❡ t❤❡ ♣r♦❝❡ss ♦❢ ❞❡❡♣ ❧❡❛r♥✐♥❣❄ ❉✐✛❡r❡♥t r❡❣✉❧❛r✲✐③❛t✐♦♥ t❡❝❤♥✐q✉❡s✱ s✉❝❤ ❛s ❜❛t❝❤ ♥♦r♠❛❧✐③❛t✐♦♥ ❛♥❞ ❧❛②❡r ♥♦r♠❛❧✐③❛t✐♦♥✱ ✇✐❧❧ ❜❡♣r♦♣♦s❡❞ ❛♥❞ ❡✈❛❧✉❛t❡❞✳
✶✳✸ ❙tr✉❝t✉r❡
❚❤✐s r❡s❡❛r❝❤ ✐s str✉❝t✉r❡❞ ✐♥t♦ ✺ ❝❤❛♣t❡rs✿
❼ ❈❤❛♣t❡r ✶ ✲ ■♥tr♦❞✉❝t✐♦♥ ✲ ❝♦♥t❛✐♥s t❤❡ ♠♦t✐✈❛t✐♦♥ ❢♦r r❡s❡❛r❝❤✐♥❣ t❤❡ t♦♣✐❝✱ t❤❡❞❡s❝r✐♣t✐♦♥ ♦❢ t❤❡ ♠❡t❤♦❞♦❧♦❣② ❛♥❞ t❤❡ str✉❝t✉r❡ ♦❢ t❤❡ r❡s❡❛r❝❤✳ ❙♦♠❡ r❡❧❛t❡❞✇♦r❦ ✐s ❞❡s❝r✐❜❡❞ ❛s ✇❡❧❧
❼ ❈❤❛♣t❡r ✷ ✲ ❇❛❝❦❣r♦✉♥❞ ✲ ♣r♦✈✐❞❡s t❤❡ ♦✈❡r✈✐❡✇ ♦❢ t❤❡ t❤❡♦r② ❜❡❤✐♥❞ t❤✐sr❡s❡❛r❝❤✳ ■t ♣r♦✈✐❞❡s ❛ s❤♦rt ❞❡s❝r✐♣t✐♦♥ ♦❢ ♠❛❝❤✐♥❡ ❧❡❛r♥✐♥❣✱ st❛t✐st✐❝❛❧ ♠❡t❤♦❞✉s❡❞ ❢♦r s✉♣♣♦rt✐♥❣ ✐t✱ ■❚ s❡❝✉r✐t②✱ ❡t❝✳
❼ ❈❤❛♣t❡r ✸ ✲ ❚❤❡ ❞❡s❝r✐♣t✐♦♥ ♦❢ t❤❡ ❡①♣❡r✐♠❡♥t t❤❛t ✇❛s ❝♦♥❞✉❝t❡❞✳ ❚❤✐s ♣❛rt❞❡s❝r✐❜❡s t❤❡ ❢❡❛t✉r❡ s❡t✱ ♣r❡♣r♦❝❡ss✐♥❣ ♦❢ t❤❡ ❞❛t❛ ❛♥❞ ❞❡✈❡❧♦♣♠❡♥t ♦❢ t❤❡r❡❝✉rr❡♥t ♥❡✉r❛❧ ♥❡t✇♦r❦ ♠♦❞❡❧✳
❼ ❈❤❛♣t❡r ✹ ✲ ❘❡s✉❧t ✲ ❚❤❡ ♦✉t❝♦♠❡ ♦❢ t❤❡ ❡①♣❡r✐♠❡♥t✱ ♦♣t✐♠✐③❛t✐♦♥ ❛♥❞ r❡❣✉❧❛r✲✐③❛t✐♦♥
❼ ❈❤❛♣t❡r ✺ ✲ ❈♦♥❝❧✉s✐♦♥ ✲ ❚❤❡ ✜♥❛❧ ❞✐s❝✉ss✐♦♥ r❡❣❛r❞✐♥❣ t❤❡ r❡s❡❛r❝❤✱ ❢✉t✉r❡❞❡♠❛♥❞
✹
![Page 12: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/12.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
✷ ❇❆❈❑●❘❖❯◆❉
✷ ❇❛❝❦❣r♦✉♥❞
■♥ t❤✐s ❝❤❛♣t❡r✱ ✇❡ ❛r❡ s❡tt✐♥❣ t❤❡ t❤❡♦r❡t✐❝❛❧ ❜❛❝❦❣r♦✉♥❞ ❢♦r t❤✐s r❡s❡❛r❝❤✳ ❆s ✇❡ ❛r❡tr②✐♥❣ t♦ ❞❡t❡❝t t❤❡ s❡❝✉r✐t② ❛tt❛❝❦s ✐♥ ❡♥❝r②♣t❡❞ ♥❡t✇♦r❦ tr❛✣❝✱ ✐♥ t❤❡ ✜rst ♣❛rt ♦❢t❤✐s ❝❤❛♣t❡r ✇❡ ❛r❡ ✐♥tr♦❞✉❝✐♥❣ t❤❡ ❜❛s✐❝ ❝♦♥❝❡♣ts ♦❢ ♥❡t✇♦r❦ s❡❝✉r✐t② ❛♥❞ ♥❡t✇♦r❦tr❛✣❝ ❡♥❝r②♣t✐♦♥✳ ❆ s❤♦rt ♦✈❡r✈✐❡✇ ♦❢ ■♥tr✉s✐♦♥ ❉❡t❡❝t✐♦♥ ❙②st❡♠ ✭■❉❙✮ ✐s ❣✐✈❡♥✱ ✐♥♦r❞❡r t♦ ✉♥❞❡rst❛♥❞ ❤♦✇ t❤❡ ♠♦st ✉s❡❞ s②st❡♠ ❢♦r ❛tt❛❝❦ ❞❡t❡❝t✐♦♥ ✇♦r❦s ❛♥❞ t♦❞❡t❡r♠✐♥❡ t❤❡ ❧✐♠✐t❛t✐♦♥s ✇❤✐❝❤ ❝♦✉❧❞ ❜❡ ♦✈❡r❝♦♠❡ ❜② ✉s✐♥❣ ♦✉r s②st❡♠✳
❚❤❡ s❡❝♦♥❞ ♣❛rt r❡♣r❡s❡♥ts ❛♥ ✐♥tr♦❞✉❝t✐♦♥ t♦ ❞✐✛❡r❡♥t t②♣❡s ♦❢ tr❛✣❝ ❝❧❛ss✐✜❝❛t✐♦♥✳❲❡ ✇✐❧❧ ❣✐✈❡ ❛ s❤♦rt ♦✈❡r✈✐❡✇ ♦❢ ♣♦rt✲❜❛s❡❞✱ ✢♦✇✲❜❛s❡❞ ❝❧❛ss✐✜❝❛t✐♦♥ ❛♥❞ ❞❡❡♣ ♣❛❝❦❡t✐♥s♣❡❝t✐♦♥ ✭❉P■✮✳ ❋❧♦✇✲❜❛s❡❞ ❝❧❛ss✐✜❝❛t✐♦♥ ✐s ❡①♣❧❛✐♥❡❞ ♠♦r❡ ✐♥ ❞❡t❛✐❧s s✐♥❝❡ t❤✐s t②♣❡✐s ✉s❡❞ ✐♥ ♦✉r r❡s❡❛r❝❤✳
❚❤❡ t❤✐r❞ ♣❛rt ♦❢ t❤✐s ❝❤❛♣t❡r ♣r❡s❡♥ts ♠❛❝❤✐♥❡ ❧❡❛r♥✐♥❣ ✭▼▲✮✳ ❲❡ ❛r❡ ✐♥tr♦❞✉❝✐♥❣▼▲ ❛♥❞ ❛❧❧ t❤❡ ❝♦♥❝❡♣ts t❤❛t ❛r❡ ✉s❡❞ ✐♥ ♦✉r r❡s❡❛r❝❤✳ ❆ s✉♠♠❛r② ♦❢ ▼▲ ✐s ❣✐✈❡♥✇✐t❤ t❤❡ st❛t✐st✐❝❛❧ ❝♦♥❝❡♣ts ♦❢ t❤❡ ♥❡✉r❛❧ ♥❡t✇♦r❦ ❛♥❞ ✇✐t❤ t❤❡ ❡①♣❧❛♥❛t✐♦♥ ♦❢ t❤❡r❡❝✉rr❡♥t ♥❡✉r❛❧ ♥❡t✇♦r❦ ✭❘◆◆✮✳ ❚❤❡ s✉♠♠❛r② ✐s ❢♦❧❧♦✇❡❞ ❜② ❛ t❤❡♦r❡t✐❝❛❧ ♦✈❡r✈✐❡✇♦❢ ❧♦♥❣✲s❤♦rt t❡r♠ ♠❡♠♦r② ✭▲❙❚▼✮ ❛♥❞ ❣❛t❡❞ r❡❝✉rr❡♥t ✉♥✐t ✭●❘❯✮ ❝❡❧❧s ✇❤✐❝❤ ❛r❡♣❛rt ♦❢ t❤❡ ♠♦❞❡❧s t❤❛t ❛r❡ tr❛✐♥❡❞ ✐♥ ♦✉r ❡①♣❡r✐♠❡♥t✳
✺
![Page 13: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/13.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
✷✳✶ ■❚ ❙❡❝✉r✐t② ✷ ❇❆❈❑●❘❖❯◆❉
❋✐❣✉r❡ ✶✿ ◆❡t✇♦r❦ ❙❡❝✉r✐t② Pr✐♥❝✐♣❧❡
✷✳✶ ■❚ ❙❡❝✉r✐t②
✷✳✶✳✶ ❇❛s✐❝ ❈♦♥❝❡♣ts ♦❢ ◆❡t✇♦r❦ ❙❡❝✉r✐t②
◆❡t✇♦r❦ ❙❡❝✉r✐t② ✐s ❛ ❜r♦❛❞ r❛♥❣❡ ♦❢ ♠❡❛s✉r❡♠❡♥ts ❛♥❞ ❛❝t✐♦♥s ✇❤✐❝❤ ❛r❡ t❛❦❡♥✐♥ ♦r❞❡r t♦ ♣r♦t❡❝t t❤❡ ♥❡t✇♦r❦ ✐♥❢r❛str✉❝t✉r❡ ❛♥❞ t♦ ♣r❡✈❡♥t ❛♥ ✉♥❛✉t❤♦r✐③❡❞❛❝❝❡ss✱ ♠✐s✉s❡✱ ♠♦❞✐✜❝❛t✐♦♥ ❛♥❞ ❞✐sr✉♣t✐♦♥ ♦❢ ❞❛t❛✱ ♠❛❧❢✉♥❝t✐♦♥ ♦❢ t❤❡ s②st❡♠✱ ❡t❝✳■♥ ♦t❤❡r ✇♦r❞s✱ ◆❡t✇♦r❦ ❙❡❝✉r✐t② ✐s ✉s❡❞ t♦ ♣r♦t❡❝t ♦✉r ♥❡t✇♦r❦ ❛♥❞ ❞❛t❛✱ t❤❡✐r✉s❛❜✐❧✐t② ❛♥❞ ✐♥t❡❣r✐t②✳ ❚❤❡ s❝♦♣❡ ♦❢ ♥❡t✇♦r❦ s❡❝✉r✐t② ❝♦✈❡rs s♦❢t✇❛r❡✱ ❤❛r❞✇❛r❡ ❛♥❞✜r♠✇❛r❡✱ ❛s ✇❡❧❧ ❛s t❤❡ ✐♥❢♦r♠❛t✐♦♥ ✇❤✐❝❤ ✐s ♣r♦❝❡ss❡❞✱ st♦r❡❞ ❛♥❞ ❝♦♠♠✉♥✐❝❛t❡❞✳ ❬✷✶❪✳
❚❤❡r❡ ❛r❡ t❤r❡❡ ❜❛s✐❝ ❝♦♥❝❡♣ts ✇❤✐❝❤ ♠❛❦❡ t❤❡ ❝♦r❡ ♦❢ ◆❡t✇♦r❦ ❙❡❝✉r✐t②✿ ❈♦♥✜❞❡♥✲t✐❛❧✐t②✱ ■♥t❡❣r✐t② ❛♥❞ ❆✈❛✐❧❛❜✐❧✐t②✱ ❛❧s♦ ❦♥♦✇♥ ❛s t❤❡ ❈■❆ ♣r✐♥❝✐♣❧❡✳ ❚❤♦s❡ ❝♦♥❝❡♣ts❞❡✜♥❡ t❤❡ ♠♦st ✐♠♣♦rt❛♥t s❡❝✉r✐t② ♦❜❥❡❝t✐✈❡s ❢♦r ❞❛t❛ ❛♥❞ ✐♥❢♦r♠❛t✐♦♥ s❡r✈✐❝❡s✳
❈♦♥✜❞❡♥t✐❛❧✐t② r❡❢❡rs t♦ ❝♦♥❝❡❛❧✐♥❣ ✐♥❢♦r♠❛t✐♦♥ ♦r r❡s♦✉r❝❡s t♦ ♣r♦t❡❝t s❡❝r❡❝②✳ ■t ❝♦✉❧❞❜❡ ✐♥t❡r♣r❡t❡❞ ❛s ❤❛✈✐♥❣ ✷ s✉❜s❡ts✱ ❞❛t❛ ❝♦♥✜❞❡♥t✐❛❧✐t②✱ ✇❤✐❝❤ ❛ss✉r❡s t❤❛t t❤❡ ❝♦♥✜✲❞❡♥t✐❛❧ ✐♥❢♦r♠❛t✐♦♥ ✐s r❡✈❡❛❧❡❞ ♦♥❧② t♦ ❛♥ ❛✉t❤♦r✐③❡❞ ♣❡rs♦♥✱ ❛♥❞ ♣r✐✈❛❝②✱ ✇❤✐❝❤ ❛ss✉r❡st❤❛t t❤❡ ❝♦♥tr♦❧ ♦r ✐♥✢✉❡♥❝❡ ♦❢ t❤❡ ✐♥❢♦r♠❛t✐♦♥ ✐s ❝♦❧❧❡❝t❡❞ ♦r st♦r❡❞ ♦♥❧② ❜② t❤❡ ✐♥✲t❡♥❞❡❞ ♣❡rs♦♥✳ ❬✹✹❪❚❤❡ ♠❡t❤♦❞ ✇❤✐❝❤ ✐s ✇✐❞❡❧② ✉s❡❞ t♦ ♣r♦✈✐❞❡ ❝♦♥✜❞❡♥t✐❛❧✐t② ✐s ❝r②♣t♦❣r❛♣❤②✳ ❯s✐♥❣❛ ❝r②♣t♦❣r❛♣❤✐❝ ❦❡②✱ ❡♥❝r②♣t❡❞ ❞❛t❛ ✐s s❝r❛♠❜❧❡❞ ✐♥ s✉❝❤ ❛ ✇❛② t❤❛t ✐t ❝❛♥♥♥♦t ❜❡❞❡❝✐♣❤❡r❡❞ ❜② ❛♥ ✉♥❛✉t❤♦r✐③❡❞ ♣❡rs♦♥ ✇✐t❤♦✉t t❤❡ ❛♣♣r♦♣r✐❛t❡ ❦❡②✳
■♥t❡❣r✐t② r❡❢❡rs t♦ ♣r❡✈❡♥t✐♥❣ ❛♥ ✐♠♣r♦♣❡r ♠♦❞✐✜❝❛t✐♦♥ ❛♥❞ ✉♥❛✉t❤♦r✐③❡❞ ❝❤❛♥❣❡✳ ■t❝❛♥ ❛❧s♦ ❜❡ ❝❧❛ss✐✜❡❞ ✐t ✐♥t♦ ✷ s✉❜s❡ts✿ ❞❛t❛ ✐♥t❡❣r✐t② ❛ss✉r❡s t❤❛t t❤❡ ✐♥❢♦r♠❛t✐♦♥ ✐s
✻
![Page 14: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/14.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
✷✳✶ ■❚ ❙❡❝✉r✐t② ✷ ❇❆❈❑●❘❖❯◆❉
♠❛♥✐♣✉❧❛t❡❞ ♦♥❧② ✐♥ ❛♥ ❛✉t❤♦r✐③❡❞ ♠❛♥♥❡r✱ ✇❤❡r❡❛s s②st❡♠ ✐♥t❡❣r✐t② ❛ss✉r❡s t❤❛t ❛s②st❡♠ ♣❡r❢♦r♠s ✐♥t❡♥❞❡❞ ❢✉♥❝t✐♦♥s✱ ✇✐t❤♦✉t ❛♥② ♠♦❞✐✜❝❛t✐♦♥ ❛♥❞ ❜✐❛s✐♥❣✳ ❬✹✹❪❚❤❡ ♠❡t❤♦❞s ❢♦r ♣r❡✈❡♥t✐♥❣ ❛♥ ✐♥❢♦r♠❛t✐♦♥ ♠♦❞✐✜❝❛t✐♦♥ ❛r❡✿
❼ ❤❛s❤✐♥❣ ✲ ❛❞❞s ❛ ♥✉♠❜❡r ♦❢ ❜✐ts✱ ❣❡♥❡r❛t❡❞ ✇✐t❤ s❡❝r❡t ❦❡②✱ t♦ ❝❤❡❝❦ ✐❢ ❛ ♠❡ss❛❣❡✐s ❛❧t❡r❡❞
❼ ♠❡ss❛❣❡ ❛✉t❤❡♥t✐❝❛t✐♦♥ ✲ ✉s❡s t❤❡ s❡❝r❡t ❦❡② t♦ ❡♥s✉r❡s t❤❛t ❛ ♠❡ss❛❣❡ ✐s ❛❧t❡r❡❞❜② ❛♥ ❛✉t❤♦r✐③❡❞ ♣❡rs♦♥
❼ ❞✐❣✐t❛❧ s✐❣♥❛t✉r❡ ✲ ❡♥s✉r❡s t❤❛t t❤❡ ✐♥❢♦r♠❛t✐♦♥ ✐s s❡♥t ❜② ❛ s♣❡❝✐✜❝ ❛♥❞ ❛✉t❤♦r✐③❡❞s♦✉r❝❡
❆✈❛✐❧❛❜✐❧✐t② r❡❢❡rs t♦ t❤❡ ♣r♦♣❡r ❢✉♥❝t✐♦♥✐♥❣ ♦❢ t❤❡ s②st❡♠✱ ✇❤✐❝❤ ♠❡❛♥s ✐♥t❡♥❞❡❞✇♦r❦ ♦❢ t❤❡ s②st❡♠ ❛t ❛ ❞❡s✐r❡❞ t✐♠❡✳ ❚❤❡ ❧♦ss ♦❢ ❛✈❛✐❧❛❜✐❧✐t② ♣r❡✈❡♥ts ✉s ❢r♦♠ ✉s✐♥❣t❤❡ ✐♥❢♦r♠❛t✐♦♥ ❛t t❤❡ ❞❡s✐r❡❞ t✐♠❡ ❛♥❞ ❞❡❝r❡❛s❡s s②st❡♠ r❡❧✐❛❜✐❧✐t②✳ ❚❤❡ r❡❝❡♥t t✐♠❡s❤❛✈❡ s❡❡♥ t❤❡ ❢❛st ❣r♦✇✐♥❣ ♣♦♣✉❧❛r✐t② ♦❢ ❞❡♥✐❛❧✲♦❢✲s❡r✈✐❝❡ ❛tt❛❝❦✳ ❆s ♠♦r❡ ❛♥❞ ♠♦r❡✇❡❜ s✐t❡s ♦✛❡r ❞❡♥✐❛❧✲♦❢✲s❡r✈✐❝❡✭❉♦❙✮ ❛tt❛❝❦ ♦♥ ❞❡♠❛♥❞✱ ❛✈❛✐❧❛❜✐❧✐t② ❢❛❝❡s t❤❡ ❢❛st❡st❣r♦✇✐♥❣ ✈✉❧♥❡r❛❜✐❧✐t② ♦❢ ❛❧❧ t❤❡ ❝♦♥❝❡♣ts✳
❚❤❡ ♦r❞❡r ♦❢ ✐♠♣♦rt❛♥❝❡ ♦❢ t❤❡ ❝♦♥❝❡♣ts ✈❛r✐❡s✱ ❞❡♣❡♥❞✐♥❣ ♦♥ t❤❡ ♣✉r♣♦s❡ ♦❢ ❛ s②st❡♠❛♥❞ t❤❡ ❛♣♣❧✐❝❛t✐♦♥s✳ ❋♦r ❡①❛♠♣❧❡✱ ✐♥ ♠❛✐❧ ❛♣♣❧✐❝❛t✐♦♥s✱ ❝♦♥✜❞❡♥t✐❛❧✐t② ❛♥❞ ✐♥t❡❣r✐t②❛r❡ t❤❡ ♠♦st ✐♠♣♦rt❛♥t ❝♦♥❝❡♣ts✳ ❖♥ t❤❡ ♦t❤❡r ❤❛♥❞✱ ♠♦♥✐t♦r✐♥❣ s②st❡♠s r❡q✉✐r❡❛✈❛✐❧❛❜✐❧✐t② ❛♥❞ ✐♥t❡❣r✐t②✳ ❲❡ ❝❛♥ ❛❣r❡❡✱ ❤♦✇❡✈❡r✱ t❤❛t ❛❧❧ t❤r❡❡ ❝♦♥❝❡♣ts ❛r❡ ❝r✉❝✐❛❧❢♦r ❛♥② ♥❡t✇♦r❦ s❡❝✉r✐t② ❛♣♣❧✐❝❛t✐♦♥✳
✷✳✶✳✷ ■♥tr✉s✐♦♥ ❉❡t❡❝t✐♦♥
■♥tr✉s✐♦♥ ❞❡t❡❝t✐♦♥ ✐s ❛ s❡r✈✐❝❡ ✇❤✐❝❤ ♠♦♥✐t♦rs ❛♥❞ ❛♥❛❧②③❡s s②st❡♠s ❜❡❤❛✈✐♦r ✐♥ ♦r❞❡rt♦ ❞❡t❡❝t ❛♥❞ ♣r♦✈✐❞❡ ❛ r❡❛❧ t✐♠❡ ✇❛r♥✐♥❣ ❛❜♦✉t ❛♥ ❛tt❡♠♣t t♦ ❛❝❝❡ss s❡❝✉r✐t② s❡♥s✐t✐✈❡s②st❡♠ ✐♥ ❛♥ ✉♥❛✉t❤♦r✐③❡❞ ♠❛♥♥❡r✳ ❬✹✸❪ ■♥tr✉s✐♦♥ ❞❡t❡❝t✐♦♥ r❡♣r❡s❡♥ts s❡❝♦♥❞ ❧❡✈❡❧♣r♦t❡❝t✐♦♥ ❛♥❞ ✐t ✐s ✉s✉❛❧❧② ♣❧❛❝❡❞ ❛❢t❡r t❤❡ ✜r❡✇❛❧❧ t♦ ❝♦❧❧❡❝t ❛♥② ✐♥tr✉s✐♦♥ t❤❛t ♣❛ss❡st❤r♦✉❣❤ t❤❡ ✜r❡✇❛❧❧✳
✼
![Page 15: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/15.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
✷✳✶ ■❚ ❙❡❝✉r✐t② ✷ ❇❆❈❑●❘❖❯◆❉
❋✐❣✉r❡ ✷✿ ■♥tr✉s✐♦♥ ❉❡t❡❝t✐♦♥ ❙②st❡♠
❚❤❡r❡ ❛r❡ t✇♦ ❞✐✛❡r❡♥t ❛♣♣r♦❛❝❤❡s ✉s❡❞ t♦ ❛♥❛❧②③❡ ♥❡t✇♦r❦ ❞❛t❛ ✐♥ ♦r❞❡r t♦ ❞❡t❡❝t✐♥tr✉s✐♦♥s✿
❼ ❆♥♦♠❛❧② ❞❡t❡❝t✐♦♥ ✲ ✉s❡s t❤❡ ❝♦❧❧❡❝t❡❞ ❞❛t❛ ♦❢ ❛ ✉s❡r✬s ❜❡❤❛✈✐♦r t♦ ❝♦♠♣❛r❡✐t ✇✐t❤ t❤❡ s❡t ♦❢ ❡①♣❡❝t❡❞ ✈❛❧✉❡s❀ ✐t tr✐❣❣❡rs ❛ ✇❛r♥✐♥❣ ✐❢ ✐t ❞❡✈✐❛t❡s t♦♦ ♠✉❝❤
❼ ❙✐❣♥❛t✉r❡ ♦r ❍❡✉r✐st✐❝ ❉❡t❡❝t✐♦♥✱ ✇❤✐❝❤ ✉s❡s ❛ ❦♥♦✇♥ ♠❛❧✐❝✐♦✉s ♣❛tt❡r♥ ❢♦r❛ ❝♦♠♣❛r✐s♦♥ ✇✐t❤ t❤❡ ❝✉rr❡♥t ❜❡❤❛✈✐♦r
❚❤❡ ✜rst ♣❤❛s❡ ♦❢ ❛♥♦♠❛❧② ❞❡t❡❝t✐♦♥ ✐s ♠♦❞❡❧✐♥❣ ♦❢ t❤❡ ♥♦♥✲❝♦♠♣r♦♠✐s❡❞ ✉s❡r❜❡❤❛✈✐♦r ❜② ❝♦❧❧❡❝t✐♥❣ ❛♥❞ ♣r♦❝❡ss✐♥❣ s❡♥s♦r ❞❛t❛✳ ❚❤✐s ♠♦❞❡❧ ✐s ✉s❡❞ ❛❢t❡r✇❛r❞s ❢♦rt❤❡ ❝♦♠♣❛r✐s♦♥ ✇✐t❤ t❤❡ ♦❜s❡r✈❡❞ ❜❡❤❛✈✐♦r t♦ ❞❡t❡❝t ♠❛❧✐❝✐♦✉s ❛❝t✐✈✐t✐❡s✳
❚❤❡r❡ ❛r❡ ❞✐✛❡r❡♥t ❛♣♣r♦❛❝❤❡s t♦ ❝r❡❛t✐♥❣ t❤❡ ♠♦❞❡❧s✿
❼ ❙t❛t✐st✐❝❛❧ ♠❡t❤♦❞s ✲ ❝♦❧❧❡❝t t❤❡ ❞❛t❛ ❢r♦♠ s❡♥s♦rs ❛♥❞ ✉s❡ ♠♦❞❡❧s ✇✐t❤ ❞✐❢✲❢❡r❡♥t ♠❡t❤♦❞s ♦❢ ❝❧❛ss✐❢②✐♥❣ t❤❡ ❞❛t❛ ✭✉♥✐✈❛r✐❛t❡✱ ♠✉❧t✐✈❛r✐❛t❡✱ t✐♠❡✲s❡r✐❡s✮✳ ❚❤❡❛❞✈❛♥t❛❣❡ ♦❢ t❤✐s ❛♣♣r♦❛❝❤ ✐s t❤❛t ✐t ✐s s✐♠♣❧❡ ❛♥❞ ❝♦♠♣✉t❛t✐♦♥❛❧❧② ❡✣❝✐❡♥t✱ ❜✉t✐t ✐s ❞✐✣❝✉❧t t♦ ❝❤♦♦s❡ ❛ ♣r♦♣❡r ♠❡tr✐❝ ❛♥❞ ♥♦t ❛❧❧ ❜❡❤❛✈✐♦rs ❝❛♥ ❜❡ ♠♦❞❡❧❡❞✳
❼ ❑♥♦✇❧❡❞❣❡✲❜❛s❡❞ ❛♣♣r♦❛❝❤ ❝♦♥s✐sts ♦❢ ✷ ♣❤❛s❡s✿ t❤❡ tr❛✐♥✐♥❣ ♣❤❛s❡✱ ✐♥ ✇❤✐❝❤t❤❡ ♦❜s❡r✈❡❞ ❞❛t❛ ✐s ❞✐✈✐❞❡❞ ✐♥t♦ ❞✐✛❡r❡♥t ❝❧❛ss❡s✱ ❛♥❞ t❤❡ ❝❧❛ss✐✜❝❛t✐♦♥ ♣❤❛s❡✱✇❤❡r❡ t❤❡ ✉s❡r ❜❡❤❛✈✐♦r ✐s ❝❧❛ss✐✜❡❞ ❜❛s❡❞ ♦♥ t❤♦s❡ ♣r❡❞❡t❡r♠✐♥❡❞ ❝❧❛ss❡s✳ ❚❤❡❛❞✈❛♥t❛❣❡ ✐s t❤❛t t❤✐s ❛♣♣r♦❛❝❤ ✐s r♦❜✉st ❛♥❞ ✢❡①✐❜❧❡✱ ❜✉t ✐t ✐s ❞✐✣❝✉❧t t♦ ❞❡t❡r✲♠✐♥❡ ❛♥ ❛❝❝✉r❛t❡ ♠♦❞❡❧
✽
![Page 16: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/16.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
✷✳✶ ■❚ ❙❡❝✉r✐t② ✷ ❇❆❈❑●❘❖❯◆❉
❼ ▼❛❝❤✐♥❡✲❧❡❛r♥✐♥❣ ❛♣♣r♦❛❝❤ ✉s❡s ❧❛❜❡❧❡❞ tr❛✐♥✐♥❣ ❞❛t❛ t♦ ❛✉t♦♠❛t✐❝❛❧❧② ❞❡✈❡❧♦♣t❤❡ ♠♦❞❡❧✳ ❉❡✈❡❧♦♣✐♥❣ t❤❡ ♠♦❞❡❧ r❡q✉✐r❡s s♦♠❡ t✐♠❡ ❛♥❞ ♠♦r❡ ❝♦♠♣✉t❛t✐♦♥❛❧♣♦✇❡r✱ ❜✉t ♦♥❝❡ ✐t ✐s ❞❡✈❡❧♦♣❡❞✱ t❤❡ ♠♦❞❡❧ ✐s ❢❛✐r❧② ❡✣❝✐❡♥t✳ ❱❛r✐♦✉s st❛t✐st✐❝❛❧♠❡t❤♦❞s ✉s❡❞ ✐♥ t❤✐s ❛♣♣r♦❛❝❤ ❛r❡✿ ❇❛②❡s✐❛♥ ♥❡t✇♦r❦s✱ ▼❛r❦♦✈ ♠♦❞❡❧s✱ ♥❡✉r❛❧♥❡t✇♦r❦✱ ❢✉③③② ❧♦❣✐❝✱ ❣❡♥❡r✐❝ ❛❧❣♦r✐t❤♠✱ ❝❧✉st❡r✐♥❣ ❛♥❞ ♦✉t❧✐❡r ❞❡t❡❝t✐♦♥✳
❚❤❡ ♠❛✐♥ ❧✐♠✐t❛t✐♦♥ ✇✐t❤ ❛♥♦♠❛❧② ❞❡t❡❝t✐♦♥✱ ❡s♣❡❝✐❛❧❧② ✐♥ t❤❡ ♠❛❝❤✐♥❡✲❧❡❛r♥✐♥❣ ❛♣✲♣r♦❛❝❤✱ ✐s t❤❛t ✐t ♦♥❧② ✉s❡s ❧❡❣✐t✐♠❛t❡ ❞❛t❛✱ ✇✐t❤♦✉t ❛♥② ❛♥♦♠❛❧✐❡s ✇❤✐❝❤ ✐s ❞✐✣❝✉❧t t♦❡♥s✉r❡ ❢♦r t❤❡ ♠♦❞❡r♥ ♥❡t✇♦r❦ tr❛✣❝✳❲❡ ✇✐❧❧ tr② t♦ ❛❞❞r❡ss t❤✐s ✐ss✉❡ ✐♥ ♦✉r r❡s❡❛r❝❤ ❛♥❞ ♣r♦♣♦s❡ ❞✐✛❡r❡♥t ♠❡t❤♦❞s t♦❞❡t❡❝t ❛♥❞ ❝❧❛ss✐❢② ❛♥♦♠❛❧✐❡s ✐♥ t❤❡ tr❛✣❝✳
❙✐❣♥❛t✉r❡ ♦r ❤❡✉r✐st✐❝ ❞❡t❡❝t✐♦♥ ✐s ❜❛s❡❞ ♦♥ ❛❧r❡❛❞② ❦♥♦✇♥ ♣❛tt❡r♥s✳ ❚❤❡ ✉s❡r ❜❡❤❛✈✐♦r✐s ♦❜s❡r✈❡❞ ❛♥❞ ❝♦♠♣❛r❡❞ ✇✐t❤ t❤❡ ❡①✐st✐♥❣ s✐❣♥❛t✉r❡ ❞❛t❛❜❛s❡✳ ■t ❝❛♥ ❜❡ ❛❧s♦ ❝♦♥✲✜❣✉r❡❞ t♦ ❞❡t❡❝t ❦♥♦✇♥ ♣❡♥❡tr❛t✐♦♥s ♦r ❡①♣❧♦✐ts✱ t❤❛t ✐s ♠♦r❡ s♣❡❝✐✜❝ t♦ t❤❡ s②st❡♠✇❤✐❝❤ ✐s ✉s❡❞✳ ❚❤❡ ❛❞✈❛♥t❛❣❡ ♦❢ t❤✐s ♠❡t❤♦❞ ✐s t✐♠❡ ❡✣❝✐❡♥❝② ❛♥❞ ❧♦✇ ❝♦♠♣✉t❛t✐♦♥❛❧❝♦♠♣❧❡①✐t②✱ ❜✉t ✐t ✐s ♥♦t ❛❜❧❡ t♦ r❡❝♦❣♥✐③❡ ♥❡✇ t❤r❡❛ts ✇✐t❤♦✉t ✉♣❞❛t✐♥❣ t❤❡ s✐❣♥❛t✉r❡❞❛t❛❜❛s❡✳
✾
![Page 17: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/17.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
✷✳✷ ❚r❛✣❝ ❊♥❝r②♣t✐♦♥ ✷ ❇❆❈❑●❘❖❯◆❉
❋✐❣✉r❡ ✸✿ ❉❛t❛ ❊♥❝r②♣t✐♦♥ ♣❤❛s❡s
✷✳✷ ❚r❛✣❝ ❊♥❝r②♣t✐♦♥
❊♥❝r②♣t✐♦♥ ✐s ✉s❡❞ t♦ ♣r♦✈✐❞❡ ❝♦♥✜❞❡♥t✐❛❧✐t② ♦❢ t❤❡ ❞❛t❛✱ ❛♥❞ ♠♦st ♦❢ t❤♦s❡ ♣r♦t♦❝♦❧s❛❧s♦ ❜r✐♥❣ s♦♠❡ ❧❡✈❡❧ ♦❢ ✐♥t❡❣r✐t② ♣r♦t❡❝t✐♦♥ ❛♥❞ ❛✉t❤❡♥t✐❝❛t✐♦♥ t♦ t❤❡ ✉s❡rs✳ Pr♦t♦❝♦❧s✉s✉❛❧❧② ❡♠♣❧♦② t❤❡ s❡❝r❡t ❦❡② ♠❡t❤♦❞ ♦❢ ❡♥❝r②♣t✐♦♥✱ s♦ t❤❡ ✜rst ♣❤❛s❡ ✐s t❤❡ ✐♥✐t✐❛❧❤❛♥❞s❤❛❦❡✱ t❤❡ ❛✉t❤❡♥t✐❝❛t✐♦♥ ♦❢ ❛ ✉s❡r ❛♥❞ ❦❡② ❡①❝❤❛♥❣❡✳ ❋✐❣✿ ✸ s❤♦✇s ❡♥❝r②♣t✐♦♥♣❤❛s❡s✳
❚❤❡ ♣r♦t♦❝♦❧s t❤❛t ❛r❡ ❣♦✐♥❣ t♦ ❜❡ ❞❡s❝r✐❜❡❞ ❛r❡✿ ■Ps❡❝ ❛♥❞ ❚▲❙✳
✷✳✷✳✶ ■♥t❡r♥❡t Pr♦t♦❝♦❧ ❙❡❝✉r✐t②
■♥t❡r♥❡t Pr♦t♦❝♦❧ ❙❡❝✉r✐t② ✭■Ps❡❝✮ ❬✹✷❪ ✐s ❛ ♣r♦t♦❝♦❧ t❤❛t ♣r♦✈✐❞❡s t❤❡ ❛✉t❤❡♥t✐❝❛t✐♦♥✱❡♥❝r②♣t✐♦♥ ❛♥❞ ✐♥t❡❣r✐t② ♦❢ t❤❡ ❞❛t❛ ♦♥ t❤❡ ♥❡t✇♦r❦ ❧❛②❡r✳ ■t ♠♦st ❝♦♠♠♦♥❧② ❝♦♥s✐st♦❢ t✇♦ ♣❤❛s❡s✱ t❤❡ ✐♥✐t✐❛t✐♦♥ ♣❤❛s❡✱ ❛♥❞ t❤❡ ❡♥❝r②♣t✐♦♥ ♣❤❛s❡✳ ■♥ t❤❡ ✐♥✐t✐❛❧ ❤❛♥❞s❤❛❦❡♣❤❛s❡✱ t❤❡ ❛✉t❤❡♥t✐❝❛t✐♦♥ ❛♥❞ ❛ s❤❛r❡❞ s❡❝r❡t ❛r❡ ❡st❛❜❧✐s❤❡❞ ♦✈❡r ❯❉P ♣♦rt ✺✵✵✳❚❤❡ ♠❛✐♥ ♣r♦t♦❝♦❧ ✉s❡❞ ❢♦r t❤❡ ✐♥✐t✐❛❧ ♣❤❛s❡ ❛❝t✐✈✐t✐❡s ✐s t❤❡ ■♥t❡r♥❡t ❑❡② ❊①❝❤❛♥❣❡❱❡rs✐♦♥ ✷✭■❑❊✈✷✮ ❬✶✺❪✳ ■♥ t❤❡ s❡❝♦♥❞ ♣❤❛s❡ t❤❡ ❡♥❝r②♣t✐♦♥ ♦❢ t❤❡ ❞❛t❛ ❜❡❣✐♥s✳ ■Ps❡❝✉s❡s ❊♥❝❛♣s✉❧❛t✐♥❣ ❙❡❝✉r✐t② P❛②❧♦❛❞✭❊❙P✮ t♦ ❛❞❞ ❤❡❛❞❡r ❛♥❞ tr❛✐❧❡r t♦ ❡❛❝❤tr❛♥s❢❡rr❡❞ ♣❛❝❦❡t✱ ❛♥❞ ❡✈❡r②t❤✐♥❣ ✐♥ ❜❡t✇❡❡♥ ✐s ❡♥❝r②♣t❡❞✳ ❊❙P ✇♦r❦s ✐♥ ✷ ♠♦❞❡s✿tr❛♥s♣♦rt ♠♦❞❡✱ ✇❤❡r❡ t❤❡ ♦r✐❣✐♥❛❧ ■P ❤❡❛❞❡r ✐s ♥♦t ❡♥❝r②♣t❡❞✱ ❛♥❞ t✉♥♥❡❧❧✐♥❣ ♠♦❞❡✱✇❤❡r❡ t❤❡ ♦r✐❣✐♥❛❧ ❤❡❛❞❡r ✐s ❡♥❝r②♣t❡❞✱ ❛♥❞ ❛ ♥❡✇ ■P ❤❡❛❞❡r ✐s ❛❞❞❡❞✳
■t ✐s ✇♦rt❤ ♠❡♥t✐♦♥✐♥❣ t❤❛t t❤❡r❡ ✐s ❛❧s♦ t❤❡ ❆✉t❤❡♥t✐❝❛t✐♦♥ ❍❡❛❞❡r✭❆❍✮ ♣r♦t♦❝♦❧✇❤✐❝❤ ✐s ✉s❡❞ ❢♦r ❛✉t❤❡♥t✐❝❛t✐♦♥ ✐♥ ■Ps❡❝✳ ❙✐♥❝❡ ❊❙P ❛❧s♦ ❝♦♥t❛✐♥s ❛✉t❤❡♥t✐❝❛t✐♦♥❢❡❛t✉r❡✱ ❆❍ ✐s r❛r❡❧② ✉s❡❞✳
❚❤❡ ❛❞✈❛♥t❛❣❡ ♦❢ t❤❡ ■Ps❡❝ ✐s t❤❛t ✐t r❡q✉✐r❡s ♥♦ ❝❤❛♥❣❡ ♦♥ t❤❡ ❛♣♣❧✐❝❛t✐♦♥ ❧❡✈❡❧✱ ❜✉t✐t ✐s ❧❡ss ✢❡①✐❜❧❡ ❢♦r ❛♣♣❧✐❝❛t✐♦♥s ✇❤✐❝❤ r❡q✉✐r❡ s♦♠❡ ❝♦♥♥❡❝t✐♦♥ ♦♥ ❚❈P ❧❡✈❡❧✳
✶✵
![Page 18: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/18.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
✷✳✷ ❚r❛✣❝ ❊♥❝r②♣t✐♦♥ ✷ ❇❆❈❑●❘❖❯◆❉
❋✐❣✉r❡ ✹✿ ■Ps❡❝ ✭❛✮tr❛♥s♣♦rt ♠♦❞❡✱ ✭❜✮ t✉♥♥❡❧ ♠♦❞❡
✷✳✷✳✷ ❚r❛♥s♣♦rt ▲❛②❡r ❙❡❝✉r✐t②
❚r❛♥s♣♦rt ▲❛②❡r ❙❡❝✉r✐t② ✭❚▲❙✮ ♣r♦✈✐❞❡s ❝♦♥✜❞❡♥t✐❛❧✐t②✱ ✐♥t❡❣r✐t②✱ ♥♦♥✲r❡♣✉❞✐❛t✐♦♥✱r❡♣❧❛② ♣r♦t❡❝t✐♦♥ ❛♥❞ ❛✉t❤❡♥t✐❝❛t✐♦♥ ✇✐t❤ ❞✐❣✐t❛❧ s✐❣♥❛t✉r❡s✳ ■t ✐s ❜❛s❡❞ ♦♥ t❤❡ ❙❡❝✉r❡❙♦❝❦❡t ▲❛②❡r ✈❡rs✐♦♥ ✸ ✭❙❙▲✈✸✮ ❛♥❞ ✐t ♣r♦✈✐❞❡s ❛ s❡❝✉r✐t② ❧❡✈❡❧ ♦♥ t♦♣ ♦❢ ❚❈P✳ ■t ✐s t❤❡♠♦st ❝♦♠♠♦♥❧② ✉s❡❞ ♣r♦t♦❝♦❧ ✐♥ ♥❡t✇♦r❦ ❝♦♠♠✉♥✐❝❛t✐♦♥✱ ❡s♣❡❝✐❛❧❧② ✐♥ ❝♦♦♣❡r❛t✐♦♥✇✐t❤ ❱P◆✱ ❱♦✐♣✱ ❍❚▼▲✱ ❋❚P✱ ❡t❝
❋✐❣✉r❡ ✺✿ ❚r❛♥s♣♦rt ▲❛②❡r ❙❡❝✉r✐t② ♣❛❝❦❡t ❢♦r♠❛t
❚❤❡ ✜rst ♣❤❛s❡ ❝♦♥s✐sts ♦❢ t❤❡ ❚▲❙ ❤❛♥❞s❤❛❦❡✱ ✐♥ ✇❤✐❝❤ t❤❡ ❛✉t❤❡♥t✐❝❛t✐♦♥ t❛❦❡s♣❧❛❝❡✱ ❛♥❞ ❡♥❝r②♣t✐♦♥ ❛♥❞ t❤❡ s❡ss✐♦♥ ❦❡② ❛r❡ ❡st❛❜❧✐s❤❡❞✳ ❚❤❡ ❡♥❝r②♣t✐♦♥ st❛rts ✇❤❡♥t❤❡ ❝✐♣❤❡r s✉✐t❡ ✐s ♥❡❣♦t✐❛t❡❞ ❛♥❞ t❤❡ ✉s❡r ❛✉t❤❡♥t✐❝❛t❡❞✳ ❆❢t❡r t❤❡ ❡♥❝r②♣t✐♥❣ ♣r♦✲❝❡ss✱ ♠❡ss❛❣❡ ❛✉t❤❡♥t✐❝❛t✐♦♥ ❝♦❞❡ ✭▼❆❈✮ ✐s ❛❞❞❡❞ t♦ ♣r♦✈✐❞❡ ❞❛t❛ ✐♥t❡❣r✐t② ♣r♦t❡❝t✐♦♥✳
▼❛✐♥ ❛❞✈❛♥t❛❣❡✱ t❤❛t ✐s ✐♠♣♦rt❛♥t ❢♦r ♦✉r r❡s❡❛r❝❤ ✐s t❤❛t ✐♥ ❚▲❙ t❤❡ ❚❈P ❤❡❛❞❡r ✐s♥♦t ❡♥❝r②♣t❡❞✱ ✇❤✐❧❡ ✐♥ ■Ps❡❝ t❤❡ ❤❡❛❞❡r ✐s ❡♥❝r②♣t❡❞✳
✶✶
![Page 19: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/19.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
✷✳✷ ❚r❛✣❝ ❊♥❝r②♣t✐♦♥ ✷ ❇❆❈❑●❘❖❯◆❉
❋✐❣✉r❡ ✻✿ ❚▲❙ ✐♥✐t✐❛❧ ❤❛♥❞s❤❛❦❡ ✲ ♣r♦❝❡ss ♦❢ ❡st❛❜❧✐s❤✐♥❣ t❤❡ ❚▲❙ ❡♥❝r②♣t✐♦♥✳ ■♥ t❤❡✜rst ♣❤❛s❡✱ ❚❈P ❤❛♥❞s❤❛❦❡ ✐s ❡st❛❜❧✐s❤❡❞✱ t❤❡♥ t❤❡ ✈❡rs✐♦♥ ♦❢ ❚▲❙ ✐s ❡①❝❤❛♥❣❡❞ ❛♥❞❝✐♣❤❡rs✉✐t❡ ♥❡❣♦t✐❛t❡❞✳ ❆❢t❡r ❝✐♣❤❡rs✉✐t❡ ♥❡❣♦t✐❛t✐♦♥✱ t❤❡ ❦❡② ♣❛r❛♠❡t❡rs ❛r❡ ❡①❝❤❛♥❣❡❞✱❛♥❞ ❛❢t❡r ❦❡② ❤❛s ❜❡❡♥ ♣r♦✈❡♥✱ t❤❡ ❡♥❝r②♣t❡❞ ❞❛t❛ ❡①❝❤❛♥❣❡ ❝❛♥ ❜❡ st❛rt❡❞✳
✶✷
![Page 20: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/20.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
✷✳✸ ◆❡t✇♦r❦ ❚r❛✣❝ ❈❧❛ss✐✜❝❛t✐♦♥ ✷ ❇❆❈❑●❘❖❯◆❉
✷✳✸ ◆❡t✇♦r❦ ❚r❛✣❝ ❈❧❛ss✐✜❝❛t✐♦♥
◆❡t✇♦r❦ tr❛✣❝ ❝❧❛ss✐✜❝❛t✐♦♥ ♣❧❛②s ❛ ❝r✉❝✐❛❧ r♦❧❡ ✐♥ ♥❡t✇♦r❦ ♣❧❛♥♥✐♥❣✱ ♥❡t✇♦r❦ ♠❛♥❛❣❡✲♠❡♥t✱ ♥❡t✇♦r❦ s❡❝✉r✐t②✱ ♥❡t✇♦r❦ ✢♦✇✱ ❡t❝✳ ■♥ t❤❡ ❧❛st ❞❡❝❛❞❡✱ t❤❡ ❛♠♦✉♥t ♦❢ ❡♥❝r②♣t❡❞tr❛✣❝ ❤❛s ✐♥❝r❡❛s❡❞ r❛♣✐❞❧②✳ ▼♦r❡ ❛♥❞ ♠♦r❡ ❜✉s✐♥❡ss❡s ❛r❡ ♠♦✈✐♥❣ t❤❡✐r s❡r✈✐❝❡s♦♥✲❧✐♥❡ ❛♥❞ ✉s❡rs ❛r❡ ❜❡❝♦♠✐♥❣ ❛✇❛r❡ ♦❢ ♥❡t✇♦r❦ s❡❝✉r✐t② t❤r❡❛ts✳ ❈♦♠♣✉t❛t✐♦♥❛❧♣♦✇❡r ♦❢ ♠♦❞❡r♥ ❞❡✈✐❝❡s ✐s ♠✉❝❤ ❤✐❣❤❡r✱ ✇❤✐❝❤ ❜r✐♥❣s ♠♦r❡ ✉s❡rs ❛♥❞ ❛♣♣❧✐❝❛✲t✐♦♥s t♦ ✉s❡ ❡♥❝r②♣t✐♦♥ ❛s ❛ s❡❝✉r✐t② ♠❡❛s✉r❡✳ ❚❤❡r❡ ❤❛s ❜❡❡♥ ❛ s✐❣♥✐✜❝❛♥t r✐s❡ ♦❢❡♥❝r②♣t❡❞ ❞❛t❛ ✐♥ ♠♦❞❡r♥ ❝♦♠♠✉♥✐❝❛t✐♦♥ ❛♥❞ ✐t ✐s ❡✈✐❞❡♥t t❤❛t t❤❡ tr❡♥❞ ✇✐❧❧ ❝♦♥t✐♥✉❡✳
❊♥❝r②♣t❡❞ tr❛✣❝ ❡①♣❡r✐❡♥❝❡s t❤❡ ❣r♦✇t❤ ♦❢ ✾✵✪ ❡✈❡r② ②❡❛r ❛♥❞ t❤❡r❡ ❛r❡ ♣r❡❞✐❝t✐♦♥st❤❛t ✐♥ ✷✵✶✾ ❛r♦✉♥❞ ✽✵✪ ♦❢ ✇❡❜ tr❛✣❝ ✇✐❧❧ ❜❡ ❡♥❝r②♣t❡❞✳ ❈♦♠♣❛r❡❞ t♦ t❤❡ ✷✵✶✺ ✇❤❡♥t❤❡r❡ ✇❛s ♦♥❧② ✷✵✪ ♦❢ t❤❡ tr❛✣❝ ❡♥❝r②♣t✐♦♥✱ ✇❡ ✇♦✉❧❞ ❛❣r❡❡ t❤❛t t❤❡ ❡♥❝r②♣t✐♦♥❡①♣❡r✐❡♥❝❡s ❛ ❜✐❣ ❣r♦✇t❤ ❛♥❞ ✐t ❤❛s t❡♥❞❡♥❝② t♦ ❝♦♥t✐♥✉❡ ❣r♦✇✐♥❣✳ ❉✉❡ t♦ ❛♥ ✐♥❝r❡❛s✐♥❣r✐s❡ ♦❢ ❡♥❝r②♣t❡❞ tr❛✣❝✱ tr❛✣❝ ❝❧❛ss✐✜❝❛t✐♦♥ ✐s ❣r❛❞✉❛❧❧② ❜❡❝♦♠✐♥❣ ♠♦r❡ ❞✐✣❝✉❧t✳ ❬✶✽❪
❈❤❛❧❧❡♥❣❡s ✇❤✐❝❤ ❛r❡ ✐♥tr♦❞✉❝❡❞ t♦ t❤❡ ♥❡t✇♦r❦ tr❛✣❝ ❝❧❛ss✐✜❝❛t✐♦♥ ❛r❡ ♥✉♠❡r♦✉s✳❚❤❡r❡ ❛r❡ ❞✐✣❝✉❧t✐❡s t♦ ✐❞❡♥t✐❢② r❡❛❧✲t✐♠❡ ❛♣♣❧✐❝❛t✐♦♥s s✉❝❤ ❛s P✷P✱ ❱♦✐♣✱ ♦♥❧✐♥❡ ✈✐❞❡♦✐♥ ♦r❞❡r t♦ ❢✉❧✜❧❧ t❤❡ ◗♦❙ r❡q✉✐r❡♠❡♥ts✳ ❆♥♦t❤❡r ❝❤❛❧❧❡♥❣❡ ✇♦✉❧❞ ❜❡ t♦ r❡❝♦❣♥✐③❡❛♥❞ ❞✐✛❡r❡♥t✐❛t❡ ❜❡t✇❡❡♥ ♠❛❧✐❝✐♦✉s tr❛✣❝ ❛♥❞ t❤❡ r❡❣✉❧❛r ♥❡t✇♦r❦ tr❛✣❝✳ ◆♦✇❛❞❛②s✱♠❛❧✐❝✐♦✉s tr❛✣❝ ✐s ✉s✉❛❧❧② ❡♥❝r②♣t❡❞✱ ✇❤✐❝❤ ❤❡❧♣s ✐t ❣❡t t❤r♦✉❣❤ t❤❡ ✜r❡✇❛❧❧ ❛♥❞■❉❙ s②st❡♠ ✉♥❞❡t❡❝t❡❞✳ ❋♦r t❤♦s❡ r❡❛s♦♥s✱ t❤❡r❡ ✐s ❛ ♥❡❝❡ss✐t② ❢♦r ❛❝❝✉r❛t❡ tr❛✣❝❝❧❛ss✐✜❝❛t✐♦♥ ✐♥ ♦r❞❡r t♦ ❛♣♣❧② s♦♠❡ r❡str✐❝t✐♦♥s ❛♥❞ ❜❧♦❝❦❛❣❡ ♦❢ ✉♥✇❛♥t❡❞ ❛♣♣❧✐❝❛t✐♦♥❛♥❞ s❡r✈✐❝❡s ♦♥ t❤❡ ✜r❡✇❛❧❧✳
■♥ ♦r❞❡r t♦ ✉♥❞❡rst❛♥❞ t❤❡ ❞✐✣❝✉❧t② ✇❤✐❝❤ ❝♦♠❡s ✇✐t❤ ❡♥❝r②♣t❡❞ tr❛✣❝ ❝❧❛ss✐✜❝❛t✐♦♥✱✇❡ ♥❡❡❞ t♦ ❞✐✈❡ ❞❡❡♣❧② ✐♥t♦ t❤❡ ✇❡❧❧✲❦♥♦✇♥ ❝❧❛ss✐✜❝❛t✐♦♥ t❡❝❤♥♦❧♦❣✐❡s✳ ◆❡t✇♦r❦ ❚r❛✣❝❈❧❛ss✐✜❝❛t✐♦♥ ✐s ❜❛s❡❞ ♦♥ ❞✐✛❡r❡♥t ❢❡❛t✉r❡s ♦❢ tr❛✣❝✳ ❚❤❡ ❢❡❛t✉r❡s ❝❤❛♥❣❡ ✇✐t❤ ❡♥❝r②♣✲t✐♦♥ ✐♥ ✈❛r✐♦✉s ✇❛②s✿ ♥❛♠❡❧② ❝♦♥t❡♥t ✐s ♠♦✈✐♥❣ ❢r♦♠ ♣❧❛✐♥t❡①t t♦ ❝✐♣❤❡rt❡①t✱ st❛t✐st✐❝s❛r❡ ❜❡❝♦♠✐♥❣ ♠♦r❡ r❛♥❞♦♠✱ ❛♥❞ st❛t✐st✐❝❛❧ ♣r♦♣❡rt✐❡s ♦♥ ♣❛❝❦❡t ❛♥❞ ✢♦✇ ❧❡✈❡❧ ❝❤❛♥❣❡s✳❬✶✻❪❚❤❡ ♣♦rt✲❜❛s❡❞ ❝❧❛ss✐✜❝❛t✐♦♥ r❡❧❛②s ♦♥ t❤❡ ❢❛❝t t❤❛t ♠♦st ❛♣♣❧✐❝❛t✐♦♥s ❤❛✈❡ ❛ ❦♥♦✇♥❚❈P ♦r ❯❉P ♣♦rt✱ ❛ss✐❣♥❡❞ ❜② ■❆◆❆✳ ❬✸✵❪ ❚❤✐s r❡♣r❡s❡♥ts t❤❡ s✐♠♣❧❡st ♠❡t❤♦❞✱ ✇❤✐❝❤r❡q✉✐r❡s ❚❈P✴❯❉P ♣♦rt ♥✉♠❜❡r ❢r♦♠ tr❛♥s♣♦rt ❤❡❛❞❡r t♦ ❝♦♠♣❛r❡ ✇✐t❤ ♣♦rt ♥✉♠❜❡r✐♥ ■❆◆❆ ❞❛t❛❜❛s❡✳ ◆♦✇❛❞❛②s✱ ✐t ✐s ♥♦t r❡❝♦♠♠❡♥❞❡❞ t♦ ✉s❡ t❤✐s ♠❡t❤♦❞ ❜❡❝❛✉s❡♦❢ ❛ ✈❛r✐❡t② ♦❢ r❡❛s♦♥s✳ ❋✐rst ♦❢ ❛❧❧✱ s♦♠❡ ❛♣♣❧✐❝❛t✐♦♥s ❛r❡ ✉s✐♥❣ r❛♥❞♦♠ ♦r ❞②♥❛♠✐❝♣♦rt ♥✉♠❜❡rs✳ ❙❡❝♦♥❞❧②✱ ✐t ✐s ❡❛s② t♦ s♣♦♦❢ t❤❡ ♣♦rt ♥✉♠❜❡r ❛♥❞ t♦ ❞✐s❣✉✐s❡ ✉♥❞❡r❦♥♦✇♥ ❛♣♣❧✐❝❛t✐♦♥✳ ❋✉rt❤❡r♠♦r❡✱ t❤❡r❡ ❛r❡ ❛♣♣❧✐❝❛t✐♦♥s t❤❛t ❞♦ ♥♦t ❤❛✈❡ t❤❡ ♥✉♠✲❜❡r ✐♥ t❤❡ ■❆◆❆ ❞❛t❛❜❛s❡ ②❡t✳ ❋✐♥❛❧❧②✱ ❞✉❡ t♦ ❡♥❝r②♣t✐♦♥✱ ♣♦rt ♥✉♠❜❡r ❝♦✉❧❞ ❜❡ ❤✐❞❞❡♥✳
❚❤❡ ♣❛②❧♦❛❞✲❜❛s❡❞ ❝❧❛ss✐✜❝❛t✐♦♥ ♠❡t❤♦❞ ✐s ❛❧s♦ ❦♥♦✇♥ ❛s ❉❡❡♣ P❛❝❦❡t ■♥s♣❡❝✲
✶✸
![Page 21: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/21.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
✷✳✸ ◆❡t✇♦r❦ ❚r❛✣❝ ❈❧❛ss✐✜❝❛t✐♦♥ ✷ ❇❆❈❑●❘❖❯◆❉
t✐♦♥✭❉P■✮ ❛♥❞ ✐t ✐s ❜❛s❡❞ ♦♥ ❛❧r❡❛❞② ❦♥♦✇♥ ❛tt❛❝❦ s✐❣♥❛t✉r❡s ❛♥❞ ♣❛tt❡r♥s✳ ■t ❛♥❛❧②s❡st❤❡ ♣❛②❧♦❛❞ ♦❢ ❛ ♣❛❝❦❡t ❛♥❞ ❝♦♠♣❛r❡s t❤❡ ✐♥❢♦r♠❛t✐♦♥ r❡tr✐❡✈❡❞ ✇✐t❤ t❤❡ ❞❛t❛❜❛s❡♦❢ tr❛✣❝ s✐❣♥❛t✉r❡s✳ ❚❤✐s ✐s ❛ ♠♦r❡ ❡✣❝✐❡♥t ✇❛② ♦❢ ❝❧❛ss✐✜❝❛t✐♦♥ ♠❡t❤♦❞ ✐♥ t❡r♠s ♦❢❛❝❝✉r❛❝②✱ ❜✉t ✐t ✐s ❝♦♠♣✉t❛t✐♦♥❛❧❧② ✈❡r② ❡①♣❡♥s✐✈❡ ❛♥❞ ❛❧s♦ ♥♦t r❡❧✐❛❜❧❡✳ ❚❤❡ r❡❛s♦♥s❢♦r ✉♥r❡❧✐❛❜✐❧✐t② ❛r❡✿ s♦♠❡ ♦❢ t❤❡ s✐❣♥❛t✉r❡s ❛r❡ ♥♦t ❦♥♦✇♥✱ ❡♥❝r②♣t✐♥❣ t❤❡ ♣❛②❧♦❛❞♠❛❦❡s t❤✐s ♠❡t❤♦❞ ✈❡r② ❞✐✣❝✉❧t ❛♥❞✱ ♠♦st ✐♠♣♦rt❛♥t❧②✱ ✐t ✈✐♦❧❛t❡s t❤❡ ♣r✐✈❛❝② ♣r✐♥❝✐♣❧❡✳
❚❤❡ st❛t✐st✐❝❛❧ ❝❧❛ss✐✜❝❛t✐♦♥ ✐s ❜❛s❡❞ ♦♥ st❛t✐st✐❝❛❧ ♣r♦♣❡rt✐❡s ♦❢ t❤❡ tr❛✣❝✱ ❛s✇❡❧❧ ❛s ♦♥ t❤❡ ♣❛❝❦❡t ❧❡✈❡❧ ❛♥❞ ✢♦✇ ❧❡✈❡❧✳ ❉✐✛❡r❡♥t ❢❡❛t✉r❡s ❛r❡ ✉s❡❞ ✐♥ t❤✐s ♠❡t❤♦❞✱st❛rt✐♥❣ ✇✐t❤ ♣❛❝❦❡t ❧❡♥❣t❤✱ ✐♥t❡r✲❛rr✐✈❛❧ t✐♠❡✱ ❞✐r❡❝t✐♦♥✱ ❡t❝✳✱ ❛s ✇❡❧❧ ❛s ♠♦r❡ s♣❡❝✐✜❝♣❛❝❦❡t ❝♦✉♥t✱ ✢♦✇ ❞✉r❛t✐♦♥✱ ♣❛❝❦❡t r❛t✐♦✱❡t❝✳ ❆❢t❡r t❤❡ ❡♥❝r②♣t✐♦♥✱ st❛t✐st✐❝❛❧ ❢❡❛t✉r❡s❞♦ ❝❤❛♥❣❡✱ ❜✉t t❤❡r❡ ❛r❡ ♦t❤❡r ✭✉♥❡♥❝r②♣t❡❞✮ ❝❤❛r❛❝t❡r✐st✐❝s ♦❢ tr❛✣❝ t❤❛t ❝❛♥ r❡✈❡❛❧✐♥❢♦r♠❛t✐♦♥ ❛❜♦✉t t❤❡ ❛♣♣❧✐❝❛t✐♦♥✱ ✇❤✐❝❤ ♠❛❦❡s t❤✐s ♠❡t❤♦❞ ✈❡r② ✉s❡❢✉❧ ✐♥ ♠♦❞❡r♥tr❛✣❝ ❝❧❛ss✐✜❝❛t✐♦♥ ❛♥❞ ♠♦r❡ s✉✐t❛❜❧❡ ❢♦r ♦✉r r❡s❡❛r❝❤✳
❚❤❡ ❜❡❤❛✈✐♦✉r✲❜❛s❡❞ ❝❧❛ss✐✜❝❛t✐♦♥ ♦r ❤♦st✲❜❛s❡❞ ❝❧❛ss✐✜❝❛t✐♦♥ ❛♥❛❧②s❡s ❞✐✛❡r✲❡♥t ❛♣♣❧✐❝❛t✐♦♥ tr❛✣❝ ❜❛s❡❞ ♦♥ ❤♦st ❜❡❤❛✈✐♦r✳ ■t ❛♥❛❧②s❡s ❞✐✛❡r❡♥t ❝♦♥♥❡❝t✐♦♥ ♣❛tt❡r♥s❛♥❞ ❛tt❡♠♣ts t♦ ❝❧❛ss✐❢② t❤❡ tr❛✣❝ ✐♥t♦ ❞✐✛❡r❡♥t ❝❧❛ss❡s✳ ❚❤✐s ♠❡t❤♦❞ ✐s r❛r❡❧② ✉s❡❞s✐♥❝❡ ✐t ❣✐✈❡s ✈❡r② r♦✉❣❤ r❡s✉❧ts✱ ❛♥❞ t❤❡ ❝❧❛ss✐✜❝❛t✐♦♥ ✐s ✐♠♣♦ss✐❜❧❡ ✐♥ t❤❡ ❝❛s❡ ♦❢❡♥❝r②♣t✐♦♥ ❛♥❞ t❤❡ ✉s❛❣❡ ♦❢ ◆❆❚✳
✷✳✸✳✶ ❋❧♦✇✲❜❛s❡❞ ❈❧❛ss✐✜❝❛t✐♦♥
✧❆ ✢♦✇ ✐s ❛ s❡q✉❡♥❝❡ ♦❢ ♣❛❝❦❡ts s❡♥t ❢r♦♠ ❛ ♣❛rt✐❝✉❧❛r s♦✉r❝❡ t♦ ❛ ♣❛rt✐❝✉❧❛r ✉♥✐❝❛st✱❛♥②❝❛st ♦r ♠✉❧t✐❝❛st ❞❡st✐♥❛t✐♦♥ t❤❛t t❤❡ s♦✉r❝❡ ❞❡s✐r❡s t♦ ❧❛❜❡❧ ❛s ❛ ✢♦✇✳ ❆ ✢♦✇❝♦✉❧❞ ❝♦♥s✐st ♦❢ ❛❧❧ ♣❛❝❦❡ts ✐♥ ❛ s♣❡❝✐✜❝ tr❛♥s♣♦rt ❝♦♥♥❡❝t✐♦♥ ♦r ❛ ♠❡❞✐❛ str❡❛♠✳✧ ❬✷✾❪
■♥ ♦t❤❡r ✇♦r❞s✱ ❛ ✢♦✇ ✐s ❛ s❡t ♦❢ ♣❛❝❦❡ts ✇✐t❤ s♦♠❡ ❝♦♠♠♦♥ ♣r♦♣❡rt✐❡s ✇❤✐❝❤ ❛r❡♣❛ss✐♥❣ ❛♥ ♦❜s❡r✈❡❞ ♣♦✐♥t ✐♥ s♦♠❡ t✐♠❡ ♣❡r✐♦❞✳ Pr♦♣❡rt✐❡s ❛r❡ ✈❛r②✐♥❣ ❜❛s❡❞ ♦♥ t❤❡✐♥t❡♥❞❡❞ ✉s❡ ❛♥❞ ❝♦✉❧❞ ❜❡ ❜❛s❡❞ ♦♥ ♣❛❝❦❡t ❤❡❛❞❡r ✭s♦✉r❝❡ ■P✱ ❞❡st✐♥❛t✐♦♥ ■P✱ P♦rt◆✉♠❜❡rs✱❡t❝✳✮✱ ♣❛❝❦❡t ❝❤❛r❛❝t❡r✐st✐❝s ✭♠♣❧s ❧❛❜❡❧✱ ✢❛❣✱ ❚❚▲✱❡t❝✳✮ ❛♥❞ ♣❛❝❦❡t tr❡❛t♠❡♥t✭♥❡①t ❤♦♣✱ ✐♥t❡r❢❛❝❡✱❡t❝✳✮✳ ❬✷✽❪❆ ✢♦✇ ✐s✱ tr❛❞✐t✐♦♥❛❧❧② r❡♣r❡s❡♥t❡❞ ❜② ❛ ✺✲t✉♣❧❡✿
❼ ❙♦✉r❝❡ ■P
❼ ❉❡st✐♥❛t✐♦♥ ■P
❼ ❙♦✉r❝❡ P♦rt
❼ ❉❡st✐♥❛t✐♦♥ P♦rt
❼ ❚r❛♥s♣♦rt Pr♦t♦❝♦❧
✶✹
![Page 22: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/22.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
✷✳✸ ◆❡t✇♦r❦ ❚r❛✣❝ ❈❧❛ss✐✜❝❛t✐♦♥ ✷ ❇❆❈❑●❘❖❯◆❉
❉✉❡ t♦ ❞✐✛❡r❡♥t ♥❡t✇♦r❦ ❛♥❞ ❡♥❝r②♣t✐♦♥ r❡q✉✐r❡♠❡♥ts✱ s♦♠❡ ❢❡❛t✉r❡s ♠❛② ♥♦t ❜❡❛✈❛✐❧❛❜❧❡ s♦ ✐t ♦❢t❡♥ ✉s❡s ❢❡✇❡r ♣❛r❛♠❡t❡rs t❤❛♥ ✉s✉❛❧✳
❚❤❡ ✢♦✇ ❤❛s ✐ts ♦r✐❣✐♥ ✐♥ ❝✐r❝✉✐t✲s✇✐t❝❤ ❝♦♠♠✉♥✐❝❛t✐♦♥✳ ■♥ t❤✐s t②♣❡ ♦❢ ❝♦♠♠✉♥✐❝❛t✐♦♥t❤❡ ❝♦♥♥❡❝t✐♦♥ ❜❡t✇❡❡♥ t✇♦ ❤♦sts ✐s ❡st❛❜❧✐s❤❡❞ ♦✈❡r ❞❡❞✐❝❛t❡❞ r❡s♦✉r❝❡s✱ ❛♥❞ ✐t ✐s ♥♦t❞✐✣❝✉❧t t♦ ❞❡✜♥❡ t❤❡ ♣❛r❛♠❡t❡rs ♦❢ ❝♦♥♥❡❝t✐♦♥✳ ■♥ t❤❡ ♣❛❝❦❡t✲s✇✐t❝❤ ❝♦♠♠✉♥✐❝❛t✐♦♥✱t❤❡ s✐t✉❛t✐♦♥ ✐s ❛ ❜✐t ❞✐✛❡r❡♥t✳ ❆ ♠❡ss❛❣❡ ✐s ❢r❛❣♠❡♥t❡❞ ❛♥❞ s❡♥t t❤♦r♦✉❣❤ t❤❡ s❛♠❡❝♦♠♠✉♥✐❝❛t✐♦♥ r❡s♦✉r❝❡✱ s♦✱ ♦♥ t❤❡ r❡❝❡♣t✐♦♥ s✐❞❡✱ ✇❡ ❤❛✈❡ ❞✐✛❡r❡♥t ♣❛❝❦❡ts ❢r♦♠❞✐✛❡r❡♥t s♦✉r❝❡s✱ ❛♥❞ ✐t ✐s ✐♠♣♦rt❛♥t t♦ ❞❡✜♥❡ ❛ s❡t ♦❢ ♣❛r❛♠❡t❡r t♦ ✐❞❡♥t✐❢② t❤❡❝♦♥♥❡❝t✐♦♥ ❜❡t✇❡❡♥ ✉s❡rs✳ ❉❡st✐♥❛t✐♦♥ ❛♥❞ ❙♦✉r❝❡ ■P ❛r❡ ✉s❡❞ ❢♦r ❞❡✜♥✐♥❣ t❤❡ ❡♥❞✉s❡rs✱ P♦rts ❛r❡ ✉s❡❞ t♦ ✐❞❡♥t✐❢② t❤❡ ❛♣♣❧✐❝❛t✐♦♥ ❛♥❞ ✐t ✐s ❛❧s♦ ✐♠♣♦rt❛♥t t♦ ✐❞❡♥t✐❢②tr❛♥s♣♦rt ♣r♦t♦❝♦❧✳
❆♥♦t❤❡r ✐♠♣♦rt❛♥t ♣❛r❛♠❡t❡r ✐s t❤❡ ❞✐r❡❝t✐♦♥ ♦❢ t❤❡ ✢♦✇✱ s✐♥❝❡ ♠♦st ❝♦♥♥❡❝t✐♦♥s❜❡t✇❡❡♥ t✇♦ ✉s❡rs ❛r❡ ❜✐❞✐r❡❝t✐♦♥❛❧✳ ▼❛♥② ❞✐✛❡r❡♥t ❛♣♣❧✐❝❛t✐♦♥s ❛♥❞ ♣r♦t♦❝♦❧s ❤❛✈❡♣r❡❞❡t❡r♠✐♥❡❞ s❝❡♥❛r✐♦s ♦❢ ❡①❝❤❛♥❣✐♥❣ t❤❡ ✐♥❢♦r♠❛t✐♦♥ ❜❡t✇❡❡♥ t❤❡ s❡♥❞❡r ❛♥❞ t❤❡r❡❝❡✐✈❡r✳ ❚❤✐s ♠❡❛♥s t❤❛t ❡✈❡♥ ✇❤❡♥ ✐t ❝♦♠❡s t♦ ❡♥❝r②♣t❡❞ tr❛✣❝✱ ✇❡ ❝❛♥ ♣r❡❞✐❝t✇❤✐❝❤ ❛♣♣❧✐❝❛t✐♦♥ ❧✐❡s ❜❡❤✐♥❞ ✐t✱ ♦♥ t❤❡ ❜❛s✐s ♦❢ t❤❡ ❞✐r❡❝t✐♦♥ ♦❢ tr❛✣❝✳ ❆ ❣♦♦❞ ❡①❛♠♣❧❡❢♦r t❤✐s ✇♦✉❧❞ ❜❡ t❤❡ ✐♥✐t✐❛❧ ❤❛♥❞s❤❛❦❡✳
❆s✐❞❡ ❢r♦♠ ❞✐r❡❝t✐♦♥ ❛♥❞ t❤❡ ♠❛✐♥ ✺✲t✉♣❧❡ ♣❛r❛♠❡t❡rs✱ ✐t ❛♣♣❡❛r❡❞ t♦ ✉s t❤❛t t❤❡r❡❛r❡ s♦♠❡ st❛t✐st✐❝❛❧ ♣❛r❛♠❡t❡rs ✐♥ tr❛✣❝ ✢♦✇ ✇❤✐❝❤ ❛r❡ ✉♥✐q✉❡ ❢♦r s♣❡❝✐✜❝ ♣r♦t♦❝♦❧s❛♥❞ s❡r✈✐❝❡s✱ ❛♥❞ ❡✈❡♥ ✐♥ ❡♥❝r②♣t❡❞ ❞❛t❛✱ ✐t s❤♦✇ ❛ str♦♥❣ ❝♦rr❡❧❛t✐♦♥ ✇✐t❤ t❤❡ ♦r✐❣✐♥❛❧❞❛t❛✳ ❙♦♠❡ ♦❢ t❤❡s❡ ♣❛r❛♠❡t❡rs ❛r❡ ♣❛❝❦❡t ❧❡♥❣t❤✱ ✐♥t❡r✲❛rr✐✈❛❧ t✐♠❡✱ ❚❚▲✱ ❡t❝✳ ❚❤❡s❛♠❡ ♣r✐♥❝✐♣❧❡ ❛♣♣❧✐❡s t♦ s❡❝✉r✐t② ❛tt❛❝❦s✳ ▼♦st ♦❢ t❤❡ ❛tt❛❝❦s ❤❛s ❛ ✇❡❧❧✲❞❡✜♥❡❞♣❛tt❡r♥ ♦❢ ♣❛❝❦❡ts ✇✐t❤ s♣❡❝✐✜❝ ❧❡♥❣t❤ ✇❤✐❝❤ ❛r❡ ❝♦♠✐♥❣ ✐♥ s♣❡❝✐✜❝ t✐♠❡ ❛♥❞ ❛r❡ ❣♦✐♥❣✐♥ ✇❡❧❧✲❞❡✜♥❡❞ ❞✐r❡❝t✐♦♥✳ ❚❤✐s ✐s ✈❡r② ✉s❡❢✉❧ ❢♦r t❤❡ ♠❛❧✐❝✐♦✉s tr❛✣❝ ❝❧❛ss✐✜❝❛t✐♦♥✱ ✇✐t❤t❤❡ ❤❡❧♣ ♦❢ ♠❛❝❤✐♥❡ ❧❡❛r♥✐♥❣ ❛❧❣♦r✐t❤♠s✳ ❲✐t❤ ❛ ♣r♦♣❡r st❛t✐st✐❝❛❧ ♠❡t❤♦❞ ❛♥❞ ❛ ❜✐❣❞❛t❛ s❡t✱ ✐t ✐s ♣♦ss✐❜❧❡ t♦ ❞❡✈❡❧♦♣ ❛ ♠♦❞❡❧ ✇❤✐❝❤ ✐s ❛❜❧❡ t♦ ❝❧❛ss✐❢② ♠❛❧✐❝✐♦✉s tr❛✣❝❜❛s❡❞ ♦♥ ✐ts st❛t✐st✐❝❛❧ ❝❤❛r❛❝t❡r✐st✐❝s ❛♥❞ ✇❡❧❧✲❞❡✜♥❡❞ ♣❛tt❡r♥s✱ ❛♥❞ ✇✐t❤ ❤✐❣❤ ❛❝❝✉r❛❝②✳
■♥ ❢♦❧❧♦✇✐♥❣ ✜❣✉r❡s✱ t❤❡ ❛tt❛❝❦ ♣❛tt❡r♥s ❛r❡ ♣r❡s❡♥t❡❞✳ ❚❤♦s❡ ♣❛tt❡r♥s ❛r❡ ❡①tr❛❝t❡❞❢r♦♠ ✉s❡❞ ❞❛t❛ s❡t✱ ❛♥❞ ♣❧♦ts ❛r❡ ♠❛❞❡ ❜❛s❡❞ ♦♥ t❤r❡❡ ❞❛t❛ s❡t ❢❡❛t✉r❡s✿ ♣❛❝❦❡t ❧❡♥❣t❤✱♣❛❝❦❡t ❞✐r❡❝t✐♦♥ ❛♥❞ ♣❛❝❦❡t ✐♥t❡r✲❛rr✐✈❛❧ t✐♠❡✳ ❆❧❧ ❛tt❛❝❦s ✐♥ t❤❡ s❛♠❡ ❛tt❛❝❦ ❢❛♠✐❧②❤❛✈❡ t❤❡ ❡q✉✐✈❛❧❡♥t ❛tt❛❝❦ ♣❛tt❡r♥s✳
✶✺
![Page 23: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/23.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
✷✳✸ ◆❡t✇♦r❦ ❚r❛✣❝ ❈❧❛ss✐✜❝❛t✐♦♥ ✷ ❇❆❈❑●❘❖❯◆❉
❋✐❣✉r❡ ✼✿ ❊①♣❧♦✐ts ❋✐❣✉r❡ ✽✿ ●❡♥❡r✐❝
❋✐❣✉r❡ ✾✿ ❉♦❙ ❋✐❣✉r❡ ✶✵✿ ❘❡❝♦♥♥❛✐ss❛♥❝❡
❋✐❣✉r❡ ✶✶✿ ❙❤❡❧❧❝♦❞❡ ❋✐❣✉r❡ ✶✷✿ ❋✉③③❡rs
✶✻
![Page 24: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/24.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
✷✳✸ ◆❡t✇♦r❦ ❚r❛✣❝ ❈❧❛ss✐✜❝❛t✐♦♥ ✷ ❇❆❈❑●❘❖❯◆❉
❋✐❣✉r❡ ✶✸✿ ❲♦r♠s
✶✼
![Page 25: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/25.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
✷✳✹ ▼❛❝❤✐♥❡ ❧❡❛r♥✐♥❣ ✷ ❇❆❈❑●❘❖❯◆❉
✷✳✹ ▼❛❝❤✐♥❡ ❧❡❛r♥✐♥❣
❉✉❡ t♦ t❤❡ ❢❛st ❞❡✈❡❧♦♣✐♥❣ t❡❝❤♥♦❧♦❣✐❡s✱ s✉❝❤ ❛s ❝♦♠♣✉t❡rs✱ ♠♦❜✐❧❡ ♣❤♦♥❡s✱ t❤❡■♥t❡r♥❡t✱ ❡t❝✳✱ t❤❡ ❛♠♦✉♥t ♦❢ ❞❛t❛ t❤❛t ✇❡ ❝r❡❛t❡ ✐s ❣r♦✇✐♥❣ r❛♣✐❞❧② ❡✈❡r② ❞❛②✳❊✈❡r②t❤✐♥❣ t❤❛t ✇❡ ❞♦ t♦❞❛② ❧❡❛✈❡s ❛ ❞✐❣✐t❛❧ ❢♦♦t♣r✐♥t✱ ✇❤❡t❤❡r ✐t ✐s ✉s✐♥❣ t❤❡ ●P❙ t♦✜♥❞ ❛ ❧♦❝❛t✐♦♥✱ t❤❡ ❝♦♠♠✉♥✐❝❛t✐♦♥ ✇✐t❤ ♦✉r ❢r✐❡♥❞s✱ ♦r ✐♥t❡r❛❝t✐♦♥s ♦♥ s♦❝✐❛❧ ♠❡❞✐❛✳❖♥ t♦♣ ♦❢ t❤✐s✱ ✐♥❞✉str✐❛❧ ♠❛❝❤✐♥❡s ❛r❡ ❣❡♥❡r❛t✐♥❣ ❤✉❣❡ ❛♠♦✉♥ts ♦❢ ❞❛t❛✳ ❇✐❣ ❞❛t❛❣❡♥❡r❛t✐♦♥ ❤❛s ❜r♦✉❣❤t t❤❡ ♥❡❝❡ss✐t② ♦❢ t❤❡ ❢❛st ❛♥❞ ♣r❡❝✐s❡ ❞❛t❛ ♣r♦❝❡ss✐♥❣✱ ❛♥❞ t❤❡s♦❧✉t✐♦♥ ❝❛♠❡ ✐♥ t❤❡ ❢♦r♠ ♦❢ ♠❛❝❤✐♥❡ ❧❡❛r♥✐♥❣✱ ✇❤✐❝❤ ✐s ♣❛rt ♦❢ t❤❡ ❛❧r❡❛❞② ❞❡✈❡❧♦♣❡❞❛rt✐✜❝✐❛❧ ✐♥t❡❧❧✐❣❡♥❝❡✳
❲❡ ❝❛♥ ❞❡s❝r✐❜❡ ♠❛❝❤✐♥❡ ❧❡❛r♥✐♥❣ ✇✐t❤ t❤❡ ❢♦❧❧♦✇✐♥❣ q✉♦t❡✿ ✧ ❆ ❝♦♠♣✉t❡r ♣r♦❣r❛♠ ✐ss❛✐❞ t♦ ❧❡❛r♥ ❢r♦♠ ❡①♣❡r✐❡♥❝❡ E ✇✐t❤ r❡s♣❡❝t t♦ s♦♠❡ ❝❧❛ss ♦❢ t❛s❦s T ❛♥❞ ♣❡r❢♦r♠❛♥❝❡♠❡❛s✉r❡ P ✐❢ ✐ts ♣❡r❢♦r♠❛♥❝❡ ❛t t❛s❦s ✐♥ T ✱ ❛s ♠❡❛s✉r❡❞ ❜② P ✱ ✐♠♣r♦✈❡s ✇✐t❤ ❡①♣❡r✐❡♥❝❡E✳✧ ❬✸✻❪■♥ ♦t❤❡r ✇♦r❞s✱ ♠❛❝❤✐♥❡ ❧❡❛r♥✐♥❣ ✐s ❛ s❡t ♦❢ ♠❛❝❤✐♥❡s ♦r ❞❡✈✐❝❡s ✇❤✐❝❤ ❤❛✈❡ ❛❝❝❡ss t♦❛ ❜✐❣ ❛♠♦✉♥t ♦❢ ❞❛t❛✱ ❛♥❞ ✇❤✐❝❤ ❛r❡ ❛❜❧❡ t♦ ❧❡❛r♥ ❢r♦♠ t❤✐s ❞❛t❛ ✐♥ s♦♠❡ ♣r♦❣r❛♠♠❡❞♠❛♥♥❡r✳❆ ♠❛❝❤✐♥❡ ❧❡❛r♥✐♥❣ ❛❧❣♦r✐t❤♠ ❝❛♥ ♣❡r❢♦r♠ ❞✐✛❡r❡♥t t❛s❦s ❬✷✸❪✳ ❙♦♠❡ ♦❢ t❤❡♠ ❛r❡✿
❼ ❈❧❛ss✐✜❝❛t✐♦♥✿ t❤❡ ♣r♦❝❡ss ♦❢ ❛ss✐❣♥✐♥❣ ❞✐✛❡r❡♥t ✐♥♣✉t xi t♦ ❞✐✛❡r❡♥t ❝❧❛ss❡s k✳❚❤❡ ❛❧❣♦r✐t❤♠ ♣r♦❞✉❝❡s t❤❡ ❢✉♥❝t✐♦♥ f : Rn → {1....k} ❛♥❞ ✇❤❡♥ ♦♥ ♦✉t♣✉ty = f(x)✱ t❤❡ ✐♥♣✉t xi ✐s ❛ss✐❣♥❡❞ t♦ ❝❧❛ss k✳
❼ ❘❡❣r❡ss✐♦♥✿ t❤❡ ♣r❡❞✐❝t✐♦♥ ♦❢ t❤❡ ♦✉t♣✉t ❢♦r t❤❡ ❣✐✈❡♥ ✐♥♣✉t✳ ❚♦ s♦❧✈❡ t❤✐s✱ t❤❡❛❧❣♦r✐t❤♠ ♣r♦❞✉❝❡s t❤❡ ❢✉♥❝t✐♦♥ f : Rn → R
❼ ❚r❛♥s❝r✐♣t✐♦♥✿ t❤❡ ♣r♦❝❡ss ♦❢ ♦❜s❡r✈✐♥❣ ❛ r❡❧❛t✐✈❡❧② ✉♥tr✉st❡❞ r❡♣r❡s❡♥t❛t✐♦♥ ♦❢❞❛t❛ ✐♥ ♦r❞❡r t♦ tr❛♥s❝r✐❜❡ t❤❡ ❞❛t❛ ✐♥ t❡①t✉❛❧ ❢♦r♠❛t✳
❼ ▼❛❝❤✐♥❡ ❚r❛♥s❧❛t✐♦♥✿ ❝♦♥✈❡rts ❛ s❡q✉❡♥❝❡ ♦❢ s②♠❜♦❧s ✐♥ ♦♥❡ ❧❛♥❣✉❛❣❡ ✐♥t♦ ❛s❡q✉❡♥❝❡ ♦❢ s②♠❜♦❧s ✐♥ ❛♥♦t❤❡r ❧❛♥❣✉❛❣❡✳
❼ ❆♥♦♠❛❧② ❉❡t❡❝t✐♦♥✿ t❤❡ ♣r♦❝❡ss ♦❢ ❣♦✐♥❣ t❤r♦✉❣❤ s♦♠❡ ❞❛t❛ ❛♥❞ tr②✐♥❣ t♦ ✜♥❞❛♥ ✉♥✉s✉❛❧ ♦r ❛t②♣✐❝❛❧ ❜❡❤❛✈✐♦r✳
❋r♦♠ t❤❡ ❧❡❛r♥✐♥❣ ♣♦✐♥t ♦❢ ✈✐❡✇✱ t✇♦ ♠❛✐♥ t❡❝❤♥✐q✉❡s ❝❛♥ ❜❡ ❞✐st✐♥❣✉✐s❤❡❞ ✉♥s✉♣❡r✲✈✐s❡❞ ❛♥❞ s✉♣❡r✈✐s❡❞ ❧❡❛r♥✐♥❣✳
❯♥s✉♣❡r✈✐s❡❞ ❧❡❛r♥✐♥❣ ✉s❡s ❞❛t❛ s❛♠♣❧❡s ✇✐t❤ ♠❛♥② ❢❡❛t✉r❡s ✐♥ ♦r❞❡r t♦ ❧❡❛r♥ ❛♥❞✐♥❢❡r ❛ str✉❝t✉r❡ ❢r♦♠ t❤❡ ❞❛t❛✳ ❚❤❡ ❛❧❣♦r✐t❤♠ ♣r❛❝t✐❝❛❧❧② ♦❜s❡r✈❡s ♠❛♥② s❛♠♣❧❡s ♦❢ ❛r❛♥❞♦♠ ✈❡❝t♦r X ❛♥❞ ❧❡❛r♥s t❤❡ ♣r♦❜❛❜✐❧✐t② ❞✐str✐❜✉t✐♦♥ p(X) ♦r s♦♠❡ ♦t❤❡r ♣r♦♣❡rt②
✶✽
![Page 26: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/26.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
✷✳✹ ▼❛❝❤✐♥❡ ❧❡❛r♥✐♥❣ ✷ ❇❆❈❑●❘❖❯◆❉
♦❢ t❤❡ ❞✐str✐❜✉t✐♦♥✳
❙✉♣❡r✈✐s❡❞ ❧❡❛r♥✐♥❣ ✉s❡s ❧❛❜❡❧❡❞ ❞❛t❛ s❛♠♣❧❡s ❛♥❞ ♦❜s❡r✈❡s ❞✐✛❡r❡♥t ❢❡❛t✉r❡s ♦❢ ❞❛t❛❛♥❞ ❧❛❜❡❧s ✐♥ ♦r❞❡r t♦ ❧❡❛r♥✳ ■♥ ♦t❤❡r ✇♦r❞s✱ t❤❡ ❛❧❣♦r✐t❤♠ ♦❜s❡r✈❡s ♠❛♥② s❛♠♣❧❡s ♦❢t❤❡ r❛♥❞♦♠ ✈❡❝t♦r X ❛♥❞ ❝♦rr❡s♣♦♥❞✐♥❣ ❧❛❜❡❧s Y ❛♥❞ ❧❡❛r♥s ❛❝❝♦r❞✐♥❣ t♦ ❝♦♥❞✐t✐♦♥❛❧♣r♦❜❛❜✐❧✐t② p(X|Y )✳
❙❡♠✐✲s✉♣❡r✈✐s❡❞ ❧❡❛r♥✐♥❣ ✐s ❛ ❝❛t❡❣♦r② ✇❤✐❝❤ ✐s ✐♥✲❜❡t✇❡❡♥ t❤❡ s✉♣❡r✈✐s❡❞ ❛♥❞✉♥s✉♣❡r✈✐s❡❞ ❞❛t❛✳ ■t ✉s❡s ❛ s♠❛❧❧ ♣♦rt✐♦♥ ♦❢ ❧❛❜❡❧❡❞ ❞❛t❛ ❛♥❞ ❛ ❜✐❣❣❡r ♣♦rt✐♦♥ ♦❢✉♥❧❛❜❡❧❡❞ ❞❛t❛ ✐♥ t❤❡ tr❛✐♥✐♥❣ ♣r♦❝❡ss✳ ❚❤✐s ✇❛② t❤❡ ❛❧❣♦r✐t❤♠ ✐s ❛❜❧❡ t♦ ♣r♦❞✉❝❡❜❡tt❡r ❛❝❝✉r❛❝② t❤❡♥ ❜② ✉s✐♥❣ ✉♥s✉♣❡r✈✐s❡❞ ❧❡❛r♥✐♥❣✳
❘❡✐♥❢♦r❝❡♠❡♥t ❧❡❛r♥✐♥❣ ✐s ❛ ❞✐✛❡r❡♥t ❝❛t❡❣♦r② ♦❢ ♠❛❝❤✐♥❡ ❧❡❛r♥✐♥❣ ✇❤✐❝❤ ✐s ❜❛s❡❞ ♦♥t❤❡ tr✐❛❧ ❛♥❞ ❡rr♦r✳ ❚❤❡ ❛❧❣♦r✐t❤♠ ✐♥t❡r❛❝ts ✇✐t❤ t❤❡ ❡♥✈✐r♦♥♠❡♥t ❛♥❞ ❧❡❛r♥s t❤❡ ✐❞❡❛❧❜❡❤❛✈✐♦r t❤r♦✉❣❤ ♣r♦❞✉❝✐♥❣ ❛♥ ❛❝t✐♦♥ ❛♥❞ ❞✐s❝♦✈❡r✐♥❣ ❡rr♦r ♦r r❡✇❛r❞✳
✷✳✹✳✶ ❉❡❡♣ ▲❡❛r♥✐♥❣
❉❡❡♣ ❧❡❛r♥✐♥❣ ✐s ❛ s✉❜❝❛t❡❣♦r② ♦❢ ♠❛❝❤✐♥❡ ❧❡❛r♥✐♥❣ ❜❛s❡❞ ♦♥ t❤❡ ♥❡✉r❛❧ ♥❡t✇♦r❦ ❛♥❞t❤❡ ❝♦♥❝❡♣t✉❛❧ ❜r❛✐♥ ♠♦❞❡❧✳ ❚❤✐s ❝♦♥❝❡♣t ✇❛s ♣r❡s❡♥t❡❞ ❜② ▼❝❈✉❧❧♦❝❤ ✐♥ ❬✸✹❪ ❢♦r ♠♦r❡t❤❛♥ ✼✵ ②❡❛rs ❛❣♦✱ ❜✉t ❞✉❡ t♦ t❤❡ ❧✐♠✐t❛t✐♦♥s ♦❢ t❡❝❤♥♦❧♦❣②✱ ✐t ❞✐❞ ♥♦t ❤❛✈❡ ❛♥② ♣r❛❝t✐❝❛❧❛♣♣❧✐❝❛t✐♦♥ ✉♣ t♦ r❡❝❡♥t❧②✳
◆❡✉r❛❧ ◆❡t✇♦r❦
❚❤❡ ❜r❛✐♥ ✉s❡s ♠✐❧❧✐♦♥ ♥❡✉r♦♥s str✉❝t✉r❡❞ ✐♥ ❤✐❡r❛r❝❤✐❝❛❧ ♥❡t✇♦r❦s ❛♥❞ ✐♥t❡r❝♦♥♥❡❝t❡❞✈✐❛ ❛①♦♥s✱ ✇❤✐❝❤ ❛r❡ tr❛♥s♣♦rt✐♥❣ t❤❡ ❡❧❡❝tr♦♥✐❝ s✐❣♥❛❧s ❝❛❧❧❡❞ s②♥❛♣s❡s ❢r♦♠ ♦♥❡ ♥❡✉r♦♥t♦ ❛♥♦t❤❡r✳❚❤❡ s❛♠❡ ❝♦♥❝❡♣t ✐s r❡♣r❡s❡♥t❡❞ ❜② t❤❡ ♥❡✉r❛❧ ♥❡t✇♦r❦✳ ■t ❝♦♥t❛✐♥s s❡✈❡r❛❧ ❧❛②❡rs ✇✐t❤❛ ♥✉♠❜❡r ♦❢ ♥❡✉r♦♥s✳ ❆ ♥❡t✇♦r❦ ♥❡✉r♦♥ ❤❛s ❛ s✐♠✐❧❛r str✉❝t✉r❡ ❛s ❛ ❜✐♦❧♦❣✐❝❛❧ ♥❡✉r♦♥✳
✶✾
![Page 27: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/27.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
✷✳✹ ▼❛❝❤✐♥❡ ❧❡❛r♥✐♥❣ ✷ ❇❆❈❑●❘❖❯◆❉
❋✐❣✉r❡ ✶✹✿ ◆❡✉r♦♥
❊✈❡r② ♥❡✉r♦♥ ✐s ❢❡❞ ✇✐t❤ t❤❡ ✐♥♣✉t ❞❛t❛ x1, x2, .....xn✳ ❊❛❝❤ ✐♥♣✉t ❞❛t❛ ✐s ♠✉❧t✐♣❧✐❡❞✇✐t❤ ✇❡✐❣❤ts w1, w2, ...wn ❛♥❞ s✉♠♠❡❞ ❛❧❧ t♦❣❡t❤❡r✳ ❚❤❡ ❜✐❛s b ✐s ❛❞❞❡❞ t♦ t❤❡ s✉♠♦❢ t❤❡ ✇❡✐❣❤t❡❞ ✐♥♣✉t ❞❛t❛ ❛♥❞ ♦♥ t❤❡ ♦✉t♣✉t ♦❢ t❤❡ ♥❡✉r♦♥ ✇❡ ❤❛✈❡✿
z = (n
∑
i=1
wixi) + b ✭✶✮
❖✉t♣✉t z ✐s ♣❛ss❡❞ t❤r♦✉❣❤ t❤❡ ❛❝t✐✈❛t✐♦♥ ❢✉♥❝t✐♦♥✱ ❛♥❞ ✐♥ t❤❡ ❡♥❞ ✇❡ ❤❛✈❡✿
y = f((n
∑
i=1
wixi) + b) ✭✷✮
❲❡✐❣❤ts ❛♥❞ ❜✐❛s❡s ❛r❡ ♣❧❛②✐♥❣ ❛ ❝r✉❝✐❛❧ r♦❧❡ ✐♥ s✉♣❡r✈✐s❡❞ ❧❡❛r♥✐♥❣✳ ❚❤❡② ❛r❡ r❛♥❞♦♠♥✉♠❜❡rs ✇❤✐❝❤ ❛r❡ ❛❞❥✉st❡❞ ❞✉r✐♥❣ t❤❡ tr❛✐♥✐♥❣ ✐♥ ♦r❞❡r t♦ ♠✐♥✐♠✐③❡ t❤❡ ❡rr♦r ❜❡t✇❡❡♥t❤❡ ♣r❡❞✐❝t❡❞ ✈❛❧✉❡s ❛♥❞ r❡❛❧ ❞❛t❛✳ ❚❤✐s ♣r♦❝❡ss ✐s ❝❛❧❧❡❞ ❜❛❝❦♣r♦♣❛❣❛t✐♦♥✱ ✇❤✐❝❤ ✇❡❛r❡ ❣♦✐♥❣ t♦ ❡①♣❧❛✐♥ ✐♥ ♠♦r❡ ❞❡t❛✐❧s✳❆♥♦t❤❡r ✈❡r② ✐♠♣♦rt❛♥t ♣❛rt ✐s t❤❡ ❛❝t✐✈❛t✐♦♥ ❢✉♥❝t✐♦♥✳ ❚❤❡ ♠❛✐♥ r❡s♣♦♥s✐❜✐❧✐t②♦❢ t❤❡ ❛❝t✐✈❛t✐♦♥ ❢✉♥❝t✐♦♥ ✐s t♦ ❞❡❝✐❞❡ ✇❤✐❝❤ ✐♥❢♦r♠❛t✐♦♥ ✐s ✐♠♣♦rt❛♥t ❢♦r ❧❡❛r♥✐♥❣❛♥❞ ✉♣ t♦ ✇❤❛t ❡①t❡♥t✳ ❚❤❡ ♦✉t♣✉t ♦❢ t❤❡ ❛❝t✐✈❛t✐♦♥ ❢✉♥❝t✐♦♥ ✐s ✉s❡❞ ❛s t❤❡ ✐♥♣✉t♦❢ ❛♥♦t❤❡r ❧❛②❡r✱ s♦ ❛ ❝❛r❡❢✉❧❧② ❝❤♦s❡♥ ❛❝t✐✈❛t✐♦♥ ❢✉♥❝t✐♦♥ ❝♦✉❧❞ ❝❤❛♥❣❡ t❤❡ ❛❝❝✉r❛❝②♦❢ ♦✉r ❧❡❛r♥✐♥❣ ♠♦❞❡❧✳ ■♥ ♦r❞❡r t♦ ❜❡ ❛❜❧❡ t♦ ❧❡❛r♥ ❝♦♠♣❧❡① ♠♦❞❡❧s✱ t❤❡ ❛❝t✐✈❛t✐♦♥❢✉♥❝t✐♦♥ ♥❡❡❞s t♦ ❜❡ ♥♦♥✲❧✐♥❡❛r✳
❉✐✛❡r❡♥t ❛❝t✐✈❛t✐♦♥ ❢✉♥❝t✐♦♥s t❤❛t ❛r❡ ✉s✉❛❧❧② ✉s❡❞ ✐♥ ♠❛❝❤✐♥❡ ❧❡❛r♥✐♥❣ ❛r❡✿
✷✵
![Page 28: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/28.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
✷✳✹ ▼❛❝❤✐♥❡ ❧❡❛r♥✐♥❣ ✷ ❇❆❈❑●❘❖❯◆❉
❼ s✐❣♠♦✐❞ ✲ s♠♦♦t❤ ❢✉♥❝t✐♦♥ ❛♥❞❝♦♥t✐♥✉♦✉s❧② ❞✐✛❡r❡♥t✐❛❜❧❡✱ ♥♦♥✲❧✐♥❡❛r❢✉♥❝t✐♦♥✳ ❱❛❧✉❡s ❛r❡ ❜❡t✇❡❡♥ ✵ ❛♥❞✶ ❛♥❞ ✐t ❤❛s ❛ S s❤❛♣❡✳ ❇❛❝❦♣r♦♣✲❛❣❛t✐♦♥ ✐s ♣♦ss✐❜❧❡ ❜✉t ✐t ✐s ♥♦t s♦♣♦♣✉❧❛r ❜❡❝❛✉s❡ ♦❢ ✿ t❤❡ ✈❛♥✐s❤✐♥❣❣r❛❞✐❡♥t ♣r♦❜❧❡♠✱ ♦✉t♣✉t ♥♦t ③❡r♦❝❡♥t❡r❡❞✭❤❛r❞ t♦ ♦♣t✐♠✐③❡✮✱ s✐❣♠♦✐❞s❛t✉r❛t❡ ❛♥❞ ❦✐❧❧ ❣r❛❞✐❡♥t✱ s❧♦✇ ❝♦♥✲✈❡r❣❡♥❝❡✳
f(x) =1
1 + e−x✭✸✮ ❋✐❣✉r❡ ✶✺✿ ❙✐❣♠♦✐❞ ❛❝t✐✈❛t✐♦♥ ❢✉♥❝t✐♦♥
❼ ❤②♣❡r❜♦❧✐❝ t❛♥❣❡♥t ✲ s❝❛❧❡❞ ✈❡r✲s✐♦♥ ♦❢ s✐❣♠♦✐❞✳ ❱❛❧✉❡s ❜❡t✇❡❡♥ ✲✶❛♥❞ ✶✱ ✇❤✐❝❤ ♦✉t♣✉ts ③❡r♦ ❝❡♥t❡r❡❞✈❛❧✉❡s✳◆♦♥✲❧✐♥❡❛r ❢✉♥❝t✐♦♥ ❛♥❞ ❡rr♦r❛r❡ ❡❛s✐❧② ❜❛❝❦♣r♦♣❛❣❛t❡❞✳
✭✹✮
f(x) = 2sigmoid(2x)−1 = 21+e−2x −1
❋✐❣✉r❡ ✶✻✿ ❚❛♥❤ ❛❝t✐✈❛t✐♦♥ ❢✉♥❝t✐♦♥
✷✶
![Page 29: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/29.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
✷✳✹ ▼❛❝❤✐♥❡ ❧❡❛r♥✐♥❣ ✷ ❇❆❈❑●❘❖❯◆❉
❼ r❡❝t✐✜❡❞ ❧✐♥❡❛r ✉♥✐t✭❘❡▲❯✮ ✲♥♦♥✲❧✐♥❡❛r ❢✉♥❝t✐♦♥ ✇❤✐❝❤ ♠❛❦❡s ❡rr♦r♣r♦♣❛❣❛t✐♦♥ ❡❛s②✱ ❛♥❞ ✐t ❤❛s ♠✉❧t✐♣❧❡❧❛②❡rs ♦❢ ♥❡✉r♦♥s ❜❡✐♥❣ ❛❝t✐✈❛t❡❞✳ ■t✐♠♣r♦✈❡s t❤❡ ❝♦♥✈❡r❣❡♥❝❡ ❜② ✻ t✐♠❡s❛♥❞ ✐t ❛✈♦✐❞s ❛♥❞ r❡❝t✐✜❡s t❤❡ ✈❛♥✐s❤✐♥❣❣r❛❞✐❡♥t✳ ◆♦✇❛❞❛②s✱ t❤✐s ❢✉♥❝t✐♦♥ ✐st❤❡ ♦♥❡ ♦❢ t❤❡ ♠♦st ❡♠♣❧♦②❡❞ ♦♥❡s✱❜✉t ✐t ❝❛♥ ♦♥❧② ❜❡ ✉s❡❞ ✐♥ ❤✐❞❞❡♥ ❧❛②❡rs✳
f(x) = max(0, x) ✭✺✮ ❋✐❣✉r❡ ✶✼✿ ❘❡▲❯ ❛❝t✐✈❛t✐♦♥ ❢✉♥❝t✐♦♥
❼ s♦❢t♠❛① ✲ ❛ t②♣❡ ♦❢ s✐❣♠♦✐❞ ❢✉♥❝✲t✐♦♥s✱ ✉s❡❞ ✐♥ ❝❧❛ss✐✜❝❛t✐♦♥ t♦ ♦✉t♣✉tt❤❡ ♣r♦❜❛❜✐❧✐t② ♦❢ t❤❡ ❝❧❛ss✳ ❚❤❡ ♦✉t✲♣✉t ♦❢ t❤❡ s✐❣♠♦✐❞ ❧❛②❡r ✐s ♣r♦❜❛❜✐❧✐t②❜❡t✇❡❡♥ ✵ ❛♥❞ ✶ ❞✐✈✐❞❡❞ ❜② t❤❡ s✉♠ ♦❢❛❧❧ ♦✉t♣✉ts✳
f(xi) =exi
∑J
j=0 exj
✭✻✮
✱ i = 1...J❋✐❣✉r❡ ✶✽✿ ❙♦❢t♠❛① ❛❝t✐✈❛t✐♦♥ ❢✉♥❝t✐♦♥
❚❤❡ ♥❡✉r❛❧ ♥❡t✇♦r❦ ✐s r❡♣r❡s❡♥t❡❞ ❜② ♠❛♥② ❝♦♥♥❡❝t❡❞ ♥❡✉r♦♥s ❣r♦✉♣❡❞ ✐♥ ❧❛②❡rs✳ ❲❡❝❛♥ s❡❡ t❤❡ r❡♣r❡s❡♥t❛t✐♦♥ ♦❢ t❤❡ ♥❡✉r❛❧ ♥❡t✇♦r❦ ♦♥ t❤❡ ✜❣✉r❡ ✶✾
✷✷
![Page 30: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/30.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
✷✳✹ ▼❛❝❤✐♥❡ ❧❡❛r♥✐♥❣ ✷ ❇❆❈❑●❘❖❯◆❉
❋✐❣✉r❡ ✶✾✿ ◆❡✉r❛❧ ◆❡t✇♦r❦ ❬✹✵❪
❊✈❡r② ♥❡✉r❛❧ ♥❡t✇♦r❦ ❤❛s ♠❛♥② ❧❛②❡rs✱ ❛♥❞ t❤❡② ❛r❡ ❞✐✈✐❞❡❞ ✐♥t♦ ❣r♦✉♣s ♦❢ ✸ ❧❛②❡rs✿■♥♣✉t ❧❛②❡rs ✭❧❡❢t♠♦st✱❜❧✉❡✮✱ ❍✐❞❞❡♥ ❧❛②❡rs ✭♠✐❞❞❧❡✱ ♦r❛♥❣❡✮✱ ❖✉t♣✉t ❧❛②❡rs ✭r✐❣❤t✲♠♦st✱ r❡❞✮✳ ■t ✐s ♣♦ss✐❜❧❡ t♦ ❤❛✈❡ ♠♦r❡ t❤❛♥ ♦♥❡ ❤✐❞❞❡♥ ❧❛②❡r ❛♥❞ t❤❡② ❛r❡ ❝♦♥♥❡❝t❡❞t♦ ❡❛❝❤ ♦t❤❡r✱ s♦ t❤❛t t❤❡ ♦✉t♣✉t ♦❢ ❛ ♣r❡✈✐♦✉s ❧❛②❡r ✐s t❤❡ ✐♥♣✉t ♦❢ t❤❡ ❝✉rr❡♥t ❧❛②❡r✳■♥ t❤❡ ❡①❛♠♣❧❡ ♦♥ t❤❡ ❋✐❣ ✶✾✱ ✇❡ ❤❛✈❡ x1, x2, .....xn ✇❤✐❝❤ ❛r❡ ♣❛ss❡❞ t♦ t❤❡ ❤✐❞❞❡♥❧❛②❡r✳ ❚❤❡ ❧❛②❡rs ❛r❡ ❞❡♥♦t❡❞ ❛s Ll ❛♥❞ ❢♦r t❤✐s ❡①❛♠♣❧❡ l = 1✳ ❊❛❝❤ ✐♥♣✉t ❞❛t❛ xi
✐s ❝♦♥♥❡❝t❡❞ t♦ ❡❛❝❤ ♥❡✉r♦♥ ✐♥ t❤❡ ❤✐❞❞❡♥ ❧❛②❡r L1✱ ❛♥❞ ❡❛❝❤ ❞❛t❛ ✐s ✇❡✐❣❤t❡❞ ✇✐t❤xli,j ❛♥❞ s✉♠♠❡❞ ✇✐t❤ t❤❡ ❜✐❛s bi✳ ❚❤❡ ♦✉t♣✉t ✐s ♣❛ss❡❞ t❤r♦✉❣❤ ❛❝t✐✈❛t✐♦♥ ❢✉♥❝t✐♦♥
♦❢ ❧❛②❡r l✱ al✱ ❛♥❞ ✐♥ t❤❡ ❡♥❞ ✇❡ ❤❛✈❡✿
a(2)1 = f(z
(2)1 ) = f(w
(1)1,1x1 + w
(1)1,2x2 + w
(1)1,3x3 + ...+ w
(1)1,nxn + b
(1)1 )
a(2)2 = f(z
(2)2 ) = f(w
(1)2,1x1 + w
(1)2,2x2 + w
(1)2,3x3 + ...+ w
(1)2,nxn + b
(2)2 )
a(2)3 = f(z
(2)3 ) = f(w
(1)3,1x1 + w
(1)3,2x2 + w
(1)3,3x3 + ...+ w
(1)3,nxn + b
(3)3 )
.
.
.
a(2)n = f(z(2)n ) = f(w(1)n,1x1 + w
(1)n,2x2 + w
(1)n,3x3 + ...+ w(1)
n,nxn + b(n)n )
✭✼✮
y(x) = a(3) = f(w(2)1,1a
(2)1 + w
(2)1,2a
(2)2 + w
(1)1,3a
(2)3 + ...+ w
(2)1,na
(2)n + b(3)) ✭✽✮
✷✸
![Page 31: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/31.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
✷✳✹ ▼❛❝❤✐♥❡ ❧❡❛r♥✐♥❣ ✷ ❇❆❈❑●❘❖❯◆❉
❲❡ ❝❛♥ r❡♣r❡s❡♥t t❤❡ ♦✉t♣✉t ✐♥ t❤❡ ✈❡❝t♦r✲♠❛tr✐① ❢♦r♠✿
■♥♣✉t ❞❛t❛✿ X1×n =[
x1 x2 x3 ... xn
]T
❲❡✐❣❤ts ✿W l×n
w1,1 w1,2 w1,3 ... w1,n
w2,1 w2,2 w3,3 ... w2,n
w3,1 w3,2 w3,3 ... w3,n
...
wn,1 wn,2 wn,3 ... wn,n
❜✐❛s✿ B1×n =[
b1 b2 b3 ... bn]T
❆❝t✐✈❛t✐♦♥✿ A1×l =[
a1 a2 a3 ... al]T
◆❡✉r♦♥ ♦✉t♣✉t✿ Z1×l =[
z1 z2 z3 ... zl]T
❲❡ ❝❛♥ ✇r✐t❡ ✐♥ ♠♦r❡ ❝♦♥✈❡♥✐❡♥t ✈❡❝t♦r ❢♦r♠✿
a(2) = f(z(2)) = f(W (1)X +B(1)) ✭✾✮
y(x) = a(3) = f(z(3)) = f(W (2)X2 +B(2)) ✭✶✵✮
❛♥❞ ❛❝t✐✈❛t✐♦♥ ❢♦r ♥❡①t ❧❛②❡r✿
al+1 = f(z(l+1)) = f(W (l)A(l) +B(l)) ✭✶✶✮
❚❤❡ ♠❛tr✐① r❡♣r❡s❡♥t❛t✐♦♥ ❛❧❧♦✇s t♦ ✉s❡ ❧✐♥❡❛r ❛❧❣❡❜r❛ ♦♣❡r❛t✐♦♥s✱ ✇❤✐❝❤ ♠❛❦❡s t❤❡❝❛❧❝✉❧❛t✐♦♥ ♠✉❝❤ ❢❛st❡r✳❚❤❡ ❝❛❧❝✉❧❛t✐♦♥ ❝♦rr❡s♣♦♥❞ t♦ ❢❡❡❞❢♦r✇❛r❞ ♥❡t✇♦r❦s ♦r t❤❡ ❢♦r✇❛r❞ ♣❛ss✳ ■♥ ♦r❞❡r t♦♦♣t✐♠✐③❡ ♦✉r ♥❡t✇♦r❦ ❛♥❞ t♦ ❜❡ ❛❜❧❡ t♦ ♣❡r❢♦r♠ ❧❡❛r♥✐♥❣✱ ✇❡ ♥❡❡❞ t♦ ❜❛❝❦♣r♦♣❛❣❛t❡t❤❡ ❡rr♦r ❛♥❞ t♦ ❛❞❥✉st t❤❡ ✇❡✐❣❤ts ❛♥❞ ❜✐❛s❡s✳
❇❛❝❦♣r♦♣❛❣❛t✐♦♥ ❛❧❣♦r✐t❤♠
❆s ❛❧r❡❛❞② ❡①♣❧❛✐♥❡❞✱ ❢♦r s✉♣❡r✈✐s❡❞ ❧❡❛r♥✐♥❣ ✇❡ ♥❡❡❞ t♦ ♣r♦✈✐❞❡ t❤❡ ✐♥♣✉t ❞❛t❛✿ X =[
x1 x2 x3 ... xn
]T✱ ❛♥❞ t❤❡ ❝♦rr❡s♣♦♥❞✐♥❣ ❧❛❜❡❧ ♣❛✐rs✿ Y =
[
y1 y2 y3 ... yn]T
●r❛❞✐❡♥t ❞❡s❝❡♥t ✐s ✉s✉❛❧❧② ✉s❡❞ ❢♦r tr❛✐♥✐♥❣ t❤❡ ♥❡t✇♦r❦✳●r❛❞✐❡♥t ❞❡s❝❡♥t ✐s ❛♥ ✐t❡r❛t✐✈❡ ❛❧❣♦r✐t❤♠ ✇❤✐❝❤ ✐s ✉s❡❞ t♦ ✜♥❞ t❤❡ ♠✐♥✐♠✉♠ ♦❢ ❛❢✉♥❝t✐♦♥✳ ■t st❛rts ✇✐t❤ ❛ r❛♥❞♦♠ ♣♦✐♥t ♦♥ t❤❡ ❣r❛♣❤ ❛♥❞ t❛❦❡s ♣r♦♣♦rt✐♦♥❛❧ st❡♣s ✐♥t❤❡ ❞✐r❡❝t✐♦♥ ♦❢ t❤❡ ♥❡❣❛t✐✈❡ ❣r❛❞✐❡♥t t♦ ✜♥❞ t❤❡ ❧♦❝❛❧ ♠✐♥✐♠✉♠ ♦❢ t❤❡ ❣r❛♣❤✳ ❚❤✐s❜❛s✐❝❛❧❧② ♠❡❛♥s t❤❡ ❢♦❧❧♦✇✐♥❣✿ ✐❢ ✇❡ ❤❛✈❡ ❛ ❢✉♥❝t✐♦♥ F (x) ✇❤✐❝❤ ✐s ❞✐✛❡r❡♥t✐❛❜❧❡ ✐♥♥❡✐❣❤❜♦r❤♦♦❞ ♦❢ a✱ t❤❡ ❢✉♥❝t✐♦♥ ❞❡❝r❡❛s❡s ❢❛st❡r ✐❢ ✇❡ ♠♦✈❡ ✐♥ t❤❡ ❞✐r❡❝t✐♦♥ ♦❢−∆F (a)✳
an+1 = an − α∆F (an) ✭✶✷✮
✷✹
![Page 32: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/32.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
✷✳✹ ▼❛❝❤✐♥❡ ❧❡❛r♥✐♥❣ ✷ ❇❆❈❑●❘❖❯◆❉
■♥ ♠❛❝❤✐♥❡ ❧❡❛r♥✐♥❣ t❡r♠s✱ ❣r❛❞✐❡♥t ❞❡s❝❡♥t ✐s ❛♥ ♦♣t✐♠✐③❛t✐♦♥ ❛❧❣♦r✐t❤♠ ✇❤✐❝❤ t❛❦❡ss♠❛❧❧ st❡♣s✱ ✉s✉❛❧❧② ❞❡✜♥❡❞ ❜② t❤❡ ❧❡❛r♥✐♥❣ r❛t❡ t♦ ♠✐♥✐♠✐③❡ t❤❡ ❝♦st✳❋♦r ♠✐♥✐♠✐③✐♥❣ t❤❡ ❝♦st✱ ✇❡ ♦❢t❡♥ ✉s❡ ♠❡❛♥ sq✉❛r❡ ❡rr♦r ❝♦st ❢✉♥❝t✐♦♥ ❬✹✵❪
J(W, b) = [1
m
n∑
i=1
(y(x(i))− y(i))] +λ
2
l∑
i=1
sl∑
i=1
sl+1∑
i=1
(W(l)i,j )
2 ✭✶✸✮
❚❤❡ ✜rst t❡r♠ ♦❢ ❡q✉❛t✐♦♥ r❡♣r❡s❡♥ts ❛♥ ❛✈❡r❛❣❡ sq✉❛r❡ ❡rr♦r ❛♥❞ t❤❡ s❡❝♦♥❞ t❡r♠ ✐s✉s❡❞ ❢♦r r❡❣✉❧❛r✐③❛t✐♦♥✱ ✇❤✐❝❤ t❡♥❞s t♦ ❞❡❝r❡❛s❡ t❤❡ ♠❛❣♥✐t✉❞❡ ♦❢ ✇❡✐❣❤ts ✐♥ ♦r❞❡r t♦♣r❡✈❡♥t ♦✈❡r✜tt✐♥❣✳❋✐rst❧②✱ ✇❡ ✐♥✐t❛❧✐③❡ W
(l)i,j ❛♥❞ b
(l)i ✱ ✇✐t❤ ❛ r❛♥❞♦♠ ✈❛❧✉❡ ♥❡❛r ✵✱ ✐♥ ♦r❞❡r t♦ ♠✐♥✐♠✐③❡
t❤❡ ❝♦st✳ ■t ✐s ✐♠♣♦rt❛♥t t❤❛t t❤❡ ♥✉♠❜❡r ✐s r❛♥❞♦♠✱ s♦ t❤❛t ❡✈❡r② ❧❛②❡r ❝❛♥ ❧❡❛r♥✐♥❞❡♣❡♥❞❡♥t ❢✉♥❝t✐♦♥s✱ ✐♥ ♦r❞❡r t♦ ❛❝❤✐❡✈❡ ♥♦♥✲❧✐♥❡❛r✐t②✳ ❖✉r ♠❛✐♥ ❣♦❛❧ ✐s t♦ ♠✐♥✐♠✐③❡t❤❡ ❝♦st ❢✉♥❝t✐♦♥ J(W, b) ❛s ❛ ❢✉♥❝t✐♦♥ ♦❢ W ❛♥❞ b✳ ❖♥❡ ✐t❡r❛t✐♦♥✱ ✉s❡❞ t♦ ❛❞❥✉st♣❛r❛♠❡t❡rs✱ ✐s st❛t❡❞ ❜❡❧♦✇✿
W(l)i,j = W
(l)i,j − α
∂
∂W(l)i,j
J(W, b)) ✭✶✹✮
b(l)i = b
(l)i − α
∂
∂b(l)i
J(W, b)) ✭✶✺✮
■♥ ❣❡♥❡r❛❧✱ ❜❛❝❦♣r♦♣❛❣❛t✐♦♥ ✐s ♣❡r❢♦r♠❡❞ t❤r♦✉❣❤ t❤❡ ❢♦❧❧♦✇✐♥❣ st❡♣s✿
✶✳ ❢♦r t❤❡ ✐♥♣✉t ♣❛✐rs (x, y)✱ ❛ ❢♦r✇❛r❞ ♣❛ss ✐s ♣❡r❢♦r♠❡❞ ❛♥❞ ✇❡ ❣❡t t❤❡ ♦✉t♣✉ty(x(i))
✷✳ ❢♦r ❡❛❝❤ ♦✉t♣✉t ✉♥✐t i✱ ✐♥ t❤❡ ❧❛②❡r l ✇❡ ❝❛❧❝✉❧❛t❡ ❡rr♦r δli
δli = (
Sl+1∑
i=1
W(l)i,j δ
l+1i )f ′(z
(l)i ) ✭✶✻✮
✸✳ ❝♦♠♣✉t✐♥❣ t❤❡ ♣❛rt✐❛❧ ❞❡r✐✈❛t✐♦♥ ♦❢ t❤❡ ❡rr♦r ✐♥ t❤❡ ❢✉♥❝t✐♦♥ ♦❢ ✇❡✐❣❤ts ❛♥❞ ❜✐❛s❡s✿
∂
∂W(l)i,j
J(W, b) = a(l+1)j δl+1
i ✭✶✼✮
∂
∂b(l)i
J(W, b) = a(l+1)j δl+1
i ✭✶✽✮
❖✈❡r❛❧❧✱ t❤❡ ✐t❡r❛t✐♦♥s ♦❢ ❣r❛❞✐❡♥t ❞❡s❝❡♥t ✐♥ t❤❡ ✈❡❝t♦r✲♠❛tr✐① ❢♦r♠ ❝❛♥ ❜❡ ✐♠♣❧❡♠❡♥t❡❞❛s ❢♦❧❧♦✇s✿
✷✺
![Page 33: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/33.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
✷✳✹ ▼❛❝❤✐♥❡ ❧❡❛r♥✐♥❣ ✷ ❇❆❈❑●❘❖❯◆❉
✶✳ s❡t W (l) = 0 ❛♥❞ B(l) = 0 ❢♦r ❛❧❧ l
✷✳ ♣❡r❢♦r♠ ✐t❡r❛t✐♦♥ ❢♦r m st❡♣s
✭❛✮ ✉s❡ ❜❛❝❦✇❛r❞♣r♦♣❛❣❛t✐♦♥ t♦ ❝❛❧❝✉❧❛t❡ t❤❡ ❡rr♦r ❞❡r✐✈❛t✐♦♥✿
∆W (l)J(W, b) ❛♥❞ ∆b(l)J(W, b)
✭❜✮ s❡t✿∆W (l) = ∆W (l) +∆W (l)J(W, b) ✭✶✾✮
✭❝✮ s❡t✿∆b(l) = ∆b(l) +∆b(l)J(W, b) ✭✷✵✮
✸✳ ✉♣❞❛t❡ ✇❡✐❣❤ts ❛♥❞ ❜✐❛s❡s✿
W (l) = ∆W (l) − α[1
m(∆W (l)) + λW (l)] ✭✷✶✮
b(l) = ∆b(l) − α[1
m∆b(l) ] ✭✷✷✮
✷✳✹✳✷ ❘❡❝✉rr❡♥t ◆❡✉r❛❧ ◆❡t✇♦r❦ ❛♥❞ ▲❙❚▼
❆ r❡❝✉rr❡♥t ♥❡✉r❛❧ ♥❡t✇♦r❦ ✐s ❜❛s❡❞ ♦♥ t❤❡ ❤✉♠❛♥ ♠❡♠♦r② ❛♥❞ t❤❡ ❜❛s✐❝ ♣r✐♥❝✐♣❧❡ ♦❢✉♥❞❡rst❛♥❞✐♥❣ t❤❡ ❝♦♥t❡①t ♦❢ s♦♠❡t❤✐♥❣ t❤❛t ✇❡ r❡❛❞ ♦r ❤❡❛r✳ ❚❤✐s ♥❡t✇♦r❦ ❞✐✛❡rs❢r♦♠ ♦t❤❡r ♥❡✉r❛❧ ♥❡t✇♦r❦s ✐♥ ♥❡✉r♦♥ str✉❝t✉r❡ ❜❡❝❛✉s❡ ❡❛❝❤ ♥❡✉r♦♥ ❤❛s ❛ ❧♦♦♣ ✇❤✐❝❤❛❧❧♦✇s t❤❡ ✐♥❢♦r♠❛t✐♦♥ t♦ ♣❡rs✐st ❛♥❞ t♦ ❜❡ tr❛♥s❢❡rr❡❞ t♦ t❤❡ ♥❡①t st❡♣✳
❋✐❣✉r❡ ✷✵✿ ❘❡❝✉rr❡♥t ◆❡✉r❛❧ ◆❡t✇♦r❦ ❬✹✶❪
✷✻
![Page 34: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/34.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
✷✳✹ ▼❛❝❤✐♥❡ ❧❡❛r♥✐♥❣ ✷ ❇❆❈❑●❘❖❯◆❉
❲❡ ❝❛♥ ✐♠❛❣✐♥❡ ❛ r❡❝✉rr❡♥t ♥❡✉r❛❧ ♥❡t✇♦r❦ ❛s ♠✉❧t✐♣❧❡ ❝♦♣✐❡s ♦❢ ❛ s❛♠❡ ♥❡t✇♦r❦✱❡❛❝❤ ♣❛ss✐♥❣ t❤❡ ✐♥❢♦r♠❛t✐♦♥ t♦ ❛♥♦t❤❡r✳ ❚❤✐s ❛♣♣r♦❛❝❤ ✐s ✈❡r② ✉s❡❢✉❧ ✐♥ ♣r♦❝❡ss✐♥❣s❡q✉❡♥t✐❛❧ ❞❛t❛ ✇❤✐❝❤ r❡q✉✐r❡s s♦♠❡ ❝♦♥t❡①t✱ s✉❝❤ ❛s tr❛♥s❧❛t✐♦♥✱ s♣❡❡❝❤ r❡❝♦❣♥✐t✐♦♥✱❧❛♥❣✉❛❣❡ ♠♦❞❡❧✐♥❣✱ ❡t❝✳ ❯♥❢♦rt✉♥❛t❡❧②✱ ❛ ❝❧❛ss✐❝❛❧ ❘◆◆ ✐s ❛❜❧❡ t♦ ❤❛♥❞❧❡ ♦♥❧② ❛ s❤♦rtt❡r♠ ❞❡♣❡♥❞❡♥❝②✳ ❚❤❡ ✐♥❢♦r♠❛t✐♦♥ t❤❛t ✐s ♣❛ss❡❞ t♦ ❛♥♦t❤❡r ❧❛②❡r✱ ❞♦❡s ♥♦t ❤❛✈❡ ♠✉❝❤✐♥✢✉❡♥❝❡ ♦♥ ❧❡❛r♥✐♥❣ ❛❢t❡r ❢❡✇ st❡♣s✱ ❛♥❞ t❤❡ r❡❝❡♥t ✐♥❢♦r♠❛t✐♦♥ ❤❛s t❤❡ ♠♦st ✐♠♣❛❝t♦♥ ❧❡❛r♥✐♥❣✳ ❬✶✸❪ ❚❤✐s ♣r♦❜❧❡♠ ✐s s♦❧✈❡❞ ❜② ❧♦♥❣✲s❤♦rt t❡r♠ ♠❡♠♦r② ❝❡❧❧s✳▲❙❚▼ ❬✷✹❪ ❝❡❧❧s ❛r❡ ❛❜❧❡ t♦ ❤❛♥❞❧❡ ❛ ❧♦♥❣✲t❡r♠ ❞❡♣❡♥❞❡♥❝② ❜② r❡♠❡♠❜❡r✐♥❣ t❤❡✐♥❢♦r♠❛t✐♦♥ ✇❤✐❝❤ ✐s ❡❛s② t♦ ❧❡❛r♥ ❛♥❞ ❢♦r❣❡t t❤❡ ❞✐✣❝✉❧t ♦♥❡✳ ▲❙❚▼ ❤❛✈❡ ❛ ❝❤❛✐♥str✉❝t✉r❡✱ s✐♠✐❧❛r ❛s ❘◆◆✱ ❛♥❞ ❡❛❝❤ ❝❡❧❧ ✐♥ ❝❤❛✐♥ ❤❛s ❢♦✉r ♣❛rts✳
❋✐❣✉r❡ ✷✶✿ ▲♦♥❣✲s❤♦rt ❚❡r♠ ▼❡♠♦r② ❝❡❧❧ ❬✹✶❪ ✲ s❤♦✇s ✹ ❣❛t❡ str✉❝t✉r❡ ❞❡s❝r✐❜❡❞ ✐♥❢♦❧❧♦✇✐♥❣ t❡①t
❚❤❡ ♠❛✐♥ ♣❛rt ♦❢ t❤❡ ▲❙❚▼ ✐s t❤❡ ❝❡❧❧ st❛t❡✳ ❚❤❡ ❝❡❧❧ st❛t❡ ✐s r✉♥♥✐♥❣ t❤r♦✉❣❤ t❤❡❝❡❧❧ ❛♥❞ ✐t ✐s ✉♣❞❛t❡❞ ✇✐t❤ ♥❡✇ ✐♥❢♦r♠❛t✐♦♥ t❤r♦✉❣❤ ❛ str✉❝t✉r❡ ❝❛❧❧❡❞ ❣❛t❡s✳ ●❛t❡s❛r❡ ✉s✐♥❣ sigmoid ❧❛②❡rs ♦r ❞✐✛❡r❡♥t ♠✉❧t✐♣❧✐❝❛t✐✈❡ ♦♣❡r❛t✐♦♥s ✐♥ ♦r❞❡r t♦ ❞❡❝✐❞❡ ✇❤✐❝❤✐♥❢♦r♠❛t✐♦♥ ✐s ❣♦✐♥❣ t♦ ❜❡ ♣❛ss❡❞ t♦ t❤❡ ❝❡❧❧ st❛t❡✳
✷✼
![Page 35: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/35.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
✷✳✹ ▼❛❝❤✐♥❡ ❧❡❛r♥✐♥❣ ✷ ❇❆❈❑●❘❖❯◆❉
❼ t❤❡ ✜rst ❧❛②❡r ✐s t❤❡ ❢♦r❣❡t ❣❛t❡ ❧❛②❡r ❛♥❞ ✐t ❞❡❝✐❞❡s ✇❤✐❝❤ ✐♥❢♦r♠❛t✐♦♥ s❤♦✉❧❞❜❡ ❢♦r❣♦tt❡♥ ✳ ❚❤❡ ✐♥♣✉t xt ❛♥❞ ♦✉t♣✉t ♦❢ t❤❡ ❧❛st ❝❡❧❧ yt−1 ❛r❡ ♣❛ss✐♥❣ t❤r♦✉❣❤sigmoid ❢✉♥❝t✐♦♥ ❛♥❞ ❛❝❝♦r❞✐♥❣ t♦ t❤❡ ♦✉t♣✉t t❤❡ ❝❛❧❧ st❛t❡ ✇✐❧❧ ❜❡ ✉♣❞❛t❡❞✳
ft = σ(Wf [yt−1] + bf ) ✭✷✸✮
❼ t❤❡ s❡❝♦♥❞ ❧❛②❡r ❞❡❝✐❞❡s ✇❤✐❝❤ ✐♥❢♦r♠❛t✐♦♥ ✐s ❣♦✐♥❣ t♦ ✉♣❞❛t❡ t❤❡ ❝❡❧❧st❛t❡ Ct−1✳ ❚❤❡ sigmoid ❧❛②❡r ✐s ✉s❡❞ t♦ ❞❡t❡r♠✐♥❡ ✇❤✐❝❤ ✈❛❧✉❡ it ✐s ❣♦✐♥❣ t♦❜❡ ✉♣❞❛t❡❞✱ ❛♥❞ t❤❡ tanh ❧❛②❡r ❞❡t❡r♠✐♥❡s t❤❡ ❝❛♥❞✐❞❛t❡ ✈❛❧✉❡ Ct ❢♦r ❛♥ ✉♣❞❛t❡✳
it = σ(Wi[yt−1, xt] + bi) ✭✷✹✮
Ct = tanh(WC [yt−1, xt] + bC) ✭✷✺✮
❼ t❤❡ t❤✐r❞ ❧❛②❡r ✉♣❞❛t❡s t❤❡ ♦❧❞ ❝❡❧❧ st❛t❡ Ct−1 ❜② ♠✉❧t✐♣❧②✐♥❣ ✐t ✇✐t❤ ft✱ ❛♥❞❞❡❝✐❞✐♥❣ ✇❤❛t t♦ ❢♦r❣❡t✳ ❚❤❡♥ t❤❡ ♥❡✇ ❝❛♥❞✐❞❛t❡ ✈❛❧✉❡ it ∗ Ct ✐s ❛❞❞❡❞
Ct = ft ∗ Ct−1 + it ∗ Ct ✭✷✻✮
❼ t❤❡ ❢♦✉rt❤ ❧❛②❡r ❞❡❝✐❞❡s ✇❤❛t ❧❡❛❞s t♦ t❤❡ ♦✉t♣✉t ♦❢ t❤❡ ❝❡❧❧ yt✳ ❈❡❧❧ st❛t❡ ✐s♣❛ss✐♥❣ t❤r♦✉❣❤t❤❡ sigmoid ❧❛②❡r t♦ ❞❡❝✐❞❡ ✇❤✐❝❤ ♣❛rt ✐s ❣♦✐♥❣ t♦ t❤❡ ♦✉t♣✉t✳❚❤❡ ♦✉t♣✉t ♦❢ t❤❡ ❝❡❧❧ st❛t❡ Ct ✐s ♣❛ss❡❞ t❤r♦✉❣❤ t❤❡ tanh ❧❛②❡r ❛♥❞ ♠✉❧t✐♣❧✐❡❞✇✐t❤ t❤❡ s✐❣♠♦✐❞ ❣❛t❡ ♦✉t♣✉t at ❛♥❞ t❤❡♥ ✇❡ ❣❡t t❤❡ ✜❧t❡r❡❞ ✈❡rs✐♦♥ ♦❢ t❤❡❝✉rr❡♥t ❝❡❧❧ st❛t❡✳
at = σ(Wa[yt−1, xt] + ba) ✭✷✼✮
yt = at ∗ tanh(Ct) ✭✷✽✮
❉✐✛❡r❡♥t ✈❛r✐❛t✐♦♥s ♦❢ ❛♥ ▲❙❚▼ ❛r❡ ♣r❡s❡♥t✳ ❚❤❡ ♦♥❡ t❤❛t ✇❡ ❛r❡ ❣♦✐♥❣ t♦ ✉s❡ ✐♥ t❤❡❡①♣❡r✐♠❡♥t ✐s t❤❡ ❣❛t❡❞ r❡❝✉rr❡♥t ✉♥✐t✭●❘❯✮✳ ❬✶✼❪ ❚❤✐s ✐s ❛ s✐♠♣❧❡r ✈❡rs✐♦♥ ♦❢ ▲❙❚▼✇❤✐❝❤ ❝♦♠❜✐♥❡s t❤❡ ❢♦r❣❡t ❛♥❞ ✉♣❞❛t❡ ❣❛t❡s ❛♥❞ ♠❡r❣❡s ❤✐❞❞❡♥ st❛t❡ ❛♥❞ ❝❡❧❧ st❛t❡✳
●❛t❡❞ ❘❡❝✉rr❡♥t ❯♥✐t
●❘❯ ❝♦♥s✐sts ♦❢ t✇♦ ❧❛②❡rs ❝❛❧❧❡❞✿ t❤❡ ✉♣❞❛t❡ ❣❛t❡ ❛♥❞ ❢♦r❣❡t ❣❛t❡✱ ❛♥❞ t❤❡② ❞❡❝✐❞❡✇❤❛t ✐♥❢♦r♠❛t✐♦♥ ✇♦✉❧❞ ❜❡ ♣❛ss❡❞ t♦ ♦✉t♣✉t✳ ❙✐♠✐❧❛r ❛s ▲❙❚▼✱ t❤✐s str✉❝t✉r❡ ❛❧❧♦✇st❤❡ ✐♥❢♦r♠❛t✐♦♥ t♦ r❡♠❛✐♥ ✐♥ t❤❡ ❝❡❧❧ st❛t❡ ❛♥❞ t♦ ✐♥✢✉❡♥❝❡ ❧❡❛r♥✐♥❣ ❢♦r ❧♦♥❣❡r ♣❡r✐♦❞♦❢ t✐♠❡✳ ❚❤✐s str✉❝t✉r❡ ✐s ✉s❡❞ t♦ s✉❝❝❡ss❢✉❧❧② ❝♦♠❜❛t t❤❡ ✈❛♥✐s❤✐♥❣ ❣r❛❞✐❡♥t✳
✷✽
![Page 36: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/36.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
✷✳✹ ▼❛❝❤✐♥❡ ❧❡❛r♥✐♥❣ ✷ ❇❆❈❑●❘❖❯◆❉
❋✐❣✉r❡ ✷✷✿ ●❛t❡❞ ❘❡❝✉rr❡♥t ❯♥✐t ❬✹✶❪ ✲ s✐♠✐❧❛r str✉❝t✉r❡ ❛s t❤❡ ▲❙❚▼✱ ❞❡s❝r✐❜❡❞ ✐♥❢♦❧❧♦✇✐♥❣ ♣❛r❛❣r❛♣❤
❼ ✜rst❧②✱ ✇❡ ❞❡t❡r♠✐♥❡ ❤♦✇ ♠✉❝❤ ♦❢ t❤❡ ✐♥❢♦r♠❛t✐♦♥ s❤♦✉❧❞ ♣❛ss t♦ t❤❡ ♥❡①t st❡♣❜② ❝❛❧❝✉❧❛t✐♥❣ t❤❡ ✉♣❞❛t❡ ❣❛t❡ ❢♦r t✐♠❡ t✿
zt = σ(Wz[yt−1, xt]) ✭✷✾✮
❼ s❡❝♦♥❞❧②✱ ✇❡ ❞❡❝✐❞❡ ❤♦✇ ♠✉❝❤ ✐♥❢♦r♠❛t✐♦♥ ❢r♦♠ t❤❡ ♣r❡✈✐♦✉s ❧❛②❡r ✐s ❡①❝❧✉❞❡❞❜② ❝❛❧❝✉❧❛t✐♥❣✿
rt = σ(Wr[yt−1, xt]) ✭✸✵✮
❼ t❤✐r❞❧②✱ ✇❡ ❝❛❧❝✉❧❛t❡ t❤❡ ❝✉rr❡♥t ♠❡♠♦r② st❛t❡✿
ht = tanh(W [rt ∗ yt, xt]) ✭✸✶✮
❼ ✜♥❛❧❧②✱ ✇❡ ❝❛❧❝✉❧❛t❡ t❤❡ ♦✉t♣✉t ht−1 ✇❤✐❝❤ ❝♦♥t❛✐♥s t❤❡ ❝✉rr❡♥t ♠❡♠♦r② st❛t❡❛♥❞ ♣r❡✈✐♦✉s ❝❡❧❧ st❛t❡✿
✷✾
![Page 37: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/37.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
✷✳✹ ▼❛❝❤✐♥❡ ❧❡❛r♥✐♥❣ ✷ ❇❆❈❑●❘❖❯◆❉
yt = (1− zt) ∗ yt−1 + zt ∗ yt ✭✸✷✮
✸✵
![Page 38: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/38.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
✸ ❙❚❆❚❊ ❖❋ ❚❍❊ ❆❘❚
✸ ❙t❛t❡ ♦❢ t❤❡ ❛rt
▼❛❝❤✐♥❡ ❧❡❛r♥✐♥❣ ✐s ❛❧r❡❛❞② s✉❝❝❡ss❢✉❧❧② ✉s❡❞ ✐♥ ♥❡t✇♦r❦ tr❛✣❝ ❝❧❛ss✐✜❝❛t✐♦♥✳ ◆✉♠❡r♦✉s❛✉t❤♦rs ❛r❡ ♣r♦♣♦s✐♥❣ ❛ ✈❛r✐❡t② ♦❢ ❝❧❛ss✐✜❝❛t✐♦♥ ♠❡t❤♦❞s✳
▼♦♦r❡ ❡t ❛❧✳ ❬✸✼❪ ✉s❡❞ ✢♦✇✲❜❛s❡❞ tr❛✣❝ ❛♥❞ ♣r♦♣♦s❡❞ s✉♣❡r✈✐s❡❞ ♠❛❝❤✐♥❡ ❧❡❛r♥✐♥❣❢♦r ❞❛t❛ ❝❧❛ss✐✜❝❛t✐♦♥✳ ❚❤❡ ❞❛t❛ ✇❛s ❤❛♥❞✲❝❧❛ss✐✜❡❞ ✐♥t♦ ❝❛t❡❣♦r✐❡s ❛♥❞ ❝❛t❡❣♦r✐③❡❞❞❛t❛ s❡ts ✇❡r❡ ❝♦♠❜✐♥❡❞ ✇✐t❤ ♦t❤❡r ✢♦✇ ❢❡❛t✉r❡s✭t❤❡ ✢♦✇ ❧❡♥❣t❤✱ ♣♦rt ♥✉♠❜❡rs✱ t✐♠❡❜❡t✇❡❡♥ ❝♦♥s❡❝✉t✐✈❡ ✢♦✇s✮ ❛♥❞ ✐t ✇❡r❡ ✉s❡❞ t♦ tr❛✐♥ t❤❡ ❝❧❛ss✐✜❡r✳ ❚❤❡ ❡①♣❡r✐♠❡♥ts❤♦✇❡❞ t❤❛t✱ ❜② ✉s✐♥❣ ❛ ♥❛✐✈❡ ❇❛②❡s ❝❧❛ss✐✜❡r✱ ✐t ✐s ♣♦ss✐❜❧❡ t♦ ❛❝❤✐❡✈❡ ❛ ✻✺✪ ❛❝❝✉r❛❝②✇❤❡♥ ❝♦♠❜✐♥✐♥❣ t❤❡ ❞❛t❛ ❢r♦♠ t❤❡ s❛♠❡ t✐♠❡ ♣❡r✐♦❞✱ ❛♥❞ ❛ ✾✺✪ ❛❝❝✉r❛❝② ✇✐t❤ ❛♥✉♠❜❡r ♦❢ r❡✜♥❡♠❡♥ts✳
❩✉❡✈ ❡t ❛❧✳ ❬✺✶❪ ❛❧s♦ ✉s❡❞ ❤❛♥❞✲❝❧❛ss✐✜❡❞ ❞❛t❛ ✇❤✐❝❤ ✇❛s ❞✐✈✐❞❡❞ ✐♥t♦ ✢♦✇s ✇✐t❤ t❤❡♥❛✐✈❡ ❇❛②❡s st❛t✐st✐❝❛❧ ♠❡t❤♦❞✳ ❚❤❡ ❛✉t❤♦rs ✉s❡❞ ❝❧❛ss❡s ♦❢ tr❛✣❝ ✇❤✐❝❤ ✇❡r❡ ❞❡✜♥❡❞❛s ❝♦♠♠♦♥ ❣r♦✉♣s ♦❢ ✉s❡rs ✭❜✉❧❦✱ ❞❛t❛❜❛s❡✱ ✐♥t❡r❛❝t✐✈❡✱❛tt❛❝❦✱♠✉❧t✐♠❡❞✐❛✱ ❡t❝✮✳ ❚❤❡✢♦✇ ✇❛s ❞❡✜♥❡❞ ✇✐t❤ ✷✹✾ ❞✐✛❡r❡♥t ❞✐s❝r✐♠✐♥❛t♦rs✱ s✉❝❤ ❛s✿ t❤❡ ✢♦✇ ❞✉r❛t✐♦♥ st❛t✐st✐❝s✱❚❈P ♣♦rt ✐♥❢♦r♠❛t✐♦♥✱ ♣❛②❧♦❛❞ s✐③❡ st❛t✐st✐❝s✱ ❋♦✉r✐❡r tr❛♥s❢♦r♠ ♦❢ ♣❛❝❦❡t ✐♥t❡r✲❛rr✐✈❛❧t✐♠❡ ❞✐s❝r✐♠✐♥❛t♦rs✱ ❡t❝✳ ❚❤❡ r❡s✉❧t s❤♦✇❡❞ t❤❛t t❤❡ ❝♦rr❡❝t ❝❧❛ss✐✜❝❛t✐♦♥ ✇❛s ✻✻✳✼✪ ✳❙♦♠❡ ♦❢ t❤❡ ❝❧❛ss❡s ✇❡r❡ ❝❧❛ss✐✜❡❞ ✇✐t❤ ♠♦r❡ s✉❝❝❡ss t❤❛♥ ♦t❤❡rs✱ ❡✳❣✳ s❡r✈✐❝❡s✭❉◆❙✱❳✶✶✮ ❛♥❞ ❜✉❧❦ tr❛✣❝s✭❋❚P✮ ✇✐t❤ ❛r♦✉♥❞ ✾✵✪ ♦❢ ❝♦rr❡❝t❧②✲♣r❡❞✐❝t❡❞ ✢♦✇s✳
❚❤❡ ♣r♦❜❧❡♠ ✇❤✐❝❤ ❝♦✉❧❞ ❛♣♣❡❛r ✐♥ t❤❡ ❧❛st ✷ r❡s❡❛r❝❤ ♣❛♣❡rs ✐s t❤❛t t❤❡ ✢♦✇ ❢❡❛t✉r❡s✱s✉❝❤ ❛s ✢♦✇ ❞✉r❛t✐♦♥✱ t✐♠❡ ❜❡t✇❡❡♥ ✢♦✇s✱ ❡t❝✳✱ ❛r❡ ✉s❡❞✳ ❚❤✐s ✐♠♣❧✐❡s t❤❛t t❤❡ ✢♦✇♥❡❡❞s t♦ ❜❡ ✜♥✐s❤❡❞ ✐♥ ♦r❞❡r t♦ ❛♣♣❧② t❤❡ ❛❝❝✉r❛t❡ ❝❧❛ss✐✜❝❛t✐♦♥✳ ❚❤✐s ✐s ✉s✉❛❧❧② ♥♦tt❤❡ ❝❛s❡ ✐♥ r❡❛❧✲t✐♠❡ ❝❧❛ss✐✜❝❛t✐♦♥ ❛♥❞ ✐t ✐s ❞✐✣❝✉❧t t♦ ❤❛♥❞❧❡✱ ✐♥ ❝❛s❡ ♦❢ ❧♦♥❣ ✢♦✇s✳▼♦st ♦❢ t❤❡s❡ ♠❡t❤♦❞s ✉s❡ ✢♦✇ tr❛✣❝ ✇❤✐❝❤ r❡q✉✐r❡s t❤❡ ✇❤♦❧❡ ✢♦✇✳ ■t ✐s ❞✐✣❝✉❧t ❛♥❞♥♦t s✉✐t❛❜❧❡ ❢♦r ♦♥✲❧✐♥❡ ❝❧❛ss✐✜❝❛t✐♦♥✳❖✉r r❡s❡❛r❝❤ t❡♥❞ t♦ s♦❧✈❡ t❤✐s ♣r♦❜❧❡♠ ♣r♦❜❧❡♠ ❜② ✉s✐♥❣ ♣❛❝❦❡t ❜❛s❡❞ ❢❡❛t✉r❡ ✈❡❝t♦r✳❚❤✐s ❛♣♣r♦❛❝❤ ❤❡❧♣s ❧❡❛r♥✐♥❣ ♣r♦❝❡ss t♦ ❜❡ ♠♦r❡ ✐♥❞❡♣❡♥❞❡♥t ♦❢ ♥❡t✇♦r❦ ✢♦✇✱ ✇❤✐❝❤❝♦✉❧❞ ❜❡ ❧❡♥❣t❤②✱ ❛♥❞ ✐t ✐s ❛♣♣❧✐❝❛❜❧❡ ✐♥ s❡q✉❡♥t✐❛❧ ❛♥❞ ♦♥✲❧✐♥❡ ❞❛t❛✳
❚❤❡ ♣♦ss✐❜❧❡ s♦❧✉t✐♦♥ ❢♦r t❤✐s ♣r♦❜❧❡♠ ✇❛s ✐♥tr♦❞✉❝❡❞ ❜② ❇❡r♥❛✐❧❧❡ ❡t ❛❧✳ ❬✶✹❪✱ ✇✐t❤ t❤❡t❤❡♦r② t❤❛t t❤❡ ✜rst ❢❡✇ ♣❛❝❦❡ts✱ ✇❤✐❝❤ ❝♦♠❡ ❛❢t❡r t❤❡ ❚❈P ✸✲✇❛② ❤❛♥❞s❤❛❦❡ ❛♥❞ t❤❡❛♣♣❧✐❝❛t✐♦♥ ♥❡❣♦t✐❛t✐♦♥ ♣❤❛s❡✱ ❛r❡ ❣♦♦❞ ♣r❡❞✐❝t♦rs ♦❢ tr❛✣❝ ❝❧❛ss❡s✳ ❚❤❡ r❡s❡❛r❝❤❡rs✉s❡❞ ✉♥s✉♣❡r✈✐s❡❞ ❝❧✉st❡r✐♥❣ t♦ ✜♥❞ t❤❡ ♥❛t✉r❛❧ ❝❧✉st❡rs ✐♥ ❛♥ ✉♥❧❛❜❡❧❡❞ ❞❛t❛ s❡t✳ ❖♥❧②t❤❡ ✜rst ✜✈❡ ♣❛❝❦❡ts ♦❢ t❤❡ ✢♦✇ ✇❡r❡ ❝♦♥s✐❞❡r❡❞✱ ❛♥❞ t❤✐s s❤♦✇❡❞ ❣♦♦❞ ♣❡r❢♦r♠❛♥❝❡✇✐t❤ ♠♦r❡ t❤❛♥ ✽✵✪ ♦❢ ❛❧❧ ❞❛t❛ ✐❞❡♥t✐✜❡❞✳❚❤✐s t❤❡♦r② ✐s t❤❡ ❝♦r❡ ♦❢ ♦✉r ✇♦r❦ ❛♥❞ ✇❡ ✇✐❧❧ tr② t♦ ✐♠♣❧❡♠❡♥t ✐t ✇✐t❤ ❛ s❧✐❣❤t❧②❞✐✛❡r❡♥t ❢❡❛t✉r❡ s❡t ❛♥❞ ♠♦❞❡r♥ ❉❡❡♣ ▲❡❛r♥✐♥❣ ❢r❛♠❡✇♦r❦✳
✸✶
![Page 39: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/39.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
✸ ❙❚❆❚❊ ❖❋ ❚❍❊ ❆❘❚
❙♦♠❡ r❡❝❡♥t❧② ♣❡r❢♦r♠❡❞ r❡s❡❛r❝❤ s✉❣❣❡sts ✉s✐♥❣ ♥❡✇ ❝♦♥❝❡♣ts ✐♥ ❞❡❡♣ ❧❡❛r♥✐♥❣✱ s✉❝❤❛s ❉◆◆✱ ❘◆◆✱ ♥❛t✉r❛❧ ❧❛♥❣✉❛❣❡ ♣r♦❝❡ss✐♥❣ ✭◆▲P✮✱ ❡t❝✳❚❛♥❣ ❡t ❛❧✳ ❬✹✺❪ ♣r♦♣♦s❡❞ ❛ ✢♦✇ ❜❛s❡❞ ❛♥♦♠❛❧② ❞❡t❡❝t✐♦♥ ✐♥ ❙♦❢t✇❛r❡ ❉❡✜♥❡ ◆❡t✇♦r❦✭❙❉◆✮ ❡♥✈✐r♦♥♠❡♥t ❜② ✉s✐♥❣ ❞❡❡♣ ♥❡✉r❛❧ ♥❡t✇♦r❦✳ ❚❤❡ ❝❧❛ss✐✜❝❛t✐♦♥ ✇❛s ❜❛s❡❞ ♦♥ ✻❞✐✛❡r❡♥t ❢❡❛t✉r❡s ✭❞✉r❛t✐♦♥✱ ♣r♦t♦❝♦❧✱ sr❝❴❜②t❡s✱ ❞st❴❜②t❡s✱ ❝♦✉♥t✱ sr✈❴❝♦✉♥t✮✱ ❛♥❞✐t ♣❡r❢♦r♠❡❞ ✇✐t❤ t❤❡ ❛❝❝✉r❛❝② ♦❢ ✼✺✳✼✺✪✳ ❚❤❡ ♣❡r❢♦r♠❛♥❝❡ ✇❛s ❡✈❛❧✉❛t❡❞ ✇✐t❤ ♦t❤❡r♠❛❝❤✐♥❡ ❧❡❛r♥✐♥❣ ❛❧❣♦r✐t❤♠s✭◆❇✱ ❙❱▼✱ ❉❚✮✱ ❛♥❞ ✐t s❤♦✇❡❞ s❛t✐s❢❛❝t♦r② r❡s✉❧ts✳
■♥ t❤❡ r❡s❡❛r❝❤ ♣❛♣❡r ❬✸✶❪✱ t❤❡ ❛✉t❤♦rs ✐♥tr♦❞✉❝❡❞ ✉s✐♥❣ ◆▲P ✐♥ ❛ ✐♥tr✉s✐♦♥ ❞❡t❡❝t✐♦♥✱❜❡❝❛✉s❡ t❤❡ ❧❛♥❣✉❛❣❡ ♠♦❞❡❧ ❝❛♥ ❧❡❛r♥ t❤❡ s❡♠❛♥t✐❝ ♠❡❛♥✐♥❣ ❛♥❞ ✐♥t❡r❛❝t✐♦♥s ♦❢ ❡❛❝❤s②st❡♠ ❝❛❧❧ ✇❤✐❝❤ ✇❛s ♥♦t ♣♦ss✐❜❧❡ ✇✐t❤ t❤❡ ❡①✐st✐♥❣ ♠❡t❤♦❞s✳ ❚❤❡② ✉s❡❞ ❛ ❘◆◆✲❜❛s❡❞❧❛♥❣✉❛❣❡ ♠♦❞❡❧ ✇✐t❤ ▲❙❚▼ ✉♥✐ts t♦ ❡♥❤❛♥❝❡ ❧♦♥❣✲r❛♥❣❡ ❞❡♣❡♥❞❡♥❝✐❡s✳ ❚❤❡ r❡s✉❧ts❤♦✇❡❞ t❤❛t t❤❡ ▲❙❚▼ ♠♦❞❡❧ ✇✐t❤ s❡✈❡r❛❧ ❤✉♥❞r❡❞s ♦❢ ✉♥✐ts ♣❡r❢♦r♠❡❞ ❛ ❧♦t ❜❡tt❡rt❤❛♥ ❑◆◆ ❛♥❞ ❑▼❈ ❛❧❣♦r✐t❤♠s✳ ❚❤✐s ♠❡t❤♦❞ ❛❧s♦ ♣r♦✈❡❞ t♦ ❜❡ ♠♦r❡ ❝♦♠♣✉t❛t✐♦♥❛❧❧②❡✣❝✐❡♥t t❤❛♥ ♦t❤❡r ♠❡t❤♦❞s✱ ❛s ✐t ❤❛❞ ❛ s♠❛❧❧❡r tr❛✐♥✐♥❣ ♦✈❡r❤❡❛❞ ❜❡❝❛✉s❡ ✐t r❡q✉✐r❡❞♥♦ ❞❛t❛❜❛s❡ t♦ ❜❡ ❜✉✐❧t✳❚❤✐s ✇♦r❦ ✇✐t❤❞r❛✇ ♦✉r ❛tt❡♥t✐♦♥✱ ❛♥❞ ✇❡ ❛r❡ tr②✐♥❣ t♦ ✐♠♣r♦✈❡ t❤✐s ✐❞❡❛ ♦♥ tr❛✣❝❝❧❛ss✐✜❝❛t✐♦♥ ❛♥❞ ♠❛❧✐❝✐♦✉s tr❛✣❝ ❞❡t❡❝t✐♦♥✳ ❲❡ ✉s❡ ❞✐✛❡r❡♥t ♣❛❝❦❡t ❜❛s❡❞ ❢❡❛t✉r❡✈❡❝t♦r ✐♥ ♦r❞❡r t♦ ✐♠♣r♦✈❡ t❤❡ ♠♦❞❡❧ ❛♥❞ ♣r♦✈✐❞❡ ❡✣❝✐❡♥t ❝❧❛ss✐✜❝❛t✐♦♥✳
❆♥♦t❤❡r ✐♠♣♦rt❛♥t r❡s❡❛r❝❤ ✇♦rt❤ ♠❡♥t✐♦♥✐♥❣ ✐s ❬✹✼❪✳ ❚❤❡ ❛✉t❤♦rs ❛r❡ ✉s❡❞ t❤❡❡♥❞✲t♦✲❡♥❞ ❡♥❝r②♣t❡❞ tr❛✣❝ ❝❧❛ss✐✜❝❛t✐♦♥ ♠❡t❤♦❞✳ ❚❤❡ ♠❡t❤♦❞ ✇❛s ❜❛s❡❞ ♦♥ ❞❡❡♣❧❡❛r♥✐♥❣ ❛♥❞ ✐t ✉s❡❞ ❛ ♦♥❡✲❞✐♠❡♥s✐♦♥❛❧ ❝♦♥✈♦❧✉t✐♦♥ ♥❡✉r❛❧ ♥❡t✇♦r❦ t♦ ❧❡❛r♥ t❤❡ ❢❡❛t✉r❡s❢r♦♠ t❤❡ r❛✇ tr❛✣❝✳ ❚❤❡ r❡s✉❧t s❤♦✇❡❞ t❤❡ ❛❝❝✉r❛❝② ❣r❡❛t❡r t❤❛♥ ✽✵✪✱ ❛♥❞ t❤❡ ❜❡tt❡r♣❡r❢♦r♠❛♥❝❡ t❤❛♥ t❤❡ t✇♦✲❞✐♠❡♥s✐♦♥❛❧ ❈◆◆✳
❖✉r r❡s❡❛r❝❤ ✐s ❛❧s♦ ❣♦✐♥❣ ✐♥ ❞✐r❡❝t✐♦♥ ♦❢ t❤✐s ✇♦r❦✱ ❜✉t t❡♥❞s t♦ ❛♣♣❧② t❤❡ tr❛✣❝❝❧❛ss✐✜❝❛t✐♦♥ ♠♦❞❡❧ ♦♥ ❚▲❙ ❡♥❝r②♣t❡❞ ❞❛t❛✱ s✐♥❝❡ t❤✐s ♣r♦t♦❝♦❧ ✐s ♥♦t ❡♥❝r②♣t✐♥❣ ❚❈P❤❡❛❞❡r✳ ❆❧s♦✱ ✐t ✐s ❜❡✐♥❣ ❛ss✉♠❡❞ t❤❛t s✐♥❝❡ t❤❡ tr❛✣❝ ❞❛t❛ ✐s s❡q✉❡♥t✐❛❧✱ ❘◆◆s ✇♦✉❧❞❣✐✈❡ ♠❡t❡r ♣❡r❢♦r♠❛♥❝❡✳
✸✷
![Page 40: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/40.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
✹ ❘❊❙❊❆❘❈❍ ▼❊❚❍❖❉❖▲❖●❨ ❆◆❉ ❊❳P❊❘■▼❊◆❚
✹ ❘❡s❡❛r❝❤ ▼❡t❤♦❞♦❧♦❣② ❛♥❞ ❊①♣❡r✐♠❡♥t
■♥ t❤✐s ❝❤❛♣t❡r ✇❡ ✇✐❧❧ ❞✐s❝✉ss ❛❜♦✉t t❤❡ ❜❛s✐❝ str✉❝t✉r❡ ♦❢ t❤❡ ♥❡✉r❛❧ ♥❡t✇♦r❦ ♠♦❞❡❧❛♥❞ t❤❡ ♠❛✐♥ ❝❤❡❝❦♣♦✐♥ts ❞✉r✐♥❣ t❤❡ ❡①♣❡r✐♠❡♥t✳ ❚❤❡ ✜rst ♣❛rt ❡①♣❧❛✐♥s t❤❡ ❝♦♥❝❡♣t♦❢ t❤❡ ❡①♣❡r✐♠❡♥ts ✇✐t❤ t❤❡ ♠❛✐♥ ♣♦✐♥ts ♦❢ t❤❡ r❡s❡❛r❝❤✳ ❚❤❡ s❡❝♦♥❞ ♣❛rt ❞❡❛❧s ✇✐t❤t❤❡ ❞❛t❛ s❡t✱ ❛♥❞ ✐t ❞❡s❝r✐❜❡s t❤❡ ❤✐st♦r②✱ ♣r♦♣❡rt✐❡s ❛♥❞ t❤❡ ❝♦♥t❡♥t ♦❢ t❤❡ ❞❛t❛ s❡ts✳❚❤❡ t❤✐r❞ ♣❛rt ✐s ❞❡❞✐❝❛t❡❞ t♦ ❢❡❛t✉r❡ ❡♥❣✐♥❡❡r✐♥❣✱ ✇❤✐❝❤ r❡♣r❡s❡♥ts t❤❡ ♣r♦❝❡ss ♦❢❡①tr❛❝t✐♦♥ ❛♥❞ tr❛♥s❢♦r♠❛t✐♦♥ ♦❢ t❤❡ ❞❡s✐r❡❞ ❢❡❛t✉r❡s ✐♥ ♦r❞❡r t♦ ♣r❡♣❛r❡ t❤❡ ❞❛t❛ ❢♦rt❤❡ tr❛✐♥✐♥❣ ♣r♦❝❡ss✳ ❚❤❡ ♠❛✐♥ t❡❝❤♥♦❧♦❣② ♦❢ ❢❡❛t✉r❡ ❡①tr❛❝t✐♦♥✱ ❛s ✇❡❧❧ ❛s t❤❡ ♠❛✐♥❞✐✣❝✉❧t✐❡s ❛♥❞ ♣♦ss✐❜❧❡ ♣r♦❜❧❡♠s r❡❣❛r❞✐♥❣ t❤✐s s♣❡❝✐✜❝ s❡t✱ ❛r❡ ❡①♣❧❛✐♥❡❞✳ ❚❤❡ ❢♦✉rt❤♣❛rt ❞❡❛❧s ✇✐t❤ t❤❡ tr❛✐♥✐♥❣✳ ❆ s❤♦rt ♦✈❡r✈✐❡✇ ♦❢ t❤❡ t❡❝❤♥♦❧♦❣② ✐s ❣✐✈❡♥ ❛♥❞ t❤❡ ♠♦❞❡❧s✉s❡❞ ✐♥ t❤✐s ❡①♣❡r✐♠❡♥t ❛r❡ ❞❡s❝r✐❜❡❞✳ ■♥ t❤❡ ❧❛st ♣❛rt✱ ✇❡ ❣♦ t❤r♦✉❣❤ t❤❡ ❡✈❛❧✉❛t✐♦♥♦❢ ♦✉r ♠♦❞❡❧s ❛♥❞ t❤❡ ♠❡t❤♦❞s ✉s❡❞ ❢♦r t❤✐s ♣✉r♣♦s❡✳
✹✳✶ ❈♦♥❝❡♣t
❚❤❡ ♠❛✐♥ ♦❜❥❡❝t✐✈❡ ♦❢ t❤✐s r❡s❡❛r❝❤ ✐s t♦ ❞❡✈❡❧♦♣ ❛♥ ❡✣❝✐❡♥t ♠♦❞❡❧ ✇❤✐❝❤ ❝♦✉❧❞ r❡❝✲♦❣♥✐③❡ ❛ s❡❝✉r✐t② t❤r❡❛t ✐♥ ❡♥❝r②♣t❡❞ ♥❡t✇♦r❦ tr❛✣❝✳ ❚❤✐s ✐s ❞♦♥❡ ❜② ✉s✐♥❣ r❡❝✉rr❡♥t♥❡✉r❛❧ ♥❡t✇♦r❦ ✇✐t❤ ❞✐✛❡r❡♥t ♠♦❞❡❧s ❛♥❞ ❛ ❞✐✛❡r❡♥t ♥✉♠❜❡r ♦❢ ❧❛②❡rs ❛♥❞ ❝❡❧❧s✳ ❚❤❡❧❛②❡r ♥✉♠❜❡r ✉s✉❛❧❧② ✈❛r✐❡s ❜❡t✇❡❡♥ ✶ ❛♥❞ ✺ ❧❛②❡rs✱ ❛♥❞ t❤❡ ❝❡❧❧s ✉s❡❞ ✐♥ t❤❡ ❧❛②❡rs ❛r❡♠♦st❧② ❧♦♥❣✲s❤♦rt t❡r♠ ♠❡♠♦r② ❝❡❧❧s ❛♥❞ ❣❛t❡❞ r❡❝✉rr❡♥t ✉♥✐t ❝❡❧❧s✳ ❋♦r t❤✐s ♣✉r♣♦s❡✱❛ ❧❛❜❡❧❧❡❞ ❞❛t❛ s❡t ✐s ✉s❡❞ ✇✐t❤ ❛ ♥❡✇ ❢❡❛t✉r❡ s❡t✳ ❉✐✛❡r❡♥t ♠♦❞❡❧s ✇✐t❤ ❞✐✛❡r❡♥t ❧❛②❡r❝♦♥✜❣✉r❛t✐♦♥s ❛r❡ ♣r❡s❡♥t❡❞✱ ❛♥❞ ❞✐✛❡r❡♥t r❡❣✉❧❛r✐③❛t✐♦♥ t❡❝❤♥✐q✉❡s ❛r❡ ✐♠♣❧❡♠❡♥t❡❞✐♥ ♦r❞❡r t♦ ✜♥❞ t❤❡ ♠♦st ❡✣❝✐❡♥t ♠♦❞❡❧ ✇✐t❤ ❤✐❣❤ ❛❝❝✉r❛❝② ❛♥❞ ♠✐♥✐♠❛❧ ❧♦ss✳❚❤❡ ♠❛✐♥ ❝❤❡❝❦♣♦✐♥ts ♦❢ t❤❡ ❡①♣❡r✐♠❡♥t ❛r❡ s❤♦✇♥ ✐♥ ❋✐❣✉r❡ ✷✸ ✿
❋✐❣✉r❡ ✷✸✿ ❊①♣❡r✐♠❡♥t ❞✐❛❣r❛♠ ✲ s❤♦✇s ♠❛✐♥ ❝❤❡❝❦♣♦✐♥ts ❞✉r✐♥❣ ♦✉r r❡s❡❛r❝❤ ✭❡①♣❧❛✐♥❡❞✐♥ ❞❡t❛✐❧s ✐♥✿ ✹✳✷ ❛♥❞ ✹✳✸ ✮
✸✸
![Page 41: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/41.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
✹✳✶ ❈♦♥❝❡♣t ✹ ❘❊❙❊❆❘❈❍ ▼❊❚❍❖❉❖▲❖●❨ ❆◆❉ ❊❳P❊❘■▼❊◆❚
❉❛t❛ s❡t
■♥ t❤❡ ♣r♦❝❡ss ♦❢ ♠❛❝❤✐♥❡ ❧❡❛r♥✐♥❣✱ ❛♥ ✐♠♣♦rt❛♥t st❡♣ ✐s ❝❤♦♦s✐♥❣ t❤❡ ❛♣♣r♦♣r✐❛t❡ ❞❛t❛s❡t ❛♥❞ ❡①tr❛❝t✐♥❣ t❤❡ ♠♦st ✐♠♣♦rt❛♥t ❢❡❛t✉r❡s ❢r♦♠ t❤❡ ❞❛t❛✳ ❋♦r ♦✉r ❡①♣❡r✐♠❡♥t✱t❤❡ ❝r✉❝✐❛❧ ❝❤❛r❛❝t❡r✐st✐❝ ♦❢ t❤❡ ❞❛t❛ s❡t ✐s t❤❛t ✐t ✐s ❜✐❣ ❡♥♦✉❣❤ ❛♥❞ ✉♣ t♦ ❞❛t❡✳ ❋♦rt❤❡ ♥❡t✇♦r❦ tr❛✣❝ ❝❧❛ss✐✜❝❛t✐♦♥ ❛♥❞ s❡❝✉r✐t② t❤r❡❛t r❡❝♦❣♥✐t✐♦♥ ✉♣✲t♦✲❞❛t❡ ♠❡❛♥st❤❛t ✐t ❝♦♥t❛✐♥s tr❛✣❝ ✇✐t❤ ♥❡✇ ❛♣♣❧✐❝❛t✐♦♥s ❛♥❞ r❡❝❡♥t❧② ❞❡✈❡❧♦♣❡❞ ♣r♦t♦❝♦❧s✱ ❛s ✇❡❧❧❛s ❝✉rr❡♥t t❤r❡❛ts ❛♥❞ ❛tt❛❝❦s✳ ❚❤❡r❡ ❛r❡ ❛ ❧♦t ♦❢ ♣♦ss✐❜✐❧✐t✐❡s ♦❢ ❞✐✛❡r❡♥t ❞❛t❛ s❡ts❛✈❛✐❧❛❜❧❡ ❢♦r t❤✐s ♣✉r♣♦s❡✳
❉❆❘P❆✾✽ ❬✶❪ ✇❛s ♠❛❞❡ ❜② t❤❡ ▲✐♥❝♦❧♥ ❧❛❜♦r❛t♦r✐❡s ❛t ▼■❚ ❯♥✐✈❡rs✐t② ✐♥ ✶✾✾✽✳■t r❡♣r❡s❡♥t❡❞ ❛ s✐♠✉❧❛t✐♦♥ ♦❢ ♥♦r♠❛❧ ❛♥❞ ♠❛❧✐❝✐♦✉s tr❛✣❝ ✐♥ ❛ ♠✐❧✐t❛r② ♥❡t✇♦r❦❡♥✈✐r♦♥♠❡♥t✳ ❚❤❡ ❞❛t❛ s❡t ❝♦♥t❛✐♥s ✾ ✇❡❡❦s ♦❢ r❛✇ t❝♣❞✉♠♣ ❬✶✵❪ ❞❛t❛✱ ✇❤✐❝❤ ✐s❞✐✈✐❞❡❞ ✐♥t♦ s❡✈❡♥ ✇❡❡❦s ♦❢ tr❛✐♥✐♥❣ ❞❛t❛ ✇✐t❤ ❛r♦✉♥❞ ✺ ♠✐❧❧✐♦♥ ❝♦♥♥❡❝t✐♦♥s✱ ❛♥❞✸ ✇❡❡❦s ♦❢ t❡st ❞❛t❛ ✇✐t❤ ❛r♦✉♥❞ ✷ ♠✐❧❧✐♦♥ ❝♦♥♥❡❝t✐♦♥s✳ ❑❉❉❈✉♣✾✾ ❬✺❪ ❞❛t❛ s❡t✐s ❛♥ ✉♣❞❛t❡❞ ✈❡rs✐♦♥ ♦❢ ❉❆❘P❆ ✾✽ ✇✐t❤ ✹✶ ❢❡❛t✉r❡s ❞✐✈✐❞❡❞ ✐♥t♦ t❤r❡❡ ❣r♦✉♣s ♦❢❢❡❛t✉r❡s✿ ✐♥tr✐♥s✐❝ ❢❡❛t✉r❡s✱ ❝♦♥t❡♥t ❢❡❛t✉r❡s ❛♥❞ tr❛✣❝ ❢❡❛t✉r❡s✳ ❚❤❡ s❡t ❛❧s♦ ❝♦♥t❛✐♥s✷✷ ❛tt❛❝❦ t②♣❡s✳ ❆❝❝♦r❞✐♥❣ t♦ s✐❣♥✐✜❝❛♥t r❡s❡❛r❝❤ ❜❛s❡❞ ♦♥ t❤✐s ❞❛t❛ s❡t✱ ✐ts t❤r❡❡♠❛✐♥ ❞✐s❛❞✈❛♥t❛❣❡s ❛r❡✿ ❚❚▲ ✈❛❧✉❡ ❞♦❡s ♥♦t ❝♦rr❡s♣♦♥❞ t♦ t❤❡ r❡❛❧ ✇♦r❧❞ tr❛✣❝❝❤❛r❛❝t❡r✐st✐❝s✱ ♣r♦❜❛❜✐❧✐t② ❞✐str✐❜✉t✐♦♥ ✐s ❞✐✛❡r❡♥t ✐♥ t❤❡ tr❛✐♥✐♥❣ s❡t ❛♥❞ t❡st s❡t ❛♥❞t❤❡ s❡t ✐s ♠✐ss✐♥❣ t❤❡ r❡❝❡♥t❧② r❡♣♦rt❡❞ ❧♦✇ ❢♦♦t♣r✐♥t ❛tt❛❝❦s✳
◆❙▲❑❉❉ ❬✹✻❪ ❞❛t❛ s❡t ✐s ❛♥ ✉♣❞❛t❡❞ ✈❡rs✐♦♥ ♦❢ ❑❉❉❈✉♣✾✾✱ ✇❤✐❝❤ ❡♥❞❡❛✈♦rs t♦s♦❧✈❡ ❝❡rt❛✐♥ ♣r♦❜❧❡♠s ✇❤✐❝❤ ❝❛♠❡ ✇✐t❤ t❤❡ ♦❧❞ ❞❛t❛ s❡t✳ ❋✐rst❧②✱ ✐t r❡♠♦✈❡s ❞✉♣❧✐❝❛t❡❞r❡❝♦r❞s ✐♥ t❤❡ tr❛✐♥✐♥❣ ❛♥❞ ❞❛t❛ s❡ts✳ ❙❡❝♦♥❞❧②✱ ✐t r❛♥❞♦♠✐③❡s ❞❛t❛ ❜② ♣✐❝❦✐♥❣ ✉♣r❡❝♦r❞s ❢r♦♠ ❞✐✛❡r❡♥t ♣♦✐♥ts ✐♥ t❤❡ ❞❛t❛ s❡t✱ ❛♥❞ ✐t r❡♠♦✈❡s t❤❡ ✉♥❜❛❧❛♥❝❡❞ ♥✉♠❜❡r♦❢ r❡❝♦r❞s ✐♥ t❤❡ tr❛✐♥✐♥❣ ❛♥❞ t❡st s❡t✳ ❚❤❡ ❞❛t❛ s❡t st✐❧❧ ❞♦❡s ♥♦t ✐♥❝❧✉❞❡ t❤❡ ♠♦❞❡r♥❧♦✇ ❢♦♦t♣r✐♥t ❛tt❛❝❦ s❝❡♥❛r✐♦s ✇❤✐❝❤ ♠❛❦❡s t❤✐s ❞❛t❛ s❡t ✉♥s✉✐t❛❜❧❡ ❢♦r t❤❡ tr❛✐♥✐♥❣♠♦❞❡❧s ❢♦r t❤❡ ❝❧❛ss✐✜❝❛t✐♦♥ ♦❢ ♠♦❞❡r♥ ♥❡t✇♦r❦ tr❛✣❝✳
❯◆❙❲✲◆❇✶✺ ✐s ❛ ❞❛t❛ s❡t ✇❤✐❝❤ ✐s ❝r❡❛t❡❞ ❜② ❛ ❝②❜❡rs❡❝✉r✐t② r❡s❡❛r❝❤ ❣r♦✉♣ ❛tt❤❡ ❆✉str❛❧✐❛♥ ❈❡♥tr❡ ❢♦r ❈②❜❡r ❙❡❝✉r✐t② ✭❆❈❈❙✮✳ ❚❤❡ ■❳■❆ P❡r❢❡❝t ❙t♦r♠ t♦♦❧ ❬✹❪✇❛s ✉s❡❞ t♦ ❝r❡❛t❡ ♥♦r♠❛❧ ❛♥❞ ♠❛❧✐❝✐♦✉s ♥❡t✇♦r❦ tr❛✣❝✱ ✇✐t❤ ❛♥ ✉♣❞❛t❡❞ ❞❛t❛❜❛s❡ ♦❢♥❡✇ ❛tt❛❝❦s ❢r♦♠ t❤❡ ❈❱❊ ✇❡❜✲s✐t❡ ❬✸❪✳ ❚❤r❡❡ ✈✐rt✉❛❧ s❡r✈❡rs ✇❡r❡ s❡t✱ t✇♦ ♣r♦❞✉❝✐♥❣♥♦r♠❛❧ ❛♥❞ ♦♥❡ ♣r♦❞✉❝✐♥❣ ♠❛❧✐❝✐♦✉s tr❛✣❝✳ ❚❤❡ ❣❡♥❡r❛t♦r ❛r❝❤✐t❡❝t✉r❡ ♣✐❝t✉r❡ ✐s ❛s❢♦❧❧♦✇✐♥❣✿
✸✹
![Page 42: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/42.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
✹✳✶ ❈♦♥❝❡♣t ✹ ❘❊❙❊❆❘❈❍ ▼❊❚❍❖❉❖▲❖●❨ ❆◆❉ ❊❳P❊❘■▼❊◆❚
❋✐❣✉r❡ ✷✹✿ ❯◆❙❲✲◆❇✶✺ ❞❛t❛ s❡t ❣❡♥❡r❛t♦r ❛r❝❤✐t❡❝t✉r❡ ❬✸✽❪
❚❤❡ tr❛✣❝ ✇❛s ❝❛♣t✉r❡❞ ✇✐t❤ t❝♣❞✉♠♣✱ ✐♥ ❞✉r❛t✐♦♥ ♦❢ ✶✻❤ ♦♥ ✷✷ ❏❛♥✉❛r② ✷✵✶✺✱ ❛♥❞✶✺❤ ♦♥ ✶✼ ❋❡❜r✉❛r② ✷✵✶✺✱ ❛♥❞ ✐t ❝♦♥t❛✐♥❡❞ ❛r♦✉♥❞ ✶✵✵●❇ ♦❢ ❞❛t❛✳ ■t ❝♦♥t❛✐♥s ✹✾❢❡❛t✉r❡s ♦❢ tr❛✣❝ ❛♥❞ ✾ ❢❛♠✐❧✐❡s ♦❢ ❛tt❛❝❦✳ ❚❤❡ st❛t✐st✐❝s ♦❢ t❤❡ ❞❛t❛ ❛♥❞ ❛tt❛❝❦s ❛r❡s❤♦✇♥ ✐♥ t❛❜❧❡✿
❙t❛t✐st✐❝❛❧ ❢❡❛t✉r❡s ✶✻ ❤♦✉rs ♦♥ ✷✷✳✶✳✷✵✶✺ ✶✺ ❤♦✉rs ♦♥ ✶✼✳✷✳✷✵✶✾◆♦✳❴ ♦❢❴✢♦✇s ✾✽✼✱✻✷✼ ✾✼✻✱✽✽✷❙r❝❴❜②t❡s ✹✱✽✻✵✱✶✻✽✱✽✻✻ ✺✱✾✹✵✱✺✷✸✱✼✷✽❉❡s❴❜②t❡s ✹✹✱✼✹✸✱✺✻✵✱✾✹✸ ✹✹✱✸✵✸✱✶✾✺✱✺✵✾❙r❝❴P❦ts ✹✶✱✶✻✽✱✹✷✺ ✹✶✱✶✷✾✱✽✶✵❉❡s❴P❦ts ✺✸✱✹✵✷✱✾✶✺ ✺✷✱✺✽✺✱✹✻✷
Pr♦t♦❝♦❧ t②♣❡s
❚❈P ✼✼✶✱✹✽✽ ✼✷✵✱✻✻✺❯❉P ✸✵✶✱✺✷✽ ✻✽✽✱✻✶✻■❈▼P ✶✺✵ ✸✼✹❖t❤❡rs ✶✺✵ ✸✼✹
▲❛❜❡❧◆♦r♠❛❧ ✶✱✵✻✹✱✾✽✼ ✶✱✶✺✸✱✼✼✹❆tt❛❝❦ ✷✷✱✷✶✺ ✷✾✾✱✵✻✽
❯♥✐q✉❡❙r❝❴✐♣ ✹✵ ✹✶❉st❴✐♣ ✹✹ ✹✺
❚❛❜❧❡ ✶✿ ❯◆❙❲✲◆❇✶✺ ❞❛t❛ s❡t s♣❡❝✐✜❝❛t✐♦♥s
❈♦♠♣❛r❡❞ t♦ t❤❡ ♣r❡✈✐♦✉s ❞❛t❛ s❡ts✱ ❯◆❙❲✲◆❇✶✺ ❝♦♥t❛✐♥s ♠♦r❡ ❞❛t❛✱ ♠♦r❡ ❢❡❛t✉r❡s✱
✸✺
![Page 43: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/43.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
✹✳✶ ❈♦♥❝❡♣t ✹ ❘❊❙❊❆❘❈❍ ▼❊❚❍❖❉❖▲❖●❨ ❆◆❉ ❊❳P❊❘■▼❊◆❚
♠♦r❡ ♣❛rt✐❝✐♣❛♥ts ✐♥ ❝♦♠♠✉♥✐❝❛t✐♦♥s✱ ❛s ✇❡❧❧ ❛s ❞✐✛❡r❡♥t ❛tt❛❝❦ ❢❛♠✐❧✐❡s ✇❤✐❝❤ ❝♦rr❡✲s♣♦♥❞ t♦ ♠♦❞❡r♥ ❧♦✇ ❢♦♦t♣r✐♥t ❛tt❛❝❦s✳ ❚❤❡r❡ ❛r❡ ✾ ❞✐✛❡r❡♥t ❛tt❛❝❦ ❢❛♠✐❧✐❡s✿
❼ ❋✉③③❡rs
❼ ❆♥❛❧②s✐s
❼ ❇❛❝❦❞♦♦rs
❼ ❉♦❙
❼ ❊①♣❧♦✐ts
❼ ●❡♥❡r✐❝
❼ ❘❡❝♦♥♥❛✐ss❛♥❝❡
❼ ❙❤❡❧❧❝♦❞❡
❼ ❲♦r♠s
❋♦r ❛❧❧ t❤❡ ♣r❡✈✐♦✉s❧② st❛t❡❞ r❡❛s♦♥s✱ ✇❡ ❛r❡ ✉s✐♥❣ t❤✐s ❞❛t❛ s❡t ❢♦r r❡s❡❛r❝❤✳
❋❡❛t✉r❡ ❡♥❣✐♥❡❡r✐♥❣
❉❛t❛ s❡ts ❛r❡ ✉s✉❛❧❧② t♦♦ ❜✐❣ ❛♥❞ ♥♦t ♣r♦♣❡r❧② s❝❛❧❡❞ ❢♦r ❛♥ ✐♥t❡♥❞❡❞ ♣✉r♣♦s❡✳ ❚❤❡✐♥♣✉t t❤❛t ♠❛❝❤✐♥❡ ❧❡❛r♥✐♥❣ ♠♦❞❡❧ ✉s❡s ✐s ❛ ♥✉♠❡r✐❝❛❧ r❡♣r❡s❡♥t❛t✐♦♥ ♦❢ ❞❛t❛ ❛♥❞ ✐t ✐s❝❛❧❧❡❞ ❢❡❛t✉r❡s✳
✧ ❋❡❛t✉r❡ ❡♥❣✐♥❡❡r✐♥❣ ✐s ❛♥ ❛❝t ♦❢ ❡①tr❛❝t✐♥❣ ❢❡❛t✉r❡s ❢r♦♠ r❛✇ ❞❛t❛ ❛♥❞ tr❛♥s❢♦r♠✐♥❣t❤❡♠ ✐♥t♦ ❛ ❢♦r♠❛t t❤❛t ✐s s✉✐t❛❜❧❡ ❢♦r t❤❡ ♠❛❝❤✐♥❡ ❧❡❛r♥✐♥❣ ♠♦❞❡❧✳✧ ❬✺✵❪■t ✐s ❛♥ ✐♠♣♦rt❛♥t st❡♣ ♦❢ ♠❛❝❤✐♥❡ ❧❡❛r♥✐♥❣ ❜❡❝❛✉s❡ ♣r♦♣❡r❧② ❝❤♦s❡♥ ❢❡❛t✉r❡ s❡ts ❤❛✈❡❛ str♦♥❣ ✐♠♣❛❝t ♦♥ t❤❡ ♦✉t❝♦♠❡ ♦❢ t❤❡ ❡①♣❡r✐♠❡♥t ❛♥❞ ❝♦✉❧❞ s✐❣♥✐✜❝❛♥t❧② ✐♠♣r♦✈❡ t❤❡q✉❛❧✐t② ♦❢ t❤❡ r❡s✉❧t✳❚❤❡r❡ ❤❛s ❜❡❡♥ ♣❧❡♥t② ♦❢ r❡s❡❛r❝❤ ♦♥ t❤❡ ✐♠♣♦rt❛♥❝❡ ♦❢ ❢❡❛t✉r❡s ❢♦r ♥❡t✇♦r❦ tr❛✣❝❝❧❛ss✐✜❝❛t✐♦♥ ✉s❡❞ ❢♦r tr❛✐♥✐♥❣ ✈❛r✐♦✉s ▼▲ ♠♦❞❡❧s✳ ■♥ r❡s❡❛r❝❤ ♣❛♣❡r ❬✸✺❪✱ ❛✉t❤♦r❛♥❛❧②s❡s ❞✐✛❡r❡♥t ❢❡❛t✉r❡ ✈❡❝t♦rs✿ ❯◆❙❲ ❆r❣✉s✴❇r♦ ❱❡❝t♦r ❬✸✾❪✱ ❈❆■❆ ❱❡❝t♦r ❬✹✾❪✱❈♦♥s❡♥s✉s ❱❡❝t♦r ❬✷✷❪✱ ❚❆ ❱❡❝t♦r ❬✷✺❪✱ ❆●▼ ❱❡❝t♦r ❬✷✻❪✳ ❚❤❡ ❢♦❧❧♦✇✐♥❣ t❛❜❧❡ s❤♦✇st❤❡ ❝♦rr❡s♣♦♥❞✐♥❣ ❢❡❛t✉r❡ s❡ts✿
✸✻
![Page 44: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/44.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
✹✳✶ ❈♦♥❝❡♣t ✹ ❘❊❙❊❆❘❈❍ ▼❊❚❍❖❉❖▲❖●❨ ❆◆❉ ❊❳P❊❘■▼❊◆❚
❋✐❣✉r❡ ✷✺✿ ❋❡❛t✉r❡ s❡t ❝♦♠♣❛r✐s♦♥ ❬✸✺❪
❚❤❡ ❢❡❛t✉r❡ s❡ts ✇❤✐❝❤ ✇❡r❡ t❤❡ ♦❜❥❡❝t ♦❢ t❤❡ r❡s❡❛r❝❤ ♣❡r❢♦r♠❡❞ ✇❡❧❧ ✇✐t❤ ✈❛r✐♦✉sst❛t✐st✐❝❛❧ ♠❡t❤♦❞s s✉❝❤ ❛s✿ t❤❡ ♥❛✐✈❡ ❇❛②❡s ❝❧❛ss✐✜❝❛t✐♦♥✱ r❛♥❞♦♠ ❢♦r❡sts✱ ❞❡❝✐s✐♦♥tr❡❡s✱ ❡t❝✳❙✐♥❝❡ t❤♦s❡ ❝❧❛ss✐✜❡rs ❛r❡ ❞✐✛❡r❡♥t t♦ t❤♦s❡ t❤❛t ✇❡ ✐♥t❡♥❞ t♦ ✉s❡✱ ✇❡ ❛ss✉♠❡t❤❛t t❤♦s❡ ❢❡❛t✉r❡ s❡ts ✇♦✉❧❞ ♣❡r❢♦r♠ ♣♦♦r❧② ✇✐t❤ ❛ r❡❝✉rr❡♥t ♥❡✉r❛❧ ♥❡t✇♦r❦✳ ■♥❛❞❞✐t✐♦♥ t♦ t❤❛t✱ ✉s❡❞ ❞❛t❛ ❛r❡ ♥♦t s❡q✉❡♥t✐❛❧✱ s♦ ✐t ✇♦✉❧❞ ♥♦t ❜❡ ❛♣♣r♦♣r✐❛t❡❢♦r ❘◆◆ ✉s❡✳ ▼♦r❡♦✈❡r✱ t❤❡ ❢❡❛t✉r❡ s❡ts ❛r❡ ♥♦t s✉✐t❡❞ ❢♦r ❡♥❝r②♣t❡❞ tr❛✣❝ ❝❧❛s✲s✐✜❝❛t✐♦♥✱ ❛s t❤❡r❡ ❛r❡ ♠❛♥② ❢❡❛t✉r❡s ❢r♦♠ ❧✐st t❤❡r❡ ❛r❡ ♥♦t ❛✈❛✐❧❛❜❧❡ ❞✉❡ t♦ ❡♥❝r②♣t✐♦♥✳
❉✉❡ t♦ t❤♦s❡ r❡❛s♦♥s✱ ❛s ✇❡❧❧ ❛s s♦♠❡ ♦t❤❡r ♦♥❡s✱ ✇❡ ❞❡❝✐❞❡❞ t♦ ❞❡✈❡❧♦♣ ♦✉r ♦✇♥❢❡❛t✉r❡ ✈❡❝t♦r✱ ✇❤✐❝❤ ✐s ♠♦r❡ ♣❛❝❦❡t ❜❛s❡❞✳ ❚❤✐s ♠❡❛♥s t❤❛t ♦✉r ❢❡❛t✉r❡ ✈❡❝t♦r ❞♦ ♥♦t❞❡♣❡♥❞ ❡♥t✐r❡❧② ♦♥ tr❛✣❝ ✢♦✇✳ ■t ❝♦♥t❛✐♥s ♣❛❝❦❡t ❧❡♥❣t❤✱ t✐♠❡ ❜❡t✇❡❡♥ ♣❛❝❦❡ts❛rr✐✈❡❞ ✐♥ t❤❡ ❝✉rr❡♥t ✢♦✇ ❛♥❞ t❤❡ ❞✐r❡❝t✐♦♥ ♦❢ ❛ ♣❛❝❦❡t ✐♥ ✢♦✇✳ ▼♦st ♦❢ t❤❡ ♣r♦✲t♦❝♦❧s ✭✐♥❝❧✉❞✐♥❣ ❡♥❝r②♣t✐♦♥ ♣r♦t♦❝♦❧s✮ ❛r❡ ❝♦♥♥❡❝t✐♦♥ ❜❛s❡❞✱ ❛♥❞ t❤❡② st❛rt ✇✐t❤ t❤❡
✸✼
![Page 45: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/45.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
✹✳✷ Pr❡♣r♦❝❡ss✐♥❣ ✹ ❘❊❙❊❆❘❈❍ ▼❊❚❍❖❉❖▲❖●❨ ❆◆❉ ❊❳P❊❘■▼❊◆❚
❛♣♣❧✐❝❛t✐♦♥ ♥❡❣♦t✐❛t✐♦♥ ♣❤❛s❡✳ ■♥ t❤✐s ♣❤❛s❡ t❤❡ ✢♦✇ ❞✐r❡❝t✐♦♥ ❛♥❞ ♣❛❝❦❡t ❧❡♥❣t❤ ♦❢t❤❡ ✜rst ❢❡✇ ♣❛❝❦❡ts ✐♥ t❤❡ ✢♦✇ ♣❧❛② ❛ ✈❡r② ✐♠♣♦rt❛♥t ♣❛rt✱ s✐♥❝❡ t❤❡ ❡st❛❜❧✐s❤♠❡♥t ♦❢t❤❡ ❝♦♥♥❡❝t✐♦♥ s❝❡♥❛r✐♦ ❜❡t✇❡❡♥ t❤❡ ✉s❡rs ✐s ♣r❡❞❡t❡r♠✐♥❡❞✳ ❖✉r ❛ss✉♠♣t✐♦♥ ✐s t❤❛t♣❛❝❦❡t ❜❛s❡❞ ❢❡❛t✉r❡ ✈❡❝t♦r ✇♦✉❧❞ ❜❡ ❛ ❣♦♦❞ ❢❡❛t✉r❡ t♦ ❢❡❡❞ ❞✉r✐♥❣ ♠♦❞❡❧ tr❛✐♥✐♥❣ ✐♥♦r❞❡r t♦ ❛❝❤✐❡✈❡ ❛tt❛❝❦ r❡❝♦❣♥✐t✐♦♥ ✐♥ t❤❡ ❡❛r❧② st❛❣❡✳❚❤✐s ✇♦✉❧❞ s♦❧✈❡ ✉s✉❛❧ ♣r♦❜❧❡♠ t❤❛t ♠♦st ♦❢ t❤❡ r❡s❡❛r❝❤❡rs ❤❛✈❡ ✇✐t❤ t❤❡ ✢♦✇✲❜❛s❡❞❝❧❛ss✐✜❝❛t✐♦♥✱ ❛♥❞ ✐t ✐s t❤❡ ❢❛❝t t❤❛t t❤❡ ❡♥t✐r❡ ✢♦✇ ♥❡❡❞ t♦ ❜❡ ✜♥✐s❤❡❞ ✐♥ ♦r❞❡r t♦❝❧❛ss✐❢② t❤❡ tr❛✣❝✳
✹✳✷ Pr❡♣r♦❝❡ss✐♥❣
❚❤✐s s✉❜s❡❝t✐♦♥ ✐s ❞❡❞✐❝❛t❡❞ t♦ ❞❛t❛ ♣r❡♣❛r❛t✐♦♥ ❢♦r ❢❡❡❞✐♥❣ t❤❡ ❘◆◆ ♠♦❞❡❧ ✐♥ t❤❡♣r♦❝❡ss ♦❢ tr❛✐♥✐♥❣✳❚❤❡ ✜rst st❡♣ ♦❢ t❤✐s ♣r♦❝❡ss r❡♣r❡s❡♥ts ❢❡❛t✉r❡ ❡①tr❛❝t✐♦♥✳ ❚❤❡ ❯◆❙❲✲◆❇✶✺ ❞❛t❛ s❡t❝♦♠❡s ✇✐t❤ ❞✐✛❡r❡♥t ❢❡❛t✉r❡s s❡ts ✭❆r❣✉s✴❇r♦✮✱ ❜✉t s✐♥❝❡ ✇❡ ✇❡r❡ ♥♦t ✉s✐♥❣ ❛♥② ♦❢t❤♦s❡ s❡ts✱ ✇❡ ♥❡❡❞❡❞ t♦ ❞❡✈❡❧♦♣ ❛ s❝r✐♣t ✇❤✐❝❤ ✇♦✉❧❞ ❡①tr❛❝t ❞❡s✐r❛❜❧❡ ❢❡❛t✉r❡s✳❆❢t❡r ❛♥❛❧②s✐♥❣ t❤❡ ✳♣❝❛♣ ✜❧❡s ✇❤✐❝❤ ❝❛♠❡ ✇✐t❤ t❤❡ ❯◆❙❲✲◆❇✶✺ ❞❛t❛ s❡t✱ ❜② ✉s✐♥❣❲✐r❡s❤❛r❦ ❬✶✷❪✱ ✇❡ ❤❛✈❡ ❡①tr❛❝t❡❞ ❢♦❧❧♦✇✐♥❣ ❢❡❛t✉r❡s✿
❼ s♦✉r❝❡ ■P
❼ ❞❡st✐♥❛t✐♦♥ ■P
❼ s♦✉r❝❡ ♣♦rt ❢♦r ❚❈P ❛♥❞ ❯❉P tr❛✣❝
❼ ❞❡st✐♥❛t✐♦♥ ♣♦rt ❢♦r ❚❈P ❛♥❞ ❯❉P tr❛✣❝
❼ ♣r♦t♦❝♦❧
❼ ♣❛❝❦❡t ❧❡♥❣t❤
❼ ♣❛❝❦❡t t✐♠❡st❡♠♣
❚❤❡ ❢❡❛t✉r❡s ✇❡r❡ ❡①tr❛❝t❡❞ ❛s ❛ ✳❝s✈ ✜❧❡✱ ✇❤✐❝❤ ✇❛s ❢♦r✇❛r❞❡❞ t♦ ♥❡①t st❡♣✳
❚❤❡ s❡❝♦♥❞ st❡♣ ✇❛s ♣r♦t♦❝♦❧ tr❛♥s❧❛t✐♦♥✳ ❙✐♥❝❡ t❤❡ ♣r♦t♦❝♦❧ ✇❛s r❡♣r❡s❡♥t❡❞ ✇✐t❤♣r♦t♦❝♦❧ ♥✉♠❜❡rs✱ ✇❡ tr❛♥s❧❛t❡❞ ✐t t♦ ❛ str✐♥❣ ✭✧❯❉P✧✱✧❚❈P✧✱✳✳✳✮✱ ❜❡❝❛✉s❡ ✐t ✇❛sr❡q✉✐r❡❞ ❢♦r ❝♦♠♣❛r✐s♦♥ ✐♥ ❢✉rt❤❡r st❡♣s ✭✢♦✇ ❝❧❛ss✐✜❝❛t✐♦♥✱ ❧❛❜❡❧❧✐♥❣✮✳❚❤✐s ✇❛s ❞♦♥❡ ❜② ❛ P②t❤♦♥ s❝r✐♣t ✇❤✐❝❤ ❝♦♠♣❛r❡❞ t❤❡ ♣r♦t♦❝♦❧ ♥✉♠❜❡r ❢r♦♠ t❤❡ ✳❝s✈✜❧❡ ✇✐t❤ t❤❡ ♣r♦t♦❝♦❧ ♥✉♠❜❡r ❧✐st ♠❛❞❡ ❜② ■❆◆❆ ❬✽❪✳❉✉r✐♥❣ t❤❡ tr❛♥s❧❛t✐♦♥✱ ✇❡ ♥♦t✐❝❡❞ t❤❛t ❛ ❣r❡❛t ♣♦rt✐♦♥ ♦❢ ♣r♦t♦❝♦❧s ✐♥ ❞❛t❛ s❡t ✐s❛♣♣r♦①✐♠❛t❡❧② ❛s ❢♦❧❧♦✇s✿
✸✽
![Page 46: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/46.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
✹✳✷ Pr❡♣r♦❝❡ss✐♥❣ ✹ ❘❊❙❊❆❘❈❍ ▼❊❚❍❖❉❖▲❖●❨ ❆◆❉ ❊❳P❊❘■▼❊◆❚
❼ ❚❈P✿ ✻✵✪
❼ ❯❉P✿ ✸✾✪
❼ ♦t❤❡rs✿ ❁ ✶✪
❚❤❡ t❤✐r❞ st❡♣ ✇❛s ❝❧❛ss✐❢②✐♥❣ t❤❡ ❞❛t❛ s❡t ✐♥t♦ ❛ ❧✐st ♦❢ tr❛✣❝ ✢♦✇s✳ ❆s t❤❡ ✐♥❞✐❝❛t♦r♦❢ t❤❡ ✢♦✇✱ ❛ ✺✲t✉♣❧❡ ✐s ✉s❡❞✱ ❛s ✐s ✉s✉❛❧✿ ❙♦✉r❝❡ ■P✱ ❉❡st✐♥❛t✐♦♥ ■P✱ ❙♦✉r❝❡ P♦rt✱❉❡st✐♥❛t✐♦♥ P♦rt ❛♥❞ Pr♦t♦❝♦❧✳
❋✐♥❞✐♥❣ ❛ ❣♦♦❞ ❧♦❣✐❝ ❜❡❤✐♥❞ ✢♦✇ ❛ss✐❣♥❛t✐♦♥ ✇❛s r❡❧❛t✐✈❡❧② tr✐❝❦②✱ s✐♥❝❡ t❤✐s ♣❛rt ✇❛ss✐❣♥✐✜❝❛♥t❧② t✐♠❡ ❝♦♥s✉♠✐♥❣✳ ❚❤❡ ✜rst ✐❞❡❛ ✇❛s t♦ ✉s❡ ❛ ❞♦✉❜❧❡ ❧♦♦♣ str✉❝t✉r❡✱ ✐♥✇❤✐❝❤ t❤❡ ✜rst ♣❛❝❦❡t ✇❛s ❛ss✐❣♥❡❞ t♦ ❛ ♥❡✇ ❧✐st ❛♥❞ t❤❛t ✇❛s ❝♦♠♣❛r❡❞ ✇✐t❤ ❛❧❧ t❤❡♦t❤❡r ❡♥tr✐❡s ✐♥ t❤❡ ✳❝s✈ ✜❧❡✱ ✐♥ ♦r❞❡r t♦ ✜♥❞ ❛ ♠❛t❝❤✳ ❲❤❡♥ t❤❡ ♠❛t❝❤ ❜❡t✇❡❡♥ ♣❛❝❦❡ts✺✲t✉♣❧❡ ✇❛s ❢♦✉♥❞✱ t❤❡ ✢♦✇ ❢❡❛t✉r❡s ❧✐st ✭♣❛❝❦❡t ❧❡♥❣t❤✱ t✐♠❡st❛♠♣✮ ✇❛s ✉♣❞❛t❡❞ ✇✐t❤❛ ♥❡✇ ✈❛❧✉❡ ❛♥❞ ❛♥♦t❤❡r ❢❡❛t✉r❡✱ ✢♦✇ ❞✐r❡❝t✐♦♥✱ ✇❛s ❛❞❞❡❞✳ ❙✐♥❝❡ t❤❡ ✳❝s✈ ✜❧❡s ❛r❡❡♥♦r♠♦✉s✱ ✇✐t❤ ❛r♦✉♥❞ ✷ ♠✐❧❧✐♦♥ ❡♥tr✐❡s✱ t❤✐s ♣r♦❝❡ss ✇❛s ♥♦t t✐♠❡ ❡✣❝✐❡♥t ❛♥❞ ✇❡♥❡❡❞❡❞ t♦ ✜♥❞ ❛♥♦t❤❡r s♦❧✉t✐♦♥ ❢♦r t❤✐s ♣r♦❜❧❡♠✳❚❤❡ s♦❧✉t✐♦♥ ❝❛♠❡ ✐♥ t❤❡ ❢♦r♠ ♦❢ P②t❤♦♥ ❢✉♥❝t✐♦♥ ❞✐❝t✐♦♥❛r②✳ ❚❤❡ ✺✲t✉♣❧❡ ✇❛s ✉s❡❞ ❛s❞✐❝t✐♦♥❛r② ❦❡②✱ ❛♥❞ t✇♦ ❢❡❛t✉r❡s✭♣❛❝❦❡t ❧❡♥❣t❤ ❛♥❞ t✐♠❡st❛♠♣✮ ✇❡r❡ ✉s❡❞ ❛s ❞✐❝t✐♦♥❛r②✈❛❧✉❡s✳ ❚❤✐s ❞❡❝r❡❛s❡❞ t❤❡ t✐♠❡ ♦❢ ♣r♦❝❡ss✐♥❣ ❜❡❝❛✉s❡ t❤❡ s❝r✐♣t ❞✐❞ ♥♦t ♥❡❡❞ t♦ ✐t❡r❛t❡t❤r♦✉❣❤ t❤❡ ✇❤♦❧❡ ❞❛t❛ ✜❧❡✳ ■t ♦♥❧② ♥❡❡❞❡❞ t♦ ❝❤❡❝❦ t❤❡ ✉♥✐q✉❡ ✺✲t✉♣❧❡ ♣❛✐rs✱ ✇❤✐❝❤✇❡r❡ ♥♦t ♠♦r❡ t❤❡♥ ✸✵✱✵✵✵ ♣❡r ❞❛t❛ ✜❧❡✳ ❲❤❡♥ t❤❡ ✺✲t✉♣❧❡ ♠❛t❝❤✱ t❤❡ ❞✐❝t✐♦♥❛r②✈❛❧✉❡s ❛r❡ ✉♣❞❛t❡❞ ✇✐t❤ ♣❛❝❦❡t ❧❡♥❣t❤✱ t✐♠❡st❛♠♣✱ ❛♥❞ ✢♦✇ ❞✐r❡❝t✐♦♥✳ ❋❧♦✇ ❞✐r❡❝t✐♦♥✇❛s ❣❡♥❡r❛t❡❞ ❛❝❝♦r❞✐♥❣ t♦ ❛ s♦✉r❝❡✲❞❡st✐♥❛t✐♦♥ r❡❧❛t✐♦♥✱ ♥❛♠❡❧②✱ ✐❢ ♣❛❝❦❡t ❣♦❡s ❢r♦♠s♦✉r❝❡ t♦ ❞❡st✐♥❛t✐♦♥✱ ♥✉♠❜❡r ✶ ✐s ❛ss✐❣♥❡❞✱ ❛♥❞ ✐❢ ♣❛❝❦❡t ❣♦❡s ♦t❤❡r ✇❛② ✭❞❡st✐♥❛t✐♦♥t♦ s♦✉r❝❡✮✱ ✲✶ ✐s ❛ss✐❣♥❡❞✳ ❋❡❛t✉r❡ ✈❡❝t♦r ✇❛s ❝r❡❛t❡❞ ♣❡r ♣❛❝❦❡t ❛♥❞ ✐t ❝♦♥t❛✐♥❡❞♣❛❝❦❡t ❧❡♥❣t❤✱ t✐♠❡st❛♠♣ ❛♥❞ ❞✐r❡❝t✐♦♥ ♦❢ ♣❛❝❦❡t✳ ❆❢t❡r ✢♦✇ ♣r♦❝❡ss✐♥❣✱ t❤❡ ❞✐❝t✐♦♥❛r②✈❛❧✉❡s ✭❧✐st ♦❢ ✢♦✇ ✈❡❝t♦rs✮ ❤❛❞ ❛ ✸✲❞✐♠❡♥s✐♦♥❛❧ ❧✐st str✉❝t✉r❡ ✇❤✐❝❤ ❝♦rr❡s♣♦♥❞❡❞ t♦❛ t❡♥s♦r✳ ❚❤✐s ❦✐♥❞ ♦❢ ♦✉t♣✉t ✇❛s t❤❡ ♠♦st s✉✐t❛❜❧❡ ♦♥❡ ❢♦r ❚❡♥s♦r❋❧♦✇✱ ❛ ♠❛❝❤✐♥❡❧❡❛r♥✐♥❣ ❢r❛♠❡✇♦r❦✱ ✇❤✐❝❤ ✇✐❧❧ ❜❡ ❡①♣❧❛✐♥❡❞ ✐♥ t❤❡ ♥❡①t ❝❤❛♣t❡r✳ ❚❤❡ ✢♦✇s ✇❡r❡❡①♣♦rt❡❞ ❛s ❛ ❞✐❝t✐♦♥❛r② ✜❧❡ ❛♥❞ ❤❛♥❞❡❞ t♦ t❤❡ ♥❡①t st❡♣✳
❚❤❡ ❢♦✉rt❤ st❡♣ ♦❢ ♣r❡♣r♦❝❡ss✐♥❣ ✇❛s ❧❛❜❡❧❧✐♥❣✳ ❚❤❡ ❞❛t❛ s❡t t❤❛t ✇❡ ✉s❡❞ ✐s ♥♦t❞✐r❡❝t❧② ❧❛❜❡❧❧❡❞✳ ❚❤❡ s❡t ✇❛s ❝♦♠✐♥❣ ✇✐t❤ ❛ s❡♣❛r❛t❡ ●r♦✉♥❞ ❚r✉t❤✭●❚✮✳❝s✈ ✜❧❡ ✇❤✐❝❤❝♦♥t❛✐♥❡❞ ❛ ❧✐st ♦❢ ❛tt❛❝❦s✳ ❚❤❡ ●❚ ✜❧❡ ❝♦♥t❛✐♥❡❞✿ t❤❡ s♦✉r❝❡ ■P✱ ❞❡st✐♥❛t✐♦♥ ■P✱ s♦✉r❝❡♣♦rt✱ ❞❡st✐♥❛t✐♦♥ ♣♦rt✱ ♣r♦t♦❝♦❧✱ st❛rt✐♥❣ t✐♠❡✱ ✜♥✐s❤✐♥❣ t✐♠❡✱ ❛tt❛❝❦ ♥❛♠❡✱ ❛tt❛❝❦❞❡s❝r✐♣t✐♦♥✳❲❡ ❞❡✈❡❧♦♣❡❞ ❛ P②t❤♦♥ s❝r✐♣t ✇❤✐❝❤ ❝♦♠♣❛r❡❞ ●❚ ✜❧❡ ❡♥tr✐❡s ✇✐t❤ ❛ r❡❝❡♥t❧② ❝r❡❛t❡❞tr❛✣❝ ✢♦✇ ❞✐❝t✐♦♥❛r②✳ ❙✐♥❝❡ ✇❡ ❛❧r❡❛❞② ❤❛❞ ♣r♦❜❧❡♠s ✇✐t❤ t✐♠❡ ❝♦♥s✉♠♣t✐♦♥ ❞✉❡ t♦t❤❡ ♠✉❧t✐♣❧❡ ✐t❡r❛t✐♦♥s✱ ✇❡ ❞❡❝✐❞❡❞ t♦ ✉s❡ ❛❣❛✐♥ t❤❡ ❞✐❝t✐♦♥❛r② ❧♦❣✐❝ ❛❣❛✐♥✳ ❋✐rst❧②✱ t❤❡●❚ ✜❧❡ ✇❛s ❝♦♥✈❡rt❡❞ t♦ ❛ ❞✐❝t✐♦♥❛r②✱ ✇✐t❤ t❤❡ ✺✲t✉♣❧❡ ❛s t❤❡ ❞✐❝t✐♦♥❛r② ❦❡② ❛♥❞ t❤❡
✸✾
![Page 47: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/47.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
✹✳✸ ❚r❛✐♥✐♥❣ ✹ ❘❊❙❊❆❘❈❍ ▼❊❚❍❖❉❖▲❖●❨ ❆◆❉ ❊❳P❊❘■▼❊◆❚
❛tt❛❝❦ ❢❡❛t✉r❡s ✭st❛rt✐♥❣ t✐♠❡✱ ✜♥✐s❤✐♥❣ t✐♠❡✮ ❛s t❤❡ ❞✐❝t✐♦♥❛r② ✈❛❧✉❡✳ ❚❤❡ s❝r✐♣t ✇❛s✐t❡r❛t❡❞ t❤r♦✉❣❤ t❤❡ ✢♦✇ ❞✐❝t✐♦♥❛r② ❛♥❞ ●❚ ❞✐❝t✐♦♥❛r② ✐♥ ♦r❞❡r t♦ ✜♥❞ t❤❡ ♠❛t❝❤✳❲❤❡♥ t❤❡ ♠❛t❝❤ ✇❛s ❢♦✉♥❞✱ ❛♥♦t❤❡r ✐t❡r❛t✐♦♥ ✇❛s ♣❡r❢♦r♠❡❞ t❤r♦✉❣❤ t❤❡ ●❚ ✈❛❧✉❡s✐♥ ♦r❞❡r t♦ ✜♥❞ ✇❤❡t❤❡r t❤❡ t✐♠❡ ♦❢ t❤❡ ❛tt❛❝❦ ❛❧s♦ ♠❛t❝❤❡❞✳ ■❢ t❤❡ t✐♠❡ ♠❛t❝❤❡❞✱ t❤❡✢♦✇ ❞✐❝t✐♦♥❛r② ✈❛❧✉❡s ✇❡r❡ ✉♣❞❛t❡❞ ✇✐t❤ t❤❡ ♥❡✇ ✈❛❧✉❡ ✶✳ ■❢ t❤❡ t✇♦ ❡♥tr✐❡s ✐♥ t❤❡ ✢♦✇❛♥❞ ●❚ ❞✐❝t✐♦♥❛r✐❡s ❞✐❞ ♥♦t ♠❛t❝❤✱ t❤❡ ✢♦✇ ❞✐❝t✐♦♥❛r② ✈❛❧✉❡ ✇❛s ✉♣❞❛t❡❞ ✇✐t❤ ✵✳❚❤❡ ❧❛st st❡♣ ♦❢ t❤❡ ♣r❡♣r♦❝❡ss✐♥❣ ♣❤❛s❡ ✇❛s ❝❛❧❝✉❧❛t✐♥❣ t❤❡ t✐♠❡ ❜❡t✇❡❡♥ t❤❡ ♣❛❝❦❡ts❛♥❞ ❡①♣♦rt✐♥❣ t❤❡ ❞❛t❛ s❡t ✐♥t♦ ❛ ✳❝s✈ ✜❧❡✳ ❚❤❡ ❝❛❧❝✉❧❛t✐♦♥ ✇❛s ❞♦♥❡ ❜② s✉❜tr❛❝t✐♥❣ t❤❡t✐♠❡st❛♠♣ ♦❢ t❤❡ t✇♦ s✉❜s❡q✉❡♥t ♣❛❝❦❡ts✳ ❚❤✐s ✇❛s ✈❡r② ✉s❡❢✉❧ t♦ ✉s ❜❡❝❛✉s❡ ✐t ❝♦✉❧❞❤❡❧♣ ✉s r❡❝♦❣♥✐③❡ ❛ ♣r♦t♦❝♦❧ ❝♦♥♥❡❝t✐♦♥ ♣❛tt❡r♥ ✐♥ ♥❡t✇♦r❦ tr❛✣❝✳ ❚❤❡ ✐❞❡❛ ❝❛♠❡❢r♦♠ ❧❛♥❣✉❛❣❡ ♣r♦❝❡ss✐♥❣✱ ✇❤✐❝❤ ✇❛s t❤❡ ♠❛✐♥ str❡♥❣t❤ ♦❢ ♥❡✉r❛❧ ♥❡t✇♦r❦ ♠❛❝❤✐♥❡❧❡❛r♥✐♥❣✳ ■♥ ❧❛♥❣✉❛❣❡ ♣r♦❝❡ss✐♥❣✱ t❤❡ ♥❡①t ✇♦r❞ ✐♥ ❛ s❡♥t❡♥❝❡ ♦r t❤❡ ♥❡①t ❝❤❛r❛❝t❡r ✐♥✇♦r❞ ❞❡♣❡♥❞s t❤❡ ♠♦st ♦♥ t❤❡ ❧❛st ✇♦r❞ ♦r ❝❤❛r❛❝t❡r✳ ❆ ♠♦❞❡❧ ❧❡❛r♥s ❞❡♣❡♥❞❡♥❝✐❡s❜❡t✇❡❡♥ ✈❛r✐♦✉s ✇♦r❞s ❛♥❞ ❝❤❛r❛❝t❡rs ❛♥❞ tr✐❡s t♦ r❡❝♦❣♥✐③❡ s♦♠❡ ♣❛tt❡r♥ ❤♦✇ t❤❡s❡♥t❡♥❝❡ ✐s ❢♦r♠❡❞✳ ❆s t❤✐s ✇♦r❦❡❞ ✈❡r② ✇❡❧❧ ♦♥ ❧❛♥❣✉❛❣❡ ♣r♦❝❡ss✐♥❣✱ ✇❡ ❞❡❝✐❞❡❞ t♦❛♣♣❧② t❤✐s ♣r✐♥❝✐♣❧❡ t♦ ♦✉r ❡①♣❡r✐♠❡♥t✳ ❲❡ ✜♥❞ t❤❛t t❤❡ ♥❡t✇♦r❦ tr❛✣❝ ✭❛s ✇❡❧❧ ❛s♠❛❧✐❝✐♦✉s ❛tt❛❝❦s✮ ❤❛s s✐♠✐❧❛r str✉❝t✉r❡ ❛s ❧❛♥❣✉❛❣❡ s❡♥t❡♥❝❡✱ ❜❡❝❛✉s❡ ✐t ❛❧s♦ ❢♦❧❧♦✇ss♦♠❡ ♣❛tt❡rs✳ ❚❤❡ ❢♦❧❧♦✇✐♥❣ ❡①♣❡r✐♠❡♥t s❤♦✇❡❞ t❤❛t t❤✐s ✇❛s ❛ ❣♦♦❞ ✐❞❡❛✳❆❢t❡r t❤❡ t✐♠❡ ❝❛❧❝✉❧❛t✐♦♥✱ t❤❡ ❞❛t❛ s❡t ✇❛s ❡①♣♦rt❡❞ t♦ ❛ ✳❝s✈ ✜❧❡ ❛♥❞ t❤❡ tr❛✐♥✐♥❣♣❤❛s❡ ❝♦✉❧❞ ❜❡❣✐♥✳
✹✳✸ ❚r❛✐♥✐♥❣
❆❢t❡r t❤❡ ♣r❡♣r♦❝❡ss✐♥❣ ♣❤❛s❡✱ t❤❡ ❞❛t❛ ✇❛s ❢❡❞ t♦ t❤❡ tr❛✐♥✐♥❣ ♣❤❛s❡✱ ✐♥ ✇❤✐❝❤ ✇❡❞❡✈❡❧♦♣❡❞ t❤❡ ♠♦❞❡❧ ❜② ✉s✐♥❣ ❚❡♥s♦r❋❧♦✇✳ ❲❡ ✉s❡❞ t❤✐s ♠♦❞❡❧ t♦ ❧❡❛r♥ ❢r♦♠ t❤❡ ❞❛t❛t♦ ❞✐st✐♥❣✉✐s❤ ♥♦r♠❛❧ ❢r♦♠ ♠❛❧✐❝✐♦✉s tr❛✣❝✳
✹✳✸✳✶ ❚r❛✐♥✐♥❣ t❤❡ ♠♦❞❡❧
❚❤❡ ✜rst st❡♣ ✐♥ tr❛✐♥✐♥❣ t❤❡ ♠♦❞❡❧ ✇❛s t♦ ♣r❡♣❛r❡ t❤❡ ✐♥♣✉t ❞❛t❛ t♦ ❜❡ s✉✐t❛❜❧❡ ❢♦r❚❡♥s♦r❋❧♦✇✳❚❤❡ ✐♥♣✉t ❞❛t❛ ✇❛s ❞✐✈✐❞❡❞ ✐♥t♦ ①❴❞❛t❛✱ ✇❤✐❝❤ ❝♦♥t❛✐♥❡❞ ❛❧❧ t❤❡ ✈❛❧✉❡s ❛♥❞ ❢❡❛t✉r❡s♦❢ tr❛✣❝✱ ❛♥❞ ②❴❧❛❜❡❧✱ ✇❤✐❝❤ ❝♦♥t❛✐♥❡❞ t❤❡ ❧❛❜❡❧s ♦❢ ❛tt❛❝❦ ♦r ♥♦♥✲❛tt❛❝❦ tr❛✣❝✳❚❤❡ r❡❧❛t✐♦♥ ❜❡t✇❡❡♥ tr❛✣❝ ❢❡❛t✉r❡s ❛♥❞ ❧❛❜❡❧s ✇❡r❡ ❜❛s❡❞ ♦♥ ✐♥st❛♥❝❡ ♥✉♠❜❡r✳ ❲❡st❛rt❡❞ ✇✐t❤ s♣❧✐tt✐♥❣ t❤❡ ✐♥♣✉t ❞❛t❛ t♦ t❤❡ tr❛✐♥ s❡t ❛♥❞ t❡st s❡t✳ ❚❤❡ tr❛✐♥ s❡t ❝♦♥t❛✐♥s✽✵✪ ♦❢ t❤❡ ✐♥♣✉t ❞❛t❛✱ ❛♥❞ t❡st s❡t ❝♦♥t❛✐♥❡❞ t❤❡ r❡♠❛✐♥✐♥❣ ✷✵✪✳ ❉✉r✐♥❣ t❤❡ s♣❧✐tt✐♥❣✱❛❞❞✐t✐♦♥❛❧ s❤✉✤✐♥❣ ♦❢ t❤❡ ✢♦✇s ✇❛s ✉s❡❞ t♦ ✉♥❞❡r♠✐♥❡ t❤❡ ♣♦ss✐❜✐❧✐t② ♦❢ s♦♠❡ ❝♦♥♥❡❝✲t✐♦♥ ❜❡t✇❡❡♥ t❤❡ s✉❜s❡q✉❡♥t ✢♦✇s✳ ◆❡❝❡ss✐t② ❢♦r s❤✉✤✐♥❣ ❝♦♠❡s ❢r♦♠ t❤❡ ❢❛❝t t❤❛tt❤❡ ✉s❡❞ ❞❛t❛ s❡t ✇❛s ❣❡♥❡r❛t❡ ✐♥ ❧❛❜♦r❛t♦r②✱ s♦✱ ❢r♦♠ ♦✉r ♣♦✐♥t ♦❢ ✈✐❡✇✱ ✐t ✐s ❧❛❝❦✐♥❣t❤❡ r❛♥❞♦♠♥❡ss ✐♥ tr❛✣❝ ❣❡♥❡r❛t✐♦♥✳ ❉✉r✐♥❣ ❛ ❧❡❛r♥✐♥❣ ♣r♦❝❡ss✱ t❤❡r❡ ✐s ❛ ♣♦ss✐❜✐❧✐t②❢♦r ♠♦❞❡❧ t♦ r❡❝♦❣♥✐③❡ s♦♠❡ ♣❛tt❡r♥ ♦❢ ❣❡♥❡r❛t✐♥❣ t❤❡ ❛tt❛❝❦s✱ ❢♦r ❡①❛♠♣❧❡✳
✹✵
![Page 48: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/48.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
✹✳✸ ❚r❛✐♥✐♥❣ ✹ ❘❊❙❊❆❘❈❍ ▼❊❚❍❖❉❖▲❖●❨ ❆◆❉ ❊❳P❊❘■▼❊◆❚
❚❤❡ ❞❛t❛ s❡t ❛♥❞ ✐ts ❝♦♠♣♦♥❡♥t s✐③❡ ❛r❡ ❞❡s❝r✐❜❡❞ ✐♥ ❚❛❜❧❡ ✷
❉❛t❛s❡t s✐③❡ ❚r❛✐♥✐♥❣ ❞❛t❛ ❚❡st ❉❛t❛✶✱✽✵✻✱✹✻✽ ✶✱✹✹✺✱✶✼✹ ✸✻✶✱✷✾✹
❚❛❜❧❡ ✷✿ ❉❛t❛ s❡t
❚❤❡ ♥❡①t st❡♣ ✇❛s t♦ ❝r❡❛t❡ ❛ s✉✐t❛❜❧❡ ♠♦❞❡❧ ❢♦r ❧❡❛r♥✐♥❣✳ ❉✐✛❡r❡♥t ♠♦❞❡❧s ✇❡r❡❝r❡❛t❡❞ t♦ t❡st ❞✐✛❡r❡♥t ♣♦ss✐❜✐❧✐t✐❡s ♦❢ ❞❡❡♣ ❧❡❛r♥✐♥❣ ✇✐t❤✐♥ ❚❡♥s♦r❋❧♦✇✭t❛❜❧❡ ♣r♦✈✐❞❡❞✐♥ ❆♣♣❡♥❞✐①✮✿
✶✳ ❇❛s✐❝ ▲❙❚▼ ♠♦❞❡❧ ✭❇▲❙❚▼✮ ✲ ✇❡ s❡❧❡❝t❡❞ t❤✐s ♠♦❞❡❧ ❜❡❝❛✉s❡ ✐t ✇❛s s✐♠✲♣❧❡ ❛♥❞ ❢❛st✱ ❛♥❞ t❤❡r❡❢♦r❡ s✉✐t❛❜❧❡ ❢♦r t❡st✐♥❣ ❞✐✛❡r❡♥t ♣❛r❛♠❡t❡rs✳ ❉✉r✐♥❣ t❤❡t❡st✐♥❣ ✇❡ tr❛✐♥❡❞ t❤✐s ♠♦❞❡❧ ✇✐t❤ ❢♦❧❧♦✇✐♥❣ ♣❛r❛♠❡t❡rs✿
❼ ✶✱✸ ❛♥❞ ✺ ❧❛②❡rs ♦❢ ❜❛s✐❝ ▲❙❚▼
❼ ❞✐✛❡r❡♥t ❝❡❧❧ ♥✉♠❜❡rs ✐♥ ❧❛②❡r
❼ ❞✐✛❡r❡♥t ❧❡❛r♥✐♥❣ r❛t❡s
❼ ❞✐✛❡r❡♥t ♠❛①✐♠✉♠ ❜❛t❝❤ s✐③❡s
✷✳ ❇❛t❝❤ ◆♦r♠❛❧✐③❛t✐♦♥ ▲❙❚▼ ♠♦❞❡❧ ✭❇◆▲❙❚▼✮ ✲ t❤✐s ♠♦❞❡❧ ✇❛s s❡❧❡❝t❡❞❜❡❝❛✉s❡✱ ❛s ❡①♣❧❛✐♥❡❞ ✐♥ ❢♦❧❧♦✇✐♥❣ ♣❛r❛❣r❛♣❤✱ t❤❡ ❜❛t❝❤ tr❛✐♥✐♥❣ ✐s ✉s❡❞✱ s♦ t❤✐s✇❛s ❧♦❣✐❝ st❡♣ ❢♦r✇❛r❞ ✐♥ t❡r♠s ♦❢ ✐♠♣r♦✈❡♠❡♥t ♦❢ ✶✳♠♦❞❡❧✳ ❲❡ ❛r❡ ❡①♣❡❝t✐♥❣s♦♠❡ ✐♠♣r♦✈❡♠❡♥ts ✐♥ ♣❡r❢♦r♠❛♥❝❡ ✉s✐♥❣ t❤✐s ♠♦❞❡❧✳ ❚❡st❡❞ ♣❛r❛♠❡t❡rs✿
❼ ✶ ❛♥❞ ✸ ❧❛②❡rs ♦❢ ❜❛s✐❝ ▲❙❚▼
❼ ❜❛t❝❤ ♥♦r♠❛❧✐③❛t✐♦♥ ❧❛②❡r
✸✳ ▲❛②❡r ◆♦r♠❛❧✐③❛t✐♦♥ ▲❙❚▼ ♠♦❞❡❧ ✭▲◆▲❙❚▼✮ ✲ t❤✐s ♠♦❞❡❧ ✇❛s s❡❧❡❝t❡❞ t♦t❡st ❛♥♦t❤❡r s✐♠✐❧❛r ♥♦r♠❛❧✐③❛t✐♦♥ ♠❡t❤♦❞✳ ❚❤✐s ♠❡t❤♦❞ ✐s ♠♦r❡ ❝♦♠♣❧❡① t❤❡♥❜❛t❝❤ ♥♦r♠❛❧✐③❛t✐♦♥ s♦ ✇❡ ❛r❡ ❡①♣❡❝t✐♥❣ s♦♠❡ ✐♠♣r♦✈❡♠❡♥t✱ ✇✐t❤ ✐♥❝r❡❛s❡ ✐♥tr❛✐♥✐♥❣ t✐♠❡ ❝♦♠♣❛r❡❞ t♦ ✷✳♠♦❞❡❧✳ ❚❡st❡❞ ♣❛r❛♠❡t❡s✿
❼ ✶ ❛♥❞ ✸ ❧❛②❡rs ♦❢ ❜❛s✐❝ ▲❙❚▼
✹✳ ●❛t❡❞ ❘❡❝✉rr❡♥t ◆❡t✇♦r❦ ♠♦❞❡❧ ✭●❘❯✮ t❤✐s ♠♦❞❡❧ ✇❛s s❡❧❡❝t❡❞ ❜❡❝❛✉s❡ t❤❡❝❡❧❧ str✉❝t✉r❡ ✐s s✐♠✐❧❛r ❛s ▲❙❚▼ ❝❡❧❧ ✐♥ ✶✳♠♦❞❡❧✱ s♦ ✐t ✐s s✉✐t❛❜❧❡ ❢♦r ❝♦♠♣❛r✐s♦♥✇✐t❤ t❤✐s ♠♦❞❡❧✳ ❆❝❝♦r❞✐♥❣ t♦ ❬✹✶❪✱ t❤❡r❡ ✐s s♦♠❡ ✐♠♣r♦✈❡♠❡♥t ✐♥ tr❛✐♥✐♥❣ t✐♠❡❛♥❞ ♣❡r❢♦r♠❛♥❝❡ ❡①♣❡❝t❡❞✳ ❚❡st❡❞ ♣❛r❛♠❡t❡rs✿
✹✶
![Page 49: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/49.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
✹✳✸ ❚r❛✐♥✐♥❣ ✹ ❘❊❙❊❆❘❈❍ ▼❊❚❍❖❉❖▲❖●❨ ❆◆❉ ❊❳P❊❘■▼❊◆❚
❼ ✶ ❛♥❞ ✸ ❜❛s✐❝ ●❘❯ ❝❡❧❧s
❚❤❡r❡ ❛r❡ ❞✐✛❡r❡♥t ✈✐❡✇s ♦♥ ❤♦✇ t♦ ❢❡❡❞ ❞❛t❛ ✐♥t♦ ❛ ♠♦❞❡❧✳ ❚❤❡ s✐♠♣❧❡st ✇❛②✐s t♦ ❢❡❡❞ s✐♥❣❧❡ ✈❛❧✉❡s t♦ t❤❡ ♠♦❞❡❧✳ ❚❤✐s ♠❡t❤♦❞ r❡q✉✐r❡s ♠✉❝❤ ♠♦r❡ t✐♠❡ ❛♥❞❡✛♦rt✳ ❆ ❜❡tt❡r s♦❧✉t✐♦♥ ❧✐❡s ❜❡❤✐♥❞ t❤❡ t❡r♠ ❜❛t❝❤ tr❛✐♥✐♥❣✳ ■t r❡♣r❡s❡♥ts t❤❡❞✐✈✐s✐♦♥ ♦❢ ❞❛t❛ ✐♥t♦ s♠❛❧❧ s❡ts ❛♥❞ ❢❡❡❞✐♥❣ s♠❛❧❧ s❡ts t♦ t❤❡ ♠♦❞❡❧✳ ❆♥ ✐♠♣♦rt❛♥t♣❛r❛♠❡t❡r ✇❤✐❝❤ ❝♦✉❧❞ ❤❛✈❡ ♠♦r❡ ✐♠♣❛❝t ♦♥ t❤❡ ❧❡❛r♥✐♥❣ ♣r♦❝❡ss ✐s t❤❡ ❜❛t❝❤ s✐③❡✳❆ ❜✐❣❣❡r s✐③❡ ♦❢ t❤❡ ❜❛t❝❤ tr❛✐♥✐♥❣ ✐s t✐♠❡ ❡✣❝✐❡♥t✱ ❜✉t t❤❡r❡ ✐s ❛ ♣♦ss✐❜✐❧✐t② ♦❢♦✈❡rs❤♦♦t✐♥❣ ♦r ✉♥❞❡rs❤♦♦t✐♥❣✳ ❚❤❡ ✜rst ✐❞❡❛ ✇❛s t♦ ✉s❡ ❛ ✜①❡❞ ❜❛t❝❤ ❧❡♥❣t❤✱ ❜✉t ✐t❝r❡❛t❡❞ ♠❛♥② q✉❡st✐♦♥s r❡❣❛r❞✐♥❣ t❤❡ ❧❡❛r♥✐♥❣ ♣r♦❝❡ss✳ ■t r❡q✉✐r❡❞ ♣❛❞❞✐♥❣ ✐❢ t❤❡r❡❛r❡ ♥♦t ❡♥♦✉❣❤ ❡♥tr✐❡s ✐♥ t❤❡ ❞❛t❛ s❡t✱ ✇❤✐❝❤ ❝♦✉❧❞ ♣r♦❜❛❜❧② ❝♦♥❢✉s❡ t❤❡ tr❛✐♥✐♥❣ ♠♦❞❡❧✳
❋✐❣✉r❡ ✷✻✿ ❇❛t❝❤ ❚r❛✐♥✐♥❣ ❡①❛♠♣❧❡ ✲ ❞✐✛❡r❡♥t ❝♦❧♦r r❡❝t❛♥❣❧❡s r❡♣r❡s❡♥t ✈❛r✐❛❜❧❡ s✐③❡❜❛t❝❤❡s✳ ■♥s✐❞❡ t❤❡ ❜❛t❝❤❡s✱ ✢♦✇s r❡♣r❡s❡♥t❡❞ ❜② t❤❡✐r ❢❡❛t✉r❡ ✈❡❝t♦rs ❛r❡ s❤♦✇♥ ✇✐t❤❞✐✛❡r❡♥t ❝♦❧♦rs✳
❆ ♣♦ss✐❜❧❡ s♦❧✉t✐♦♥ t♦ t❤❡ ♣r♦❜❧❡♠✱ ✇❛s t♦ ❞✐✈✐❞❡ t❤❡ ❞❛t❛ ✐♥ t❤❡ ✈❛r✐❛❜❧❡ ❜❛t❝❤❡s✇✐t❤ t❤❡ ✢♦✇ ❧❡♥❣t❤ ❛s ❛ ♣❛r❛♠❡t❡r ❢♦r t❤✐s ❞✐✈✐s✐♦♥✳ ■♥ t❤✐s ✇❛②✱ t❤❡ ✢♦✇s ✇✐t❤ s❛♠❡❝❤❛r❛❝t❡r✐st✐❝s ✇♦✉❧❞ ❜❡ ❢❡❞ ✐♥t♦ t❤❡ ♠♦❞❡❧ ❛t t❤❡ s❛♠❡ t✐♠❡✱ ✇❤✐❝❤ ✇♦✉❧❞✱ ❜② ♦✉r♦♣✐♥✐♦♥✱ ✐♠♣r♦✈❡ t❤❡ ❧❡❛r♥✐♥❣ ♣r♦❝❡ss✳■t ✐s ✐♠♣♦rt❛♥t t♦ ♣♦✐♥t ♦✉t t❤❛t✱ r❡❣❛r❞✐♥❣ t❤❡ ✈❛r✐❛❜❧❡ ❜❛t❝❤ tr❛✐♥✐♥❣✱ ✇❡ ❤❛✈❡ ✐♥tr♦✲❞✉❝❡❞ ❛♥♦t❤❡r ♣❛r❛♠❡t❡r✱ ❝❛❧❧❡❞ ▼❛①✐♠✉♠ ❇❛t❝❤ ❙✐③❡✳ ❆s t❤❡r❡ ✐s ❛ ❧♦t ♦❢ ♥♦r♠❛❧tr❛✣❝ ✇✐t❤ t❤❡ s❛♠❡ ✢♦✇ ❧❡♥❣t❤✱ t❤✐s ❝♦✉❧❞ r❡s✉❧t ✐♥ ❝♦♥s✉♠♣t✐♦♥ ♦❢ t❤❡ ❡♥t✐r❡ ❘❆▼❛♥❞ ❝r❛s❤✐♥❣ t❤❡ ♠♦❞❡❧✳ ❚❤❡ ✈❛❧✉❡ t❤❛t ✇❡ ❛r❡ ✉s❡❞ ✇❛s ✶✵✷✹ ❛♥❞ ✐t ❝❛♠❡ ❢r♦♠ tr✐❛❧❛♥❞ ❡rr♦r ❡①♣❡r✐♠❡♥ts✳ ❚❤✐s ✈❛❧✉❡ ✇❛s ❛ ♣❡r❢❡❝t ❝♦♠❜✐♥❛t✐♦♥ ♦❢ t✐♠❡ ❝♦♥s✉♠♣t✐♦♥ ❛♥❞♠♦❞❡❧ ❛❝❝✉r❛❝② ♣❡r❢♦r♠❛♥❝❡✳
✹✷
![Page 50: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/50.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
✹✳✹ ❊✈❛❧✉❛t✐♦♥ ✹ ❘❊❙❊❆❘❈❍ ▼❊❚❍❖❉❖▲❖●❨ ❆◆❉ ❊❳P❊❘■▼❊◆❚
✹✳✹ ❊✈❛❧✉❛t✐♦♥
❆❢t❡r t❤❡ ◆◆ tr❛✐♥✐♥❣✱ ✇❡ ♠♦✈❡ t♦ t❤❡ ❡✈❛❧✉❛t✐♦♥✱ ✇❤❡r❡ ✇❡ ✉s❡ ❞✐✛❡r❡♥t ♠❡t❤♦❞s t♦♠❡❛s✉r❡ t❤❡ ♣❡r❢♦r♠❛♥❝❡ ♦❢ ♦✉r ♠♦❞❡❧✳ ❚❤✐s ♣r♦❝❡ss ❣✐✈❡s ✉s ✉s❡❢✉❧ ✐♥❢♦r♠❛t✐♦♥ ❛❜♦✉tt❤❡ ♣❡r❢♦r♠❛♥❝❡ ♦❢ ♦✉r ♠♦❞❡❧s ♦♥ ✉♥s❡❡♥ ❞❛t❛✳■t ❛❧s♦ ❣✐✈❡s ✉s ❛ str♦♥❣ ✐♥❞✐❝❛t✐♦♥ ❛❜♦✉t✇❤✐❝❤ ♣❛rt ♦❢ t❤❡ ♠♦❞❡❧ ❝♦✉❧❞ ❜❡ ✐♠♣r♦✈❡❞✱ ❛♥❞ ✉♣ t♦ ✇❤❛t ❡①t❡♥t t❤❡ ✐♠♣r♦✈❡♠❡♥ts❤♦✉❧❞ ❜❡ ✐♠♣❧❡♠❡♥t❡❞✳❋♦r t❤❡ ❡✈❛❧✉❛t✐♦♥✱ ✇❡ ✉s✉❛❧❧② s♣❧✐t t❤❡ ❞❛t❛ ✐♥t♦ ✷ ♣❛rts✿ t❤❡ tr❛✐♥✐♥❣ s❡t ❛♥❞ t❡st s❡t✳❚❤❡ tr❛✐♥✐♥❣ s❡t ✐s ✉s❡❞ ✐♥ t❤❡ tr❛✐♥✐♥❣ ♣r♦❝❡ss✱ ✐♥ ✇❤✐❝❤ t❤❡ ♠♦❞❡❧ ✉s❡s t❤❡ ❛❧r❡❛❞②❡①♣❧❛✐♥❡❞ ♠❡t❤♦❞s t♦ ❧❡❛r♥ t❤❡ ❞❛t❛ ❢❡❛t✉r❡s ❛♥❞ str✉❝t✉r❡ ❜② ❛❞❥✉st✐♥❣ t❤❡ ✇❡✐❣❤ts❛♥❞ ❜✐❛s❡s✳ ❚❤✐s s❡t s❤♦✉❧❞ ❜❡ ❛s ❧❛r❣❡ ❛s ♣♦ss✐❜❧❡ ❛♥❞ ✐t ✉s✉❛❧❧② t❛❦❡s ♠♦r❡ t❤❛♥ ✽✵✪♦❢ t❤❡ ❞❛t❛ s❡t✳ ❚❤❡ r❡♠❛✐♥✐♥❣ ❞❛t❛ ❜❡❧♦♥❣s t♦ t❤❡ t❡st s❡t✱ ✇❤✐❝❤ ✐s ✉s❡❞ t♦ ❡✈❛❧✉❛t❡t❤❡ ❝❧❛ss✐✜❝❛t✐♦♥ ♦❢ t❤❡ ♠♦❞❡❧✳❚❤❡ ♥❡①t ♣❛rt ♦❢ t❤❡ ❡✈❛❧✉❛t✐♦♥ r❡❣❛r❞s t❤❡ q✉❛♥t✐❢②✐♥❣ ♦❢ t❤❡ ♠♦❞❡❧ ♣❡r❢♦r♠❛♥❝❡✳❲❡ ♥❡❡❞ t♦ ❝❤♦♦s❡ t❤❡ ♣r♦♣❡r ♠❡tr✐❝ ❢♦r t❤❡ ❝❧❛ss✐✜❝❛t✐♦♥ ✐♥ ♦r❞❡r t♦ ❣❡t ❛♥ ❛❝❝✉r❛t❡❡✈❛❧✉❛t✐♦♥ ♦❢ t❤❡ ♠♦❞❡❧✳ ❚❤✐s ✐s ❞♦♥❡ ❜② ❝♦♠♣❛r✐♥❣ t❤❡ ❝❧❛ss✐✜❡❞ ❧❛❜❡❧s ❛♥❞ t❤❡ ♦r✐❣✐♥❛❧❧❛❜❡❧s✳❉✉r✐♥❣ t❤❡ ❝❧❛ss✐✜❝❛t✐♦♥ t❤❡r❡ ❛r❡ ✹ ❞✐✛❡r❡♥t ♦✉t♣✉t st❛t❡s✱ ✇❤✐❝❤ ❛r❡ r❡♣r❡s❡♥t❡❞ ✇✐t❤❛ ❝♦♥❢✉s✐♦♥ ♠❛tr✐① ✿
❋✐❣✉r❡ ✷✼✿ ❈♦♥❢✉s✐♦♥ ▼❛tr✐①
❼ ❚r✉❡ P♦s✐t✐✈❡ ✲ t❤❡ ♣♦s✐t✐✈❡ ❝❧❛ss✐✜❡❞ ❧❛❜❡❧ ♠❛t❝❤❡s t❤❡ ♦r✐❣✐♥❛❧ ❧❛❜❡❧✱ ✐♥ ♦✉r ❝❛s❡✿t❤❡ ❝❧❛ss✐✜❡❞ ❛tt❛❝❦ ♠❛t❝❤❡s t❤❡ ❛tt❛❝❦ ✐♥ ♦r✐❣✐♥❛❧ ❞❛t❛ s❡t
❼ ❚r✉❡ ◆❡❣❛t✐✈❡ ✲ t❤❡ ❝❧❛ss✐✜❡❞ ♥♦ ❛tt❛❝❦ ♠❛t❝❤❡s ♥♦ ❛tt❛❝❦ ✐♥ t❤❡ ♦r✐❣✐♥❛❧ ❞❛t❛
❼ ❋❛❧s❡ P♦s✐t✐✈❡ ✲ t❤❡ ❝❧❛ss✐✜❡❞ ❛tt❛❝❦ ❞♦❡s ♥♦t ♠❛t❝❤ ✇✐t❤ ♥♦ ❛tt❛❝❦ ✐♥ t❤❡ ♦r✐❣✐♥❛❧❞❛t❛
✹✸
![Page 51: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/51.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
✹✳✹ ❊✈❛❧✉❛t✐♦♥ ✹ ❘❊❙❊❆❘❈❍ ▼❊❚❍❖❉❖▲❖●❨ ❆◆❉ ❊❳P❊❘■▼❊◆❚
❼ ❋❛❧s❡ ♥❡❣❛t✐✈❡ ✲ t❤❡ ❝❧❛ss✐✜❡❞ ♥♦ ❛tt❛❝❦ ❞♦❡s ♥♦t ♠❛t❝❤ ✇✐t❤ ♥♦ ❛tt❛❝❦ ✐♥ t❤❡♦r✐❣✐♥❛❧ ❞❛t❛
❲✐t❤ ❛ ❤❡❧♣ ♦❢ t❤❡ ❝♦♥❢✉s✐♦♥ ♠❛tr✐①✱ ✇❡ ❝❛♥ ❞❡✜♥❡ ❞✐✛❡r❡♥t t②♣❡s ♦❢ t❤❡ ♠❡tr✐❝ t❤❛t✇❡ ❛r❡ ❣♦✐♥❣ t♦ ✉s❡✿
❼ ❆❝❝✉r❛❝② ✲ t❤❡ ♥✉♠❜❡r ♦❢ ❝♦rr❡❝t ♣r❡❞✐❝t✐♦♥s ❞✐✈✐❞❡❞ ❜② t❤❡ t♦t❛❧ ♥✉♠❜❡r ♦❢♣r❡❞✐❝t✐♦♥s ♠❛❞❡✿
❆❝❝✉r❛❝② =❚r✉❡ P♦s✐t✐✈❡s+ ❚r✉❡ ◆❡❣❛t✐✈❡s
❚r✉❡ P♦s✐t✐✈❡s+ ❚r✉❡ ◆❡❣❛t✐✈❡s+ ❋❛❧s❡ P♦s✐t✐✈❡s+ ❋❛❧s❡ ◆❡❣❛t✐✈❡s✭✸✸✮
❼ Pr❡❝✐s✐♦♥ ✲ t❤❡ ♥✉♠❜❡r ♦❢ t❤❡ ❝♦rr❡❝t ♣♦s✐t✐✈❡ ♣r❡❞✐❝t✐♦♥s ❞✐✈✐❞❡❞ ❜② t❤❡ t♦t❛❧♥✉♠❜❡r ♦❢ t❤❡ ♣♦s✐t✐✈❡ ♣r❡❞✐❝t✐♦♥s✿
Pr❡❝✐s✐♦♥ =❚r✉❡ P♦s✐t✐✈❡s
❚r✉❡ P♦s✐t✐✈❡s+ ❋❛❧s❡ P♦s✐t✐✈❡s✭✸✹✮
❼ ❙❡♥s✐t✐✈✐t② ✲ t❤❡ ♥✉♠❜❡r ♦❢ t❤❡ ❝♦rr❡❝t ♣♦s✐t✐✈❡ ♣r❡❞✐❝t✐♦♥s ❞✐✈✐❞❡❞ ❜② t❤❡♥✉♠❜❡r ♦❢ t❤❡ ♦r✐❣✐♥❛❧ tr✉❡ ❧❛❜❡❧s✿
❙❡♥s✐t✐✈✐t② =❚r✉❡ P♦s✐t✐✈❡s
❚r✉❡ P♦s✐t✐✈❡s+ ❋❛❧s❡ ◆❡❣❛t✐✈❡s✭✸✺✮
❼ ❙♣❡❝✐✜❝✐t② ✲ t❤❡ ♥✉♠❜❡r ♦❢ t❤❡ ❝♦rr❡❝t ♥❡❣❛t✐✈❡ ♣r❡❞✐❝t✐♦♥ ❞✐✈✐❞❡❞ ❜② t❤❡ t♦t❛❧♥✉♠❜❡r ♦❢ t❤❡ ♥❡❣❛t✐✈❡ ♣r❡❞✐❝t✐♦♥s✿
❙♣❡❝✐✜❝✐t② =❚r✉❡ ◆❡❣❛t✐✈❡s
❚r✉❡ ◆❡❣❛t✐✈❡s+ ❋❛❧s❡ P♦s✐t✐✈❡s✭✸✻✮
❼ ❋✶ ❙❝♦r❡ ✲ t❤❡ ❤❛r♠♦♥✐❝ ♠❡❛♥ ♦❢ ❙❡♥s✐t✐✈✐t② ❛♥❞ Pr❡❝✐s✐♦♥✳ ❆ ❤✐❣❤❡r ♥✉♠❜❡rr❡♣r❡s❡♥ts ❛ ❜❡tt❡r s❝♦r❡
❋✶❴s❝♦r❡ =2
1Pr❡❝✐s✐♦♥
+ 1❙❡♥s✐t✐✈✐t②
=2 ∗ Pr❡❝✐s✐♦♥ ∗ ❙❡♥s✐t✐✈✐t②
Pr❡❝✐s✐♦♥+ ❙❡♥s✐t✐✈✐t②✭✸✼✮
❼ ❨♦✉❞❡♥✬s ❏ st❛t✐st✐❝ ✲ t❤❡ ♣❡r❢♦r♠❛♥❝❡ ♠❡❛s✉r❡ ♦❢ ❛ ❞✐❛❣♥♦st✐❝ t❡st✱ ✇❤❡r❡ t❤❡♦✉t♣✉ts ❛r❡ ✈❛❧✉❡s ❜❡t✇❡❡♥ ✵ ❛♥❞ ✶✳ ❚❤❡ ✈❛❧✉❡ ✵ r❡♣r❡s❡♥ts ❛ ✉s❡❧❡ss t❡st ✇❤❡r❡t❤❡ ❝❧❛ss✐✜❝❛t✐♦♥ ❣✐✈❡s t❤❡ s❛♠❡ r❡s✉❧ts ✇✐t❤ ♦r ✇✐t❤♦✉t ❛ ❞❡❡♣ ❧❡❛r♥✐♥❣ ♠♦❞❡❧✱
✹✹
![Page 52: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/52.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
✹✳✹ ❊✈❛❧✉❛t✐♦♥ ✹ ❘❊❙❊❆❘❈❍ ▼❊❚❍❖❉❖▲❖●❨ ❆◆❉ ❊❳P❊❘■▼❊◆❚
✐✳❡ t❤❡ s❛♠❡ ❛s r❛♥❞♦♠ ❣✉❡ss✐♥❣✳ ❚❤❡ ✈❛❧✉❡ ✶ r❡♣r❡s❡♥ts ❛ ♣❡r❢❡❝t t❡st ✇✐t❤♦✉t❢❛❧s❡ ♣♦s✐t✐✈❡s ❛♥❞ ❢❛❧s❡ ♥❡❣❛t✐✈❡s✳
J = ❙❡♥s✐t✐✈✐t②+ ❙♣❡❝✐✜❝✐t②− 1 = ❚r✉❡ P♦s✐t✐✈❡s❚r✉❡ P♦s✐t✐✈❡s+❋❛❧s❡ ◆❡❣❛t✐✈❡s
+ ❚r✉❡ ◆❡❣❛t✐✈❡s
❚r✉❡ ◆❡❣❛t✐✈❡s+❋❛❧s❡ P♦s✐t✐✈❡s
✭✸✽✮
✹✺
![Page 53: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/53.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
✹✳✺ ◆♦r♠❛❧✐③❛t✐♦♥ ✹ ❘❊❙❊❆❘❈❍ ▼❊❚❍❖❉❖▲❖●❨ ❆◆❉ ❊❳P❊❘■▼❊◆❚
✹✳✺ ◆♦r♠❛❧✐③❛t✐♦♥
❆❢t❡r tr❛✐♥✐♥❣ ❛♥❞ ❡✈❛❧✉❛t✐♥❣✱ ✇❡ ❛r❡ ❝♦♠♣❛r✐♥❣ ♦✉r ♠♦❞❡❧s ❛♥❞ ❧♦♦❦✐♥❣ ❢♦r t❤❡ ✇❛②st♦ ✐♠♣r♦✈❡ ❛♥❞ ♦♣t✐♠✐③❡ ♦✉r ❝♦❞❡✳ ❚❤❡ ♣❛r❛♠❡t❡rs t❤❛t ✇❡ ❝♦♥s✐❞❡r✐♥❣ ❢♦r t❤❡ ♦♣t✐✲♠✐③❛t✐♦♥ ❛r❡✿ tr❛✐♥✐♥❣ ❛❝❝✉r❛❝②✱ ❥✲st❛t✐st✐❝s✱ tr❛✐♥✐♥❣ t✐♠❡✱ ❡t❝✳ ❚r❛✐♥✐♥❣ ❛❝❝✉r❛❝② s❤♦✇s✉s ❤♦✇ ❝♦rr❡❝t ❛r❡ ♦✉r ♠♦❞❡❧s ❝❧❛ss✐❢②✐♥❣ t❤❡ tr❛✣❝✱ ❛♥❞ ✐t ✐s ✉s❡❢✉❧ ❢♦r ❝♦♠♣❛r✐s♦♥✇✐t❤ s✐♠✐❧❛r ❡①♣❡r✐♠❡♥ts✱ s✐♥❝❡ ✐t ✐s ♠♦st❧② ✉s❡❞ ♠❡tr✐❝✳ ❯♥❢♦rt✉♥❛t❡❧②✱ ❛❝❝✉r❛❝② ❛❧♦♥❡✐s ♥♦t ❡♥♦✉❣❤ t♦ ❡✈❛❧✉❛t❡ ♣❡r❢♦r♠❛♥❝❡ ♦❢ ♦✉r ♠♦❞❡❧✱ s✐♥❝❡ ✐t ✉s❡s s✉♠ ♦❢ tr✉❡ ♣♦s✐t✐✈❡s❛♥❞ tr✉❡ ♥❡❣❛t✐✈❡s ✐♥ ♥♦♠✐♥❛t♦r✳ ❏✲st❛t✐st✐❝ ✐s ❣✐✈✐♥❣ ♣r❡❝✐s❡ ♣❡r❢♦r♠❛♥❝❡ ❡✈❛❧✉❛t✐♦♥✱❜❡❝❛✉s❡ ✐t s❤♦✇s ❡①❛❝t r❛t✐♦ ♦❢ tr✉❡ ♣♦s✐t✐✈❡s ❛♥❞ tr✉❡ ♥❡❣❛t✐✈❡s r❡s♣❡❝t✐✈❡❧②✳ ❚r❛✐♥✐♥❣t✐♠❡ ✐s ❛❧s♦ ♦♥❡ ♦❢ ✉♥✐✈❡rs❛❧ ♠❡tr✐❝s ❢♦r ♠♦❞❡❧ ❡✣❝✐❡♥❝②✳ ▼♦st ♦❢ t❤❡ ❡①♣❡r✐♠❡♥ts❝♦♥t❛✐♥ ❤✉❣❡ ❞❛t❛ s❡ts ❛♥❞ ✐t ✐s ❝♦st❧② t♦ ❧♦s❡ t✐♠❡ ♦♥ tr❛✐♥✐♥❣ ❛ ♥♦t ❡✣❝✐❡♥t ♠♦❞❡❧s✳❉✉r✐♥❣ t❤❡ ♥❡✉r❛❧ ♥❡t✇♦r❦ tr❛✐♥✐♥❣✱ t❤❡ ♠❛✐♥ ♣r♦❜❧❡♠ t❤❛t ♦❝❝✉rs ✐s ❛ str♦♥❣ ✈❛r✐❛t✐♦♥✐♥ ✐♥♣✉t ❞❛t❛ ❞✐str✐❜✉t✐♦♥✳ ❚❤✐s ❡✛❡❝t ❢♦r❝❡s t❤❡ ♦♣t✐♠✐③❛t✐♦♥ ❛❧❣♦r✐t❤♠ t♦ ❛❞❥✉st t❤❡✇❡✐❣❤ts ❛♥❞ ❜✐❛s❡s ❢♦r ❡✈❡r② ✐♥♣✉t st❡♣✳ ❚❤❡ ❧❡✈❡❧ ♦❢ ❛❞❥✉st♠❡♥ts ❝❛♥ ❜❡ ✈❡r② ❤✐❣❤✳❍✐❣❤ ❛❞❥✉st♠❡♥ts r❡s✉❧t ✐♥ s❧♦✇ ❧❡❛r♥✐♥❣ ❛♥❞ ❛ ❤✐❣❤❡r tr❛✐♥✐♥❣ ❡rr♦r✳■♥ ♦r❞❡r t♦ ❛✈♦✐❞ ❜❛❞ ❡✛❡❝ts ♦❢ ✐♥♣✉t ❞❛t❛ ❞✐str✐❜✉t✐♦♥ ✈❛r✐❛t✐♦♥✱ ✇❡ ❛r❡ ✉s✐♥❣ ♥♦r♠❛❧✲✐③❛t✐♦♥ ♠❡t❤♦❞s✳ ❚❤♦s❡ ♠❡t❤♦❞s ❛r❡ ✉t✐❧✐③❡❞ ❢♦r s❝❛❧✐♥❣ t❤❡ ♥✉♠❡r✐❝❛❧ ✐♥♣✉t ❞❛t❛ t♦❛ ❝♦♠♠♦♥ r❛♥❣❡✱ ✇❤✐❝❤ ❝❛✉s❡s s❧✐❣❤t ❛❞❥✉st♠❡♥ts ♦❢ ♣❛r❛♠❡t❡rs ❞✉r✐♥❣ t❤❡ tr❛✐♥✐♥❣❛♥❞ ❛❧❧♦✇s ❢❛st❡r tr❛✐♥✐♥❣ ❛♥❞ ❜❡tt❡r ♣r❡❝✐s✐♦♥✳ ❲❡ ❛r❡ ✐♠♣❧❡♠❡♥t✐♥❣ t✇♦ ✇✐❞❡❧② ✉s❡❞♠❡t❤♦❞s ❢♦r ♥♦r♠❛❧✐③❛t✐♦♥✿ ❜❛t❝❤ ♥♦r♠❛❧✐③❛t✐♦♥ ❛♥❞ ❧❛②❡r ♥♦r♠❛❧✐③❛t✐♦♥
❇❛t❝❤ ◆♦r♠❛❧✐③❛t✐♦♥
❲❡ ❛r❡ ✉s✐♥❣ ❜❛t❝❤ tr❛✐♥✐♥❣ t♦ ❛❝❤✐❡✈❡ ♠♦r❡ ❡✣❝✐❡♥❝② ✐♥ t❤❡ tr❛✐♥✐♥❣ ✭♠♦r❡ ✐♥ t❤❡s✉❜s❡❝t✐♦♥ ✹✳✸✳✶✮✳ ❋✐rst❧②✱ t❤❡ ❝❛❧❝✉❧❛t❡❞ ❧♦ss ♦✈❡r t❤❡ ❜❛t❝❤ ✐s ❛♥ ❡st✐♠❛t❡ ♦❢ t❤❡ ❧♦ss♦✈❡r t❤❡ ✇❤♦❧❡ ❞❛t❛ s❡t✱ ❛♥❞ ♦✈❡r t✐♠❡ ✐t ✐♠♣r♦✈❡s ✇✐t❤ ❣r❛❞✐❡♥t ❞❡s❝❡♥t✳ ❙❡❝♦♥❞❧②✱❜❛t❝❤ tr❛✐♥✐♥❣ ✐♠♣r♦✈❡s tr❛✐♥✐♥❣ ❡✣❝✐❡♥❝② ❜② ❞✐✈✐❞✐♥❣ t❤❡ tr❛✐♥✐♥❣ s❡t ✐♥ s♠❛❧❧❡rs✉❜s❡ts ❛♥❞ ✉t✐❧✐③✐♥❣ t❤❡ ♣❛r❛❧❧❡❧✐s♠ ♦❢ ♠♦❞❡r♥ ❝♦♠♣✉t✐♥❣ ♣❧❛t❢♦r♠s✳
✹✻
![Page 54: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/54.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
✹✳✺ ◆♦r♠❛❧✐③❛t✐♦♥ ✹ ❘❊❙❊❆❘❈❍ ▼❊❚❍❖❉❖▲❖●❨ ❆◆❉ ❊❳P❊❘■▼❊◆❚
❋✐❣✉r❡ ✷✽✿ ❇❛t❝❤ ◆♦r♠❛❧✐③❛t✐♦♥
❆❧t❤♦✉❣❤✱ t❤❡ ❣r❛❞✐❡♥t ✐s ❛ s✐♠♣❧❡ ❛♥❞ ❡✣❝✐❡♥t ✇❛② ❢♦r tr❛✐♥✐♥❣ ♦♣t✐♠✐③❛t✐♦♥✱ ✐tr❡q✉✐r❡s ❝❛r❡❢✉❧❧② s❡❧❡❝t❡❞ ♠♦❞❡❧ ♣❛r❛♠❡t❡rs✳ ❊❛❝❤ ♣❛r❛♠❡t❡r ❝❛♥ ✐♥✢✉❡♥❝❡ t❤❡ ❝❤❛♥❣❡♦❢ ✐♥♣✉t ❞✐str✐❜✉t✐♦♥ ❢♦r ❡❛❝❤ ❧❛②❡r✳ ❙✐♥❝❡ t❤❡ ♥❡✉r❛❧ ♥❡t✇♦r❦ ❛❞❛♣ts t❤❡ ✇❡✐❣❤ts❛♥❞ ❜✐❛s❡s ♦❢ ❡❛❝❤ ❧❛②❡r ❞✉r✐♥❣ t❤❡ tr❛✐♥✐♥❣✱ t❤❡ ❛❝t✐✈❛t✐♦♥ ♦❢ ❡❛❝❤ ❧❛②❡r ✇♦✉❧❞ ❛❧s♦❝❤❛♥❣❡✳ ❉✉❡ t♦ t❤❡ ❝❤❛♥❣❡ ♦❢ ✐♥♣✉t✱ ❡❛❝❤ ❧❛②❡r ✐s ❢♦r❝❡❞ t♦ ❛❞❛♣t ❝♦♥st❛♥t❧② t♦ ♥❡✇✐♥♣✉t ❞✐str✐❜✉t✐♦♥✱ ✇❤✐❝❤ r❡s✉❧ts ✐♥ ❡rr♦r ♣r♦♣❛❣❛t✐♦♥✳ ■t ❤❛s s✐❣♥✐✜❝❛♥t ❝♦♥s❡q✉❡♥❝❡s❡s♣❡❝✐❛❧❧② ✐♥ ❝❛s❡ ♦❢ ♠♦r❡ ❧❛②❡rs ✐♥ t❤❡ ♥❡t✇♦r❦✳
❚❤❡ ♣r♦❜❧❡♠ ✇❤✐❝❤ ♦❝❝✉rs ✐s ❝❛❧❧❡❞ ❝♦✈❛r✐❛t❡ s❤✐❢t✱ ❛♥❞ ✐t r❡❢❡rs t♦ ❛ ❝❤❛♥❣❡ ♦❢ t❤❡✐♥♣✉t ❞❛t❛ ❞✐str✐❜✉t✐♦♥ t♦ ❛ ❧❛②❡r✳ ❚❤✐s r❡♣r❡s❡♥ts ❛ ♣r♦❜❧❡♠✱ ❜❡❝❛✉s❡ ✇❡ ❦♥♦✇ t❤❛ttr❛✐♥✐♥❣ ❝♦♥✈❡r❣❡s ❢❛st❡r ✐❢ t❤❡ ✐♥♣✉t ❞✐str✐❜✉t✐♦♥ ✐s ③❡r♦✲♠❡❛♥ ❛♥❞ ✉♥✐t ✈❛r✐❛♥❝❡✳ ❬✸✷❪❬✹✽❪
❚❤❡ ❣♦❛❧ ♦❢ ❜❛t❝❤ ♥♦r♠❛❧✐③❛t✐♦♥ ✐s t♦ r❡❞✉❝❡ ❝♦✈❛r✐❛t❡ s❤✐❢t ✐♥ ♦r❞❡r t♦ ❛❝❝❡❧❡r❛t❡ t❤❡tr❛✐♥✐♥❣ ❛♥❞ ✐♠♣r♦✈❡ ♣r❡❝✐s✐♦♥✳ ❚❤❡ r❡❞✉❝t✐♦♥ ✐s ❛❝❤✐❡✈❡❞ ❜② ♥♦r♠❛❧✐③✐♥❣ t❤❡ ✐♥♣✉t❞❛t❛ t♦ t❤❡ s♠❛❧❧ r❛♥❣❡ ♦❢ ✈❛❧✉❡s✳ ❋♦r ❧❛②❡r ✇✐t❤ ✐♥♣✉t ❞❛t❛✱ ✇❤✐❝❤ ✐s ❛t t❤❡ s❛♠❡ t✐♠❡t❤❡ ♦✉t♣✉t ♦❢ ❛❝t✐✈❛t✐♦♥ ❢✉♥❝t✐♦♥ ♦❢ t❤❡ ♣r❡✈✐♦✉s ❧❛②❡r a = (a(1), a(2), ...a(k)) ✇❡ ♥❡❡❞t♦ ♥♦r♠❛❧✐③❡ ❡❛❝❤ ✐♥♣✉t✿ ❬✷✼❪
✹✼
![Page 55: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/55.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
✹✳✺ ◆♦r♠❛❧✐③❛t✐♦♥ ✹ ❘❊❙❊❆❘❈❍ ▼❊❚❍❖❉❖▲❖●❨ ❆◆❉ ❊❳P❊❘■▼❊◆❚
ai =a(i) − E[a(i)]√
V at[a(i)]✭✸✾✮
❚❤❡ s❤♦✇♥ ♥♦r♠❛❧✐③❛t✐♦♥ ❝♦✉❧❞ ❝❤❛♥❣❡ t❤❡ ❡①♣r❡ss✐✈❡♥❡ss ♦❢ t❤❡ ❧❛②❡r r❡♣r❡s❡♥t❛t✐♦♥✱❛s ♥♦♥✲❧✐♥❡❛r ❛❝t✐✈❛t✐♦♥ ❝♦✉❧❞ ❜❡❝♦♠❡ ❧✐♥❡❛r✳ ❚♦ ❛❞❞r❡ss t❤✐s ✐ss✉❡✱ ✇❡ ❛r❡ ❛❞❞✐♥❣ t✇♦❛❞❞✐t✐♦♥❛❧ ♣❛r❛♠❡t❡rs γ(k) ❛♥❞ β(k) ❢♦r ❡❛❝❤ ❛❝t✐✈❛t✐♦♥ a(i)✿
y(i) = γ(k)ai + β(k) ✭✹✵✮
❚❤❡ ♣❛r❛♠❡t❡rs s❝❛❧❡ t❤❡ s❤✐❢t❡❞ ✈❛❧✉❡s ❛♥❞ r❡♣r❡s❡♥ts t❤❡ ✐❞❡♥t✐t② tr❛♥s❢♦r♠✳ ❚❤♦s❡♣❛r❛♠❡t❡rs ❛r❡ ❧❡❛r♥❡❞ ❞✉r✐♥❣ t❤❡ tr❛✐♥✐♥❣ ❛♥❞ t❤❡② r❡st♦r❡ t❤❡ r❡♣r❡s❡♥t❛t✐♦♥ ♣♦✇❡r♦❢ t❤❡ ♥❡t✇♦r❦✳
❚❛❦✐♥❣ ❛❧❧ t❤❡ ♣❛r❛♠❡t❡rs ✐♥t♦ ❝♦♥s✐❞❡r❛t✐♦♥✱ t❤❡ ❜❛t❝❤ ♥♦r♠❛❧✐③❛t✐♦♥ ❛❧❣♦r✐t❤♠ ❝♦♥✲t❛✐♥s ❢❡✇ st❡♣s✿
❼ ❝❛❧❝✉❧❛t✐♥❣ t❤❡ ❜❛t❝❤ ♠❡❛♥✿
µB =1
m
m∑
i=1
ai ✭✹✶✮
❼ ❝❛❧❝✉❧❛t✐♥❣ t❤❡ ❜❛t❝❤ ✈❛r✐❛♥❝❡✿
δ2B =1
m
m∑
i=1
(ai − µB)2 ✭✹✷✮
❼ ♥♦r♠❛❧✐③❛t✐♦♥✿
ai =ai − µB√
δ2B + ǫ✭✹✸✮
❼ s❝❛❧❡ ❛♥❞ s❤✐❢t✿
y(i) = γai + β ≡ BatchNormalizationγ,β(ai) ✭✹✹✮
❆ ♣r♦❜❧❡♠ ❝❛♥ ❛♣♣❡❛r ✇✐t❤ ❛ s♠❛❧❧ ❜❛t❝❤ s✐③❡✱ s✐♥❝❡ t❤❡ ✈❛r✐❛♥❝❡ ✐s ❝❧♦s❡ t♦ ③❡r♦ ❛♥❞t❤❡ ❡st✐♠❛t❡s ❝♦✉❧❞ ❜❡ ✈❡r② ♥♦✐s②✳ ❚❤❡r❡ ❛r❡ ❛❧s♦ s♦♠❡ ♣r♦❜❧❡♠s ✇✐t❤ t❤❡ r❡❝✉rr❡♥t♥❡✉r❛❧ ♥❡t✇♦r❦✱ s✐♥❝❡ t❤❡ ❛❝t✐✈❛t✐♦♥ ❢♦r ❡❛❝❤ t✐♠❡ st❡♣ ❤❛s ❞✐✛❡r❡♥t st❛t✐st✐❝s ❛♥❞ ✐s✈❡r② s❡♥s✐t✐✈❡ t♦ ♥♦✐s❡✳
✹✽
![Page 56: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/56.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
✹✳✺ ◆♦r♠❛❧✐③❛t✐♦♥ ✹ ❘❊❙❊❆❘❈❍ ▼❊❚❍❖❉❖▲❖●❨ ❆◆❉ ❊❳P❊❘■▼❊◆❚
▲❛②❡r ◆♦r♠❛❧✐③❛t✐♦♥
▲❛②❡r ♥♦r♠❛❧✐③❛t✐♦♥ ✐s ❢❛✐r❧② s✐♠✐❧❛r t♦ ❜❛t❝❤ ♥♦r♠❛❧✐③❛t✐♦✳ ❚❤❡ ♦♥❧② ❞✐✛❡r❡♥❝❡ ✐st❤❡ ♦❜❥❡❝t ♦❢ ♥♦r♠❛❧✐③❛t✐♦♥✳ ■♥ ❜❛t❝❤ ♥♦r♠❛❧✐③❛t✐♦♥ ✇❡ ❛r❡ ♣❡r❢♦r♠✐♥❣ ♥♦r♠❛❧✐③✐♥❣❛❝r♦ss t❤❡ ❜❛t❝❤ ❞✐♠❡♥s✐♦♥✱ ✇❤❡r❡❛s ❧❛②❡r ♥♦r♠❛❧✐③❛t✐♦♥ ♥♦r♠❛❧✐③❡s t❤❡ ✐♥♣✉t ❛❝r♦sst❤❡ ❢❡❛t✉r❡s✳ ❚❤✐s ✇❛② ♦❢ ❝❛❧❝✉❧❛t✐♥❣ ❛❧❧♦✇s t❤❡ ❛♥ ✐♥❞❡♣❡♥❞❡♥t ❝❛❧❝✉❧❛t✐♦♥ ❢♦r ❡❛❝❤s❛♠♣❧❡ ♦❢ ❞❛t❛✱ ❛s ✇❡❧❧ ❛s t❤❡ ✉s❡ ♦❢ ❛♥ ❛r❜✐tr❛r② ❜❛t❝❤ s✐③❡✳ ❋✐❣✉r❡ ✷✾ s❤♦✇s t❤❡❞✐✛❡r❡♥❝❡ ❜❡t✇❡❡♥ t❤❡ t✇♦ ♥♦r♠❛❧✐③❛t✐♦♥ ♠❡t❤♦❞s✿
❋✐❣✉r❡ ✷✾✿ ▲❛②❡r ◆♦r♠❛❧✐③❛t✐♦♥
❚❤❡ ♠❛t❤❡♠❛t✐❝❛❧ r❡♣r❡s❡♥t❛t✐♦♥ ✐s s✐♠✐❧❛r t♦ ❜❛t❝❤ ♥♦r♠❛❧✐③❛t✐♦♥✿❬✸✸❪
µi =1
m
m∑
i=1
ai,j ✭✹✺✮
δ2j =1
m
m∑
i=1
(ai,j − µi)2 ✭✹✻✮
ai,j =ai,j − µi√
δ2i + ǫ✭✹✼✮
✹✾
![Page 57: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/57.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
✹✳✺ ◆♦r♠❛❧✐③❛t✐♦♥ ✹ ❘❊❙❊❆❘❈❍ ▼❊❚❍❖❉❖▲❖●❨ ❆◆❉ ❊❳P❊❘■▼❊◆❚
❚❤❡ ❉✐✛❡r❡♥❝❡ ✐s ✐♥ t❤❡ ✐♥♣✉t ❛❝t✐✈❛t✐♦♥ ❢✉♥❝t✐♦♥ ai,j✱ ✇❤❡r❡ i r❡♣r❡s❡♥ts ❛ ❜❛t❝❤ ❛♥❞j r❡♣r❡s❡♥ts ❛ ❢❡❛t✉r❡✳
✺✵
![Page 58: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/58.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
✺ ❘❊❙❯▲❚❙
✺ ❘❡s✉❧ts
■♥ t❤✐s ❝❤❛♣t❡r✱ ✇❡ ❛r❡ ❝♦♠♣❛r✐♥❣ t❤❡ r❡s✉❧ts t❤❛t ✇❡ ❣♦t ❢r♦♠ t❤❡ ♠♦❞❡❧s t❤❛t ✇❡❞❡✈❡❧♦♣❡❞✳ ■♥ ❣❡♥❡r❛❧✱ ✇❡ ❤❛✈❡ ✹ ❞✐✛❡r❡♥t ♠♦❞❡❧s ❛♥❞ t❤❡② ❞✐✛❡r ✐♥ t❤❡ ♥✉♠❜❡r ♦❢ ❧❛②❡rs❛♥❞ ♥✉♠❜❡r ♦❢ ❝❡❧❧s ✐♥ ❛ ❧❛②❡r✳ ❚❤❡② ❛❧s♦ ❞✐✛❡r ❛❝❝♦r❞✐♥❣ t♦ t❤❡ ❦✐♥❞ ♦❢ r❡❣✉❧❛r✐③❛t✐♦♥t❡❝❤♥✐q✉❡s ❛♥❞ ✇✐t❤ r❡s♣❡❝t t♦ t❤❡✐r ❞✐✛❡r❡♥t ❧❡❛r♥✐♥❣ r❛t❡s ❛♥❞ ♠❛①✐♠❛❧ ❜❛t❝❤ s✐③❡♣❛r❛♠❡t❡rs✳■♥ t❤❡ ✜rst ♣❛rt ♦❢ t❤✐s ❝❤❛♣t❡r✱ ✇❡ ❛r❡ ✐♥tr♦❞✉❝✐♥❣ t❤❡ ❤❛r❞✇❛r❡ ❛♥❞ s♦❢t✇❛r❡ s❡t✉♣st❤❛t ✇❡r❡ ✉s❡❞ ❢♦r ♦✉r ❡①♣❡r✐♠❡♥ts✱ ✐♥❝❧✉❞✐♥❣ ❛❧❧ t❤❡✐r ❝♦♠♣♦♥❡♥ts✳❚❤❡ s❡❝♦♥❞ ♣❛rt ♦❢ t❤❡ ❝❤❛♣t❡r ✐s ❛ ❞✐s❝✉ss✐♦♥ ❛❜♦✉t t❤❡ ♣❡r❢♦r♠❛♥❝❡ ❡✈❛❧✉❛t✐♦♥✳❲❡ ✇✐❧❧ ❝♦♠♣❛r❡ ❞✐✛❡r❡♥t ♠♦❞❡❧s ✐♥ t❡r♠s ♦❢ t❤❡ ❡✈❛❧✉❛t✐♥❣ ♣❛r❛♠❡t❡rs✱ s✉❝❤ ❛s t❤❡♥✉♠❜❡r ♦❢ tr✉❡ ♣♦s✐t✐✈❡s ❛♥❞ ❢❛❧s❡ ♣♦s✐t✐✈❡s✱ tr✉❡ ♥❡❣❛t✐✈❡✱ ❢❛❧s❡ ♥❡❣❛t✐✈❡s✱ ❛❝❝✉r❛❝②✱♣r❡❝✐s✐♦♥✱ ❢✶ s❝♦r❡ ❛♥❞ ❥✲st❛t✐st✐❝s✳ ❚❤✐s ❣✐✈❡s ✉s ❛♥ ❛♣♣r♦①✐♠❛t✐♦♥ ♦❢ ❤♦✇ ❣♦♦❞ ♦✉r♠♦❞❡❧s ❛r❡✱ ❛♥❞✱ ❛s ❛ r❡s✉❧t✱ ✇❡ ❝❛♥ s❡❡ ✇❤✐❝❤ ♠♦❞❡❧ ✇♦✉❧❞ ❜❡ t❤❡ ❜❡st ♦♥❡✳ ❲❡ ✇✐❧❧❞✐s❝✉ss ♠♦r❡ ❛❜♦✉t t❤❛t ✐♥ ❈❤❛♣t❡r ✺✳✳❆s✐❞❡ ❢r♦♠ t❤❡ ❝♦♠♠♦♥ ♣❡r❢♦r♠❛♥❝❡ ❡✈❛❧✉❛t✐♦♥✱ ✇❡ ❛r❡ ❛❧s♦ ♣r♦✈✐❞✐♥❣ t❤❡ ♣r♦❜❛❜✐❧✐t②♦❢ r❡❝♦❣♥✐③✐♥❣ ❞✐✛❡r❡♥t ❛tt❛❝❦ ❝❛t❡❣♦r✐❡s✱ ✇❤✐❝❤ ✐s ✈❡r② ✐♠♣♦rt❛♥t ✐♥ ♠♦❞❡❧ ❡✈❛❧✉❛t✐♦♥✳❚❤❡ ❝♦♠♣❛r✐s♦♥ ❜❡t✇❡❡♥ ❤♦✇ ❞✐✛❡r❡♥t ♠♦❞❡❧s r❡❝♦❣♥✐③❡ ❞✐✛❡r❡♥t ❛tt❛❝❦ ❝❛t❡❣♦r✐❡s ✐ss❤♦✇♥ ❛s ✇❡❧❧✳❲❡ ✇✐❧❧ ❞✐s❝✉ss t❤❡ ✐♥✢✉❡♥❝❡ ♦❢ ♦t❤❡r ♣❛r❛♠❡t❡rs ♦❢ t❤❡ ❞❡❡♣ ❧❡❛r♥✐♥❣ ♠♦❞❡❧ t❤❛t ✇❡❛r❡ ✉s✐♥❣✱ s✉❝❤ ❛s t❤❡ t✐♠❡ ♦❢ tr❛✐♥✐♥❣✱ ❧❡❛r♥✐♥❣ r❛t❡✱ ♠❛①❴❜❛t❝❤ s✐③❡✱ ❡t❝✳ ❲✐t❤ t❤✐s❝♦♠♣❛r✐s♦♥ ✇❡ ❛r❡ ✜♥✐s❤✐♥❣ t❤❡ ♣❡r❢♦r♠❛♥❝❡ ❡✈❛❧✉❛t✐♦♥ ❛♥❞ ❛r❡ ❣❡tt✐♥❣ t❤❡ ❝♦♠♣❧❡t❡♣✐❝t✉r❡ ♦❢ ♦✉r ♠♦❞❡❧✱ ✇✐t❤ t❤❡ ❞❡s❝r✐♣t✐♦♥ ♦❢ ❤♦✇ ❣♦♦❞ ✐t ✐s ❛♥❞ ✇❤❛t ✐s ✐t t❤❛t ✇❡s❤♦✉❧❞ ❞♦ t♦ ♠❛❦❡ ✐t ❜❡tt❡r✳❆❧❧ ❡✈❛❧✉❛t✐♦♥ r❡s✉❧ts st❛t❡❞ ✐♥ t❤✐s ❝❤❛♣t❡r ✇✐❧❧ ❜❡ ✉s❡❞ ✐♥ t❤❡ ♥❡①t ❝❤❛♣t❡r t♦ ♣r❡s❡♥tt❤❡ ❜❡st ♠♦❞❡❧ ❢♦r tr❛✣❝ ❝❧❛ss✐✜❝❛t✐♦♥ ❜② ✉s✐♥❣ ❞❡❡♣ ❧❡❛r♥✐♥❣✳ ❋✉t✉r❡ ✐♠♣r♦✈❡♠❡♥ts✇✐❧❧ ❛❧s♦ ❜❡ s✉❣❣❡st❡❞✳
✺✳✶ ❙❡t✉♣
❋✐rst ♦❢ ❛❧❧ ✇❡ ♥❡❡❞ t♦ ✐♥tr♦❞✉❝❡ t❤❡ ❤❛r❞✇❛r❡ ❛♥❞ s♦❢t✇❛r❡ t❤❛t ✇❡ ✉s❡❞✳■♥ t❡r♠s ♦❢ t❤❡ ❤❛r❞✇❛r❡ s❡t✉♣✱ ♦♥❡ ❝✉st♦♠ ♠❛❞❡ P❈ ✇✐t❤ t❤❡ ✇✐t❤ ❢♦❧❧♦✇✐♥❣ ♣❡r❢♦r✲♠❛♥❝❡s ✐s ✉s❡❞✿
❼ ❆▼❉ ❘②③❡♥ ❘✼ ✷✼✵✵❳ ✇✐t❤ ✶✻ ❝♦r❡s
❼ ✸✷●❇ ❘❆▼
❼ ◆❱■❉■❆ ❘❚❳ ✷✵✻✵ ✇✐t❤ ✶✸✻✺ ▼❍③✱ ✻●❇ ●❉❉❘✻✱ ✶✾✷✵ ❝♦r❡s✱ ✷✹✵ ❚❡s♦r ❝♦r❡s✱
✺✶
![Page 59: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/59.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
✺✳✶ ❙❡t✉♣ ✺ ❘❊❙❯▲❚❙
✺✳✶✳✶ ❉❡❡♣ ❧❡❛r♥✐♥❣ ❢r❛♠❡✇♦r❦
◆♦✇❛❞❛②s✱ ♠❛❝❤✐♥❡ ❧❡❛r♥✐♥❣ ✐s ♦♥❡ ♦❢ t❤❡ ♠♦st t❛❧❦❡❞ ❛❜♦✉t t♦♣✐❝ ✐♥ ❞❛t❛ s❝✐❡♥❝❡✳❆ ❧♦t ♦❢ r❡s❡❛r❝❤ ❤❛✈❡ ❜❡❡♥ ♠❛❞❡ ✐♥ t❤✐s ✜❡❧❞ ❛♥❞ ✐t ✐s ❝♦♠♠❡r❝✐❛❧❧② ♣r❡s❡♥t ✐♥ t❤❡♠♦st ✐♥❞✉str✐❡s✳ ❚❤❡r❡ ❛r❡ ❛ ❧♦t ♦❢ ❞❡❡♣ ❧❡❛r♥✐♥❣ ❢r❛♠❡✇♦r❦s ✇❤✐❝❤ ❝♦✉❧❞ ❜❡ ✉s❡❞❢♦r ❣❡♥❡r❛t✐♥❣ ❛ ❞❡❡♣ ❧❡❛r♥✐♥❣ ♠♦❞❡❧✳ ▼♦st ♦❢ t❤❡♠ ❛r❡ ♦♣❡♥✲s♦✉r❝❡ ❛♥❞ t❤❡② ❛r❡s✉♣♣♦rt❡❞ ❜② ♠❛♥② ♣r♦❣r❛♠♠✐♥❣ ❧❛♥❣✉❛❣❡s✱ ✇✐t❤ P②t❤♦♥✱ ❈✰✰ ❛♥❞ ❘ ❛t t❤❡ t♦♣ ♦❢t❤❡ ❧✐st✳ ❲❡ ✇✐❧❧ ❞❡s❝r✐❜❡ t❤❡ ♠♦st ♣♦♣✉❧❛r ❢r❛♠❡✇♦r❦s✳
❚❡♥s♦r❋❧♦✇ ❬✶✶❪ ✐s ❛ ❢r❛♠❡✇♦r❦ ❞❡✈❡❧♦♣❡❞ ❜② ●♦♦❣❧❡✬s ❆■ ❞❡♣❛rt♠❡♥t✳ ■t ✇❛s r❡❝❡♥t❧②❧❛✉♥❝❤❡❞ ❛s ♦♣❡♥✲s♦✉r❝❡ ♣❧❛t❢♦r♠✱ ✇❤✐❝❤ ❤❛s ❝r❡❛t❡❞ ❛ ❧♦t ♦❢ ❛tt❡♥t✐♦♥ ✐♥ t❤✐s ✜❡❧❞✳■t ✐s ✇✐❞❡❧② ✉s❡❞ ❜❡❝❛✉s❡ ✐t s✉♣♣♦rts ♠✉❧t✐♣❧❡ ❧❛♥❣✉❛❣❡s ❢♦r ❝r❡❛t✐♥❣ ❛ ❞❡❡♣ ❧❡❛r♥✐♥❣♠♦❞❡❧✱ s✉❝❤ ❛s P②t❤♦♥✱ ❈✰✰ ❛♥❞ ❘ ❛♥❞ ✐t ✐s ❛✈❛✐❧❛❜❧❡ ♦♥ ♠❛♥② ♣❧❛t❢♦r♠s✱ ❡✈❡♥ ♦♥ ✐❖❙❛♥❞ ❆♥❞r♦✐❞✳ ❚❡♥s♦r❋❧♦✇ ❛❧❧♦✇s ✉s t♦ ✉s❡ ❜♦t❤ t❤❡ ❈P❯ ❛♥❞ ●P❯ ♣r♦❝❡ss✐♥❣ ♣♦✇❡rs✱❛♥❞✱ ✇✐t❤ t♦❞❛②✬s ♠✉❧t✐❝♦r❡ ♣r♦❝❡ss♦rs ❛♥❞ ♣❛r❛❧❧❡❧ ❝♦♠♣✉t✐♥❣ ●P❯s✱ ❞❡❡♣ ❧❡❛r♥✐♥❣ ✐s❜❡❝♦♠✐♥❣ ♠♦r❡ ❛✛♦r❞❛❜❧❡ ❛♥❞ ♠♦r❡ ❛✈❛✐❧❛❜❧❡ t♦ ❡✈❡r②♦♥❡✳❚❡♥s♦rs ❛r❡ ♠✉❧t✐✲❞✐♠❡♥s✐♦♥❛❧ ❛rr❛②s ✇❤✐❝❤ ❛r❡ ✉s❡❞ ❛s t❤❡ ♠❛✐♥ ❝♦r❡ ♦❢ t❤❡ ❢r❛♠❡✇♦r❦✳❚❤❡ ✐♥♣✉t ❞❛t❛ ✐s r❡s❤❛♣❡❞ ✐♥ t❤❡ t❡♥s♦rs ❛♥❞ ❢❡❞ ✐♥t♦ ❛ ❝♦♠♣✉t❛t✐♦♥❛❧ ❣r❛♣❤✱ ✇❤✐❝❤❛❧❧♦✇s ✉s t♦ t❛❦❡ ♠♦r❡ ❢❡❛t✉r❡s ♦❢ t❤❡ ✐♥♣✉t ❞❛t❛ ✐♥t♦ ❛❝❝♦✉♥t✳
P②t♦r❝❤ ❬✾❪ ✐s t❤❡ s❡❝♦♥❞ ♠♦st ✉s❡❞ ❢r❛♠❡✇♦r❦✱ ❞❡✈❡❧♦♣❡❞ ❢♦r ❋❛❝❡❜♦♦❦✱ ❜✉t ✐t ✐s ❛❧s♦✉s❡❞ ❢♦r ❚✇✐tt❡r ❛♥❞ ❙❛❧❡s❢♦r❝❡✱ ✇❤✐❝❤ ♣r♦✈✐❞❡s ♠♦r❡ ✢❡①✐❜✐❧✐t② ❛♥❞ ❛❞❛♣t❛t✐♦♥ ❞✉r✐♥❣❝♦♠♣✉t❛t✐♦♥✳ ■t ✉s❡s P②t❤♦♥ ❛s t❤❡ ❜❛❝❦❡♥❞✱ ❛❧❧♦✇✐♥❣ ❢♦r t❤❡ ●P❯ ❝♦♠♣✉t❛t✐♦♥ ❛s✇❡❧❧✳ ❙✐♠✐❧❛r t♦ ❚❡♥s♦r❋❧♦✇✱ P②t♦r❝❤ ✐s ✉s✐♥❣ ❛❧s♦ ❚❡♥s♦rs ❢♦r ❝♦♠♣✉t❛t✐♦♥s✳ ❚❤❡ ❜❛s✐❝❛❞✈❛♥t❛❣❡ ♦❢ ❚❡♥s♦r❋❧♦✇ ✐s t❤❛t t❤✐s ❢r❛♠❡✇♦r❦ ✉s❡s ❞②♥❛♠✐❝ ❝♦♠♣✉t❛t✐♦♥❛❧ ❣r❛♣❤s✱✇❤✐❝❤ ❝❤❛♥❣❡ ❞✉r✐♥❣ t❤❡ tr❛✐♥✐♥❣✳
❑❡r❛s ❬✻❪ ✐s ❛ ♣♦♣✉❧❛r ❆P■✱ ✇❤✐❝❤ ✉s❡s ❚❡♥s♦r❋❧♦✇✱ ❚❤❡❛♥♦ ♦r ❈♦♥❣r✉❡♥t ❚♦♦❧❦✐t✭❞❡s❝r✐❜❡❞ ❜❡❧♦✇✮ ❛s t❤❡ ❜❛❝❦❡♥❞✳ ■t ✐s ✈❡r② ❧✐❣❤t✇❡✐❣❤t ❛♥❞ ❛♣♣❧✐❝❛❜❧❡ t♦ ❛♥② ❡①♣❡r✐✲♠❡♥t✱ ✇❤✐❝❤ ♠❛❦❡s t❤✐s t❤❡ ❜❡st ❢r❛♠❡✇♦r❦ ❢♦r ❜❡❣✐♥♥❡rs ❛♥❞ ❢♦r s❤♦rt ❡①♣❡r✐♠❡♥ts✳■t s✉♣♣♦rts ❈♦♥✈♦❧✉t✐♦♥❛❧ ❛♥❞ r❡❝✉rr❡♥t ♥❡✉r❛❧ ♥❡t✇♦r❦s ❛♥❞ ✐t ✐s ❛❜❧❡ t♦ r✉♥ ❜♦t❤❈P❯ ❛♥❞ ●P❯ ♣r♦❝❡ss✐♥❣✳ ❆ ❞r❛✇❜❛❝❦ ♦❢ ❑❡r❛s ✇♦✉❧❞ ❜❡ t❤❛t ✐t ✐s ♥♦t ✈❡r② ♣r♦♥❡ t♦❝♦♠♣❧❡① ♠♦❞❡❧s✳
▼❳◆❡t ❬✼❪ ✐s ❛ ❤✐❣❤❧② s❝❛❧❛❜❧❡ ❢r❛♠❡✇♦r❦✱ ❞❡✈❡❧♦♣❡❞ ❜② ❆♣❛❝❤❡ ❛♥❞ ❛❞♦♣t❡❞ ❜②❆♠❛③♦♥ ❲❡❜ ❙❡r✈✐❝❡s✳ ■t s✉♣♣♦rts ❛ ❣r❡❛t ❛♠♦✉♥t ♦❢ ❧❛♥❣✉❛❣❡s✱ s✉❝❤ ❛s P②t❤♦♥✱❈✰✰✱ ❘✱ ❏❛✈❛❙❝r✐♣t✱ ❏✉❧✐❛✱ ❡t❝✳ ❚❤❡ ♠❛✐♥ ❛❞✈❛♥t❛❣❡ ♦❢ t❤✐s ❢r❛♠❡✇♦r❦ ✐s t❤❛t ✐t❤❛s s♣❡❝✐❛❧ ❢❡❛t✉r❡s ❢♦r ●P❯ ♣r♦❝❡ss✐♥❣✱ ✇❤✐❝❤ s✉♣♣♦rt ♣❛r❛❧❧❡❧ ♣r♦❝❡ss✐♥❣ ❛♥❞ ♠✉❧t✐●P❯ ♣r♦❝❡ss✐♥❣✳ ■t ✐s ✈❡r② ♣♦♣✉❧❛r ❢♦r s♣❡❡❝❤ ❛♥❞ ❤❛♥❞✲✇r✐t✐♥❣ r❡❝♦❣♥✐t✐♦♥✱ ♥❛t✉r❛❧❧❛♥❣✉❛❣❡ ♣r♦❝❡ss✐♥❣ ❛♥❞ ❢♦r❡❝❛st✐♥❣✳
✺✷
![Page 60: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/60.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
✺✳✷ P❡r❢♦r♠❛♥❝❡ ❡✈❛❧✉❛t✐♦♥ ✺ ❘❊❙❯▲❚❙
❈◆❚❑ ❬✷❪ ✐s ②❡t ❛♥♦t❤❡r ♦♣❡♥✲s♦✉r❝❡ ❢r❛♠❡✇♦r❦✱ ❞❡✈❡❧♦♣❡❞ ❜② ▼✐❝r♦s♦❢t ❘❡s❡❛r❝❤✳ ■t❞❡s❝r✐❜❡s ♥❡✉r❛❧ ♥❡t✇♦r❦s ❛s s❡r✐❡s ♦❢ ❝♦♠♣✉t❛t✐♦♥❛❧ st❡♣s t❤r♦✉❣❤ ❛ ❞✐r❡❝t❡❞ ❣r❛♣❤✳❚❤✐s ❢r❛♠❡✇♦r❦ s✉♣♣♦rts t❤❡ ♠♦st ♣♦♣✉❧❛r ♠♦❞❡❧ t②♣❡s✱ s✉❝❤ ❛s ❛ ❝♦♥✈♦❧✉t✐♦♥❛❧ ♥❡✉r❛❧♥❡t✇♦r❦✱ ❘❡❝✉rr❡♥t ◆❡✉r❛❧ ◆❡t✇♦r❦✱ ❢❡❡❞✲❢♦r✇❛r❞ ❉◆◆✱ ❡t❝✳
❋♦r ♦✉r ❡①♣❡r✐♠❡♥t✱ ✇❡ ❞❡❝✐❞❡❞ t♦ ✉s❡ ❚❡♥s♦r❋❧♦✇✱ s✐♥❝❡ t❤❡ ✸✲❞✐♠❡♥s✐♦♥❛❧ s❤❛♣❡ ♦❢t❡♥s♦rs ✜ts t❤❡ ❜❡st ❢♦r ♦✉r ✐♥t❡♥❞❡❞ ❢❡❛t✉r❡ s❡t s❤❛♣❡✳ ■t ❛❧s♦ ♦✛❡rs ♠♦r❡ ✢❡①✐❜✐❧✐t②✐♥ t❡r♠s ♦❢ t❤❡ ❜❛❝❦❡♥❞✱ ❆P■✱ ❡t❝✳
❚❤❡ ❡①♣❡r✐♠❡♥t ✐s ♣❡r❢♦r♠❡❞ ♦♥ ❲✐♥❞♦✇s ✶✵✱ ✉s✐♥❣ ❆♥❛❝♦♥❞❛ t♦ s❡t t❤❡ ✈✐rt✉❛❧❡♥✈✐r♦♥♠❡♥t✳ ❚❡♥s♦r❋❧♦✇ ●P❯ ✶✸✳✶ ✐s ✉s❡❞ t♦ s✉♣♣♦rt ❣r❛♣❤✐❝❛❧ ♣r♦❝❡ss✐♥❣✳ ❚❤❡ ●P❯❣✐✈❡s ✉s t❤❡ ♣♦ss✐❜✐❧✐t② ♦❢ ♣❛r❛❧❧❡❧ ❝♦♠♣✉t✐♥❣✱ ✇❤✐❝❤ ✐s ✈❡r② ♣♦♣✉❧❛r ❛♠♦♥❣ ♣❡♦♣❧❡ ✇❤♦✇♦r❦ ♦♥ ❞❡❡♣ ❧❡❛r♥✐♥❣ ❜❡❝❛✉s❡ ✐t ❞r❛st✐❝❛❧❧② ❞❡❝r❡❛s❡s t❤❡ ❝♦♠♣✉t✐♥❣ t✐♠❡✳ ❉✉r✐♥❣♣r❡♣r♦❝❡ss✐♥❣✱ P❛♥❞❛s ❛♥❞ ◆✉♠P② ❛r❡ ✉s❡❞ ❢♦r ♣r❡♣❛r✐♥❣ t❤❡ ❞❛t❛ ❢♦r t❤❡ tr❛✐♥✐♥❣ ✐♥♣✉t✳
✺✳✷ P❡r❢♦r♠❛♥❝❡ ❡✈❛❧✉❛t✐♦♥
■♥ t❤✐s ♣❛rt ♦❢ t❤❡ ❝❤❛♣t❡r✱ ✇❡ ❛r❡ ♣r❡s❡♥t✐♥❣ ❛♥ ♦✈❡r✈✐❡✇ ♦❢ t❤❡ t❡st✐♥❣ ♦❢ ♦✉r♠♦❞❡❧s ❛❢t❡r tr❛✐♥✐♥❣✳ ❆s ❡①♣❧❛✐♥❡❞ ✐♥ ❈❤❛♣t❡r ✹✳✸✱ ✇❡ ❛r❡ tr❛✐♥✐♥❣ ✹ ❞✐✛❡r❡♥t ♠♦❞❡❧s✇✐t❤ ❞✐✛❡r❡♥t ❧❛②❡rs ❛♥❞ ❞❡❡♣ ❧❡❛r♥✐♥❣ ♣❛r❛♠❡t❡rs ✐♥ ♦r❞❡r t♦ ✜♥❞ t❤❡ ❛♣♣r♦♣r✐❛t❡❝♦♠❜✐♥❛t✐♦♥ ❢♦r t❤❡ tr❛✣❝ ❝❧❛ss✐✜❝❛t✐♦♥✳ ❚❤❡ ❡①♣❡r✐♠❡♥ts ❝♦♥t❛✐♥ ❝❤❛♥❣❡s ♦❢ ❧❛②❡r♥✉♠❜❡r ❛♥❞ ❝❡❧❧ ♥✉♠❜❡r✱ ❧❡❛r♥✐♥❣ r❛t❡✱ ♠❛①❴❜❛t❝❤ s✐③❡✱ ❡t❝✳ ❚❤❡ ▼❛✐♥ ❣♦❛❧ ✐s t♦r❡❞✉❝❡ t❤❡ ❝♦st ❛♥❞ ❛✈♦✐❞ ♦✈❡r✜tt✐♥❣✱ ❛s ✇❡❧❧ ❛s t♦ ❣❡t ❛ ❤✐❣❤ ❥✲st❛t✐st✐❝ ❛♥❞ ❛❝❝✉r❛❝②s❝♦r❡ ❢♦r ❛s ❧✐tt❧❡ t✐♠❡ ❛s ♣♦ss✐❜❧❡✳
❚❤❡ ❞❡s✐❣♥ ♣❛r❛♠❡t❡rs ❢♦r t❤❡ ♠♦❞❡❧s ❛r❡ t❤❡ ❢♦❧❧♦✇✐♥❣✿
❼ ❆❝t✐✈❛t✐♦♥ ❢✉♥❝t✐♦♥✿ ❘❡▲❯
❼ ❖♣t✐♠✐③❡r✿ ❆❞❛♠ ❖♣t✐♠✐③❡r
❼ ❈❧❛ss✐✜❝❛t✐♦♥ ❡♥❣✐♥❡✿ s♦❢t♠❛① ❝r♦ss ❡♥tr♦♣② ❜❡t✇❡❡♥ ❧♦❣✐ts ❛♥❞ ❧❛❜❡❧s
❼ ❲❡✐❣❤t ✐♥✐t✐❛t✐♦♥✿ ❳❛✈✐❡r ✉♥✐❢♦r♠ ✐♥✐t✐❛❧✐③❡r
❼ ❇✐❛s ✐♥✐t✐❛t✐♦♥✿ ❳❛✈✐❡r ✉♥✐❢♦r♠ ✐♥✐t✐❛❧✐③❡r
❚❤❡ ❝❤❛r❛❝t❡r✐st✐❝s ♦❢ t❡st ❞❛t❛ ❛r❡ s❤♦✇♥ ✐♥ ❚❛❜❧❡ ✸
◆✉♠❜❡r ♦❢ ❞❛t❛ ◆✉♠❜❡r ♦❢ ❛tt❛❝❦s ✐♥ t❡st ❞❛t❛ P❡r❝❡♥t❛❣❡ ♦❢ ❛tt❛❝❦ ✐♥ ❞❛t❛✸✻✶✱✷✾✹ ✶✸✱✺✺✵ ✸✳✼✺✪
❚❛❜❧❡ ✸✿ ❚❡st ❞❛t❛ s♣❡❝✐✜❝❛t✐♦♥
✺✸
![Page 61: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/61.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
✺✳✷ P❡r❢♦r♠❛♥❝❡ ❡✈❛❧✉❛t✐♦♥ ✺ ❘❊❙❯▲❚❙
✺✳✷✳✶ ▼♦❞❡❧ ✶
▼♦❞❡❧ ✶ ✐s ❜✉✐❧t ❢r♦♠ ❜❛s✐❝ ▲❙❚▼ ❝❡❧❧s ✇✐t❤ ✈❛r✐❛❜❧❡ ♣❛r❛♠❡t❡rs✳ ❲❡ ❛r❡ ❣♦✐♥❣ t♦ tr❛✐♥✺ ❞✐✛❡r❡♥t ✈❛r✐❛t✐♦♥s ♦❢ ▼♦❞❡❧ ✶✱ ✇❤✐❝❤ ❞✐✛❡r ✐♥ t❤❡ ♥✉♠❜❡r ♦❢ ❤✐❞❞❡♥ ❧❛②❡rs✱ ♥✉♠❜❡r♦❢ ❝❡❧❧s✱ ❧❡❛r♥✐♥❣ r❛t❡✱ ❛♥❞ ♠❛①❴❜❛t❝❤ ✈❛❧✉❡✳ ❚❤✐s ✇✐❧❧ s❤♦✇ ✉s t❤❡ ✐♥✢✉❡♥❝❡ ♦❢ s♦♠❡♣❛r❛♠❡t❡rs ♦♥ t❤❡ ❞❡❡♣ ❧❡❛r♥✐♥❣ ♠♦❞❡❧ ♣❡r❢♦r♠❛♥❝❡ ❛♥❞ ❧❡❛❞ ✉s t♦ t❤❡ ❜❡st ♠♦❞❡❧ ❢♦rtr❛✣❝ ❝❧❛ss✐✜❝❛t✐♦♥✳
❋✐❣✉r❡ ✸✵✿ ▼♦❞❡❧ ✶✳ ❇❛s✐❝▲❙❚▼ ✲ ❝♦♥s✐st ♦❢ ✶ ❧❛②❡r ♦❢ ▲❙❚▼ ❝❡❧❧s✳ ❚❤❡ ✐♥♣✉t ❞❛t❛ ✐s♣❛ss❡❞ t❤r♦✉❣❤ ✶ ❧❛②❡r ♦❢ ▲❙❚▼ ❝❡❧❧s ❛♥❞ ♣❛ss❡❞ t♦ ❞❡♥s❡ ❧❛②❡r✳ ❉❡♥s❡ ❧❛②❡r ✐s ❢✉❧❧②❝♦♥♥❡❝t❡❞ ❧❛②❡r ✇❤✐❝❤ ♦✉t♣✉ts s✐♥❣❧❡ ✈❛❧✉❡s ♣❡r ✢♦✇ ✇❤✐❝❤ ✐s t❤❡♥ ✉s❡❞ t♦ ❝♦♠♣❛r❡✇✐t❤ ✐♥♣✉t ❞❛t❛ ❛♥❞ t♦ ❝❛❧❝✉❧❛t❡ ❧♦ss ❛♥❞ ❛❝❝✉r❛❝②✭r❡❞✉❝❡ ♠❡❛♥✮
◆✉♠❜❡r ♦❢ ▲❛②❡rs
❚❤✐s s✉❜s❡❝t✐♦♥ ❝♦♥t❛✐♥s t❤❡ r❡s✉❧ts ❢r♦♠ ✈❛r②✐♥❣ t❤❡ ◆✉♠❜❡r ♦❢ ▲❛②❡rs ✐♥ ▼♦❞❡❧ ✶✳
✺✹
![Page 62: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/62.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
✺✳✷ P❡r❢♦r♠❛♥❝❡ ❡✈❛❧✉❛t✐♦♥ ✺ ❘❊❙❯▲❚❙
◆✉♠❜❡r ♦❢ ▲❛②❡rs ◆✉♠❜❡r ♦❢ ❝❡❧❧s ✐♥ ❧❛②❡r ❚②♣❡ ♦❢ ❈❡❧❧s ❊♣♦❝❤s ▲❡❛r♥✐♥❣ ❘❛t❡ ♠❛①❴❜❛t❝❤✶✱ ✸✱ ✺ ✶✷✽ ▲❙❚▼ ✶ ✵✳✵✵✶ ✶✵✷✹
❚❛❜❧❡ ✹✿ ❇❛s✐❝ ▲❙❚▼ ◆✉♠❜❡r ♦❢ ❧❛②❡rs ✲ ❇❛s✐❝ ♣❛r❛♠❡t❡rs
❚❛❜❧❡ ✺ s❤♦✇s t❤❡ r❡s✉❧t ♦❢ tr❛✐♥✐♥❣ ▼♦❞❡❧ ✶ ✇✐t❤ ✶✱ ✸ ❛♥❞ ✺ ❧❛②❡rs ♦❢ ❜❛s✐❝ ▲❙❚▼❝❡❧❧s✭✶✷✽ ✉♥✐ts✮✳
❊✈❛❧✉❛t✐♦♥ ♠❡tr✐❝ ✶ ❇❛s✐❝▲❙❚▼ ✸ ❇❛s✐❝▲❙❚▼ ✺ ❇❛s✐❝▲❙❚▼❚r✉❡ P♦s✐t✐✈❡s ✶✶✾✶✷ ✶✷✻✸✼ ✶✶✶✾✼❋❛❧s❡ P♦s✐t✐✈❡s ✶✼✺✾ ✶✼✺✸ ✷✺✺✸❚r✉❡ ◆❡❣❛t✐✈❡s ✸✹✺✾✽✺ ✸✹✺✾✾✶ ✸✹✺✶✾✶❋❛❧s❡ ◆❡❣❛t✐✈❡s ✶✻✸✽ ✾✶✸ ✷✸✺✸
❆❝❝✉r❛❝② ✾✾✳✵✺✪ ✾✾✳✷✻✪ ✾✽✳✻✹✪Pr❡❝✐s✐♦♥ ✽✼✳✶✸✪ ✽✼✳✽✶✪ ✽✶✳✹✸✪❙❡♥s✐t✐✈✐t② ✾✾✳✹✾✪ ✾✸✳✷✻✪ ✽✷✳✻✸✪❋✶ s❝♦r❡ ✽✼✳✺✷✪ ✾✵✳✹✺✪ ✽✷✳✵✷✪❏✲st❛t✐st✐❝ ✽✼✳✹✵✪ ✾✷✳✼✺✪ ✽✶✳✾✵✪
❚❛❜❧❡ ✺✿ ❇❛s✐❝ ▲❙❚▼ ◆✉♠❜❡r ♦❢ ❧❛②❡rs ✲ P❡r❢♦r♠❛♥❝❡ ❡✈❛❧✉❛t✐♦♥
❋r♦♠ t❤❡ r❡s✉❧ts ✇❡ ❝❛♥ s❡❡ t❤❛t t❤❡ ❜❡st s❝♦r❡ ✐s ❛❝❤✐❡✈❡❞ ✇✐t❤ ✸ ❧❛②❡rs ♦❢ ❜❛s✐❝ ▲❙❚▼❝❡❧❧s✳ ❲❡ ❝❛♥ ❛❧s♦ s❡❡ t❤❛t✱ ✇❤❡♥ ✉s✐♥❣ ❛ ✺ ❧❛②❡r ♠♦❞❡❧✱ t❤❡r❡ ✐s s❧✐❣❤t ♦✈❡r✜tt✐♥❣✳ ❍❡♥❝❡✱t❤❡r❡ ✐s ♥♦ ♥❡❡❞ t♦ tr❛✐♥ t❤❡ ♠♦❞❡❧ ✇✐t❤ ♠♦r❡ t❤❡♥ ✺ ❧❛②❡rs ❜❡❝❛✉s❡ ♦✈❡r✜tt✐♥❣ ✇♦✉❧❞❜❡ ❡✈❡♥ ✇♦rs❡✳■♥ ❚❛❜❧❡ ✻✱ t❤❡ r❡s✉❧t ♦❢ ❛tt❛❝❦ r❡❝♦❣♥✐t✐♦♥ ❛❝❝✉r❛❝② ❛r❡ ❞✐s♣❧❛②❡❞✳ ❚❤✐s ❝❛♥ s✉♣♣♦rtt❤❡ r❡s✉❧ts ❢r♦♠ ❚❛❜❧❡ ✺✱ ❛♥❞ s❤♦✇s t❤❛t t❤❡ ✸ ❧❛②❡r ♠♦❞❡❧ ❛❝❤✐❡✈❡s t❤❡ ❜❡st s❝♦r❡❢♦r ❛♥② ❝❛t❡❣♦r② ♦❢ ❛tt❛❝❦s✳ ❲❡ ❝❛♥ ❛❧s♦ ♥♦t✐❝❡❞ t❤❛t t❤❡ ❛❝❝✉r❛❝② ❢♦r s♦♠❡ ❛tt❛❝❦❢❛♠✐❧✐❡s ❛r❡ ③❡r♦✳ ❚❤✐s ✐s ❜❡❝❛✉s❡ ♦❢ t❤❡ ❧♦✇ ❛♣♣❡❛r❛♥❝❡ ♦❢ ❛tt❛❝❦ ✐♥ ❞❛t❛ s❡t✱ ❛♥❞ t❤❡♠♦❞❡❧ ❝❛♥ ♥♦t ❧❡❛r♥ t❤❡ ♣❛tt❡r♥ ♦❢ ❛tt❛❝❦✳
✺✺
![Page 63: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/63.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
✺✳✷ P❡r❢♦r♠❛♥❝❡ ❡✈❛❧✉❛t✐♦♥ ✺ ❘❊❙❯▲❚❙
❆tt❛❝❦s ✶ ❇❛s✐❝▲❙❚▼ ✸ ❇❛s✐❝▲❙❚▼ ✺ ❇❛s✐❝▲❙❚▼●❡♥❡r✐❝ ✽✸✳✵✶✪ ✽✽✳✹✾✪ ✽✷✳✵✹✪❉♦❙ ✽✼✳✸✺✪ ✾✸✳✷✷✪ ✽✶✳✽✼✪
❊①♣❧♦✐ts ✾✶✳✵✻✪ ✾✸✳✽✹✪ ✽✶✳✹✻✪❋✉③③❡rs ✽✻✳✹✻✪ ✾✷✳✻✻✪ ✽✸✳✹✶✪
❘❡❝♦♥♥❛✐ss❛♥❝❡ ✵✪ ✵✪ ✵✪❙❤❡❧❧❝♦❞❡ ✵✪ ✵✪ ✵✪❇❛❝❦❞♦♦r ✵✪ ✵✪ ✵✪❆♥❛❧②s✐s ✵✪ ✵✪ ✵✪❲♦r♠s ✵✪ ✵✪ ✵✪
❚❛❜❧❡ ✻✿ ❇❛s✐❝ ▲❙❚▼ ◆✉♠❜❡r ♦❢ ❧❛②❡rs ✲ ❆❝❝✉r❛❝② ♦❢ ❛tt❛❝❦ ❝❛t❡❣♦r② ❝❧❛ss✐✜❝❛t✐♦♥
▲❡❛r♥✐♥❣ r❛t❡
❆♥♦t❤❡r ✐♠♣♦rt❛♥t ♣❛r❛♠❡t❡r t❤❛t ✇❡ ✇❛♥t t♦ t❡st ✐s t❤❡ ❧❡❛r♥✐♥❣ r❛t❡✳ ❲❡ ❛r❡ tr❛✐♥✐♥❣✶ ❧❛②❡r ♦❢ ❜❛s✐❝ ▲❙❚▼ ❝❡❧❧s✭✶✷✽✮✱ ✇✐t❤ ❧❡❛r♥✐♥❣ r❛t❡s ♦❢ ✵✳✵✶ ❛♥❞ ✵✳✵✵✶✳ ❚❤❡ t✐♠❡ ♦❢tr❛✐♥✐♥❣ ✐s ❛❧s♦ ♣r❡s❡♥t❡❞✳
◆✉♠❜❡r ♦❢ ▲❛②❡rs ◆✉♠❜❡r ♦❢ ❝❡❧❧s ✐♥ ❧❛②❡r ❚②♣❡ ♦❢ ❈❡❧❧s ❊♣♦❝❤s ▲❡❛r♥✐♥❣ ❘❛t❡ ♠❛①❴❜❛t❝❤✶ ✶✷✽ ▲❙❚▼ ✶ ✵✳✵✵✶✱ ✵✳✵✶ ✶✵✷✹
❚❛❜❧❡ ✼✿ ❇❛s✐❝ ▲❙❚▼ ❧❡❛r♥✐♥❣ r❛t❡ ✲ ❇❛s✐❝ ♣❛r❛♠❡t❡rs
❚❤❡ r❡s✉❧ts ❛r❡ s❤♦✇♥ ✐♥ ❚❛❜❧❡ ✽
❊✈❛❧✉❛t✐♦♥ ♠❡tr✐❝ ❧❡❛r♥✐♥❣❴r❛t❡ ❂ ✵✳✵✵✶ ❧❡❛r♥✐♥❣❴r❛t❡ ❂ ✵✳✵✶❚r✉❡ P♦s✐t✐✈❡s ✶✶✾✶✷ ✶✹✽✷❋❛❧s❡ P♦s✐t✐✈❡s ✶✼✺✾ ✶✸✵✷❚r✉❡ ◆❡❣❛t✐✈❡s ✸✹✺✾✽✺ ✸✹✻✹✹✷❋❛❧s❡ ◆❡❣❛t✐✈❡s ✶✻✸✽ ✶✷✵✻✽
❆❝❝✉r❛❝② ✾✾✳✵✺✪ ✾✻✳✷✾✪Pr❡❝✐s✐♦♥ ✽✼✳✶✸✪ ✺✸✳✷✸✪❙❡♥s✐t✐✈✐t② ✾✾✳✹✾✪ ✶✵✳✾✸✪❋✶ s❝♦r❡ ✽✼✳✺✷✪ ✾✾✳✻✷✪❏✲st❛t✐st✐❝ ✽✼✳✹✵✪ ✶✽✳✶✹✪
❚❛❜❧❡ ✽✿ ❇❛s✐❝ ▲❙❚▼ ❧❡❛r♥✐♥❣ r❛t❡ ✲ P❡r❢♦r♠❛♥❝❡ ❡✈❛❧✉❛t✐♦♥
❋r♦♠ t❤❡ r❡s✉❧ts ✇❡ ❝❛♥ s❡❡ t❤❛t t❤❡ ❜❡st s❝♦r❡ ✐s ❛❝❤✐❡✈❡❞ ✇✐t❤ ❧❡❛r♥✐♥❣❴r❛t❡ ❂✵✳✵✵✶✳ ❚❤❡r❡ ✐s ❛ ♠❛❥♦r ❞✐✛❡r❡♥❝❡ ❜❡t✇❡❡♥ t❤❡ ❣✐✈❡♥ tr❛✐♥✐♥❣ ❧❡❛r♥✐♥❣ r❛t❡s✱ s♦ ✇❡ ❛r❡♥♦t ✐♥❝r❡❛s✐♥❣ t❤❡ ✈❛❧✉❡ ♦❢ t❤❡ ♣❛r❛♠❡t❡r ❛♥②♠♦r❡✳ ❖♥ t❤❡ ♦t❤❡r ❤❛♥❞✱ ❞❡❝r❡❛s✐♥❣ t❤❡
✺✻
![Page 64: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/64.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
✺✳✷ P❡r❢♦r♠❛♥❝❡ ❡✈❛❧✉❛t✐♦♥ ✺ ❘❊❙❯▲❚❙
❧❡❛r♥✐♥❣ r❛t❡ ❢✉rt❤❡r ✇♦✉❧❞ ❤❛✈❡ ❛ ♠❛❥♦r ✐♠♣❛❝t ♦♥ t❤❡ t✐♠❡ ♦❢ t❤❡ tr❛✐♥✐♥❣✱ s♦ ✇❡ ❛r❡t❛❦✐♥❣ t❤❡ ✵✳✵✵✶ ✈❛❧✉❡ ❛s t❤❡ ♠♦st ❡✣❝✐❡♥t ♦♥❡✳ ❲❡ ❝❛♥ ♥♦t✐❝❡ t❤❛t t❤❡r❡ ✐s ❛ ❜✐❣❞✐✛❡r❡♥❝❡ ✐♥ s❡♥s✐t✐✈✐t② ❛♥❞ ❥✲st❛t✐st✐❝ ❜❡t✇❡❡♥ t✇♦ ❝♦♠♣❛r❡❞ ❡①♣❡r✐♠❡♥ts✱ ✇❤✐❧❡ ❋✶s❝♦r❡ s❤♦✇s ❡✈❡♥ ✐♠♣r♦✈❡♠❡♥ts✳ ❚❤✐s ✐s ❞✉❡ ♠✉❝❤ ✇♦rs❡ ✈❛❧✉❡ ♦❢ tr✉❡ ♣♦s✐t✐✈❡s✱ ✇❤✐❝❤♠❛❞❡ ❛ str♦♥❣ ✐♠♣❛❝t ♦♥ s❡♥s✐t✐✈✐t② ❛♥❞ ❥✲st❛t✐st✐❝ r❡s♣❡❝t✐✈❡❧②✳❚❛❜❧❡ ✾✱ s❤♦✇s t❤❡ r❡s✉❧ts ♦❢ t❤❡ ❛tt❛❝❦ ❝❧❛ss✐✜❝❛t✐♦♥ ❛❝❝✉r❛❝②✳
❆tt❛❝❦s ❧❡❛r♥✐♥❣❴r❛t❡ ❂ ✵✳✵✵✶ ❧❡❛r♥✐♥❣❴r❛t❡ ❂ ✵✳✵✶●❡♥❡r✐❝ ✽✸✳✵✶✪ ✶✼✳✾✺✪❉♦❙ ✽✼✳✸✺✪ ✹✳✸✵✪
❊①♣❧♦✐ts ✾✶✳✵✻✪ ✷✳✹✻✪❋✉③③❡rs ✽✻✳✹✻✪ ✶✸✳✽✸✪
❘❡❝♦♥♥❛✐ss❛♥❝❡ ✵✪ ✵✪❙❤❡❧❧❝♦❞❡ ✵✪ ✵✪❇❛❝❦❞♦♦r ✵✪ ✵✪❆♥❛❧②s✐s ✵✪ ✵✪❲♦r♠s ✵✪ ✵✪
❚❛❜❧❡ ✾✿ ❇❛s✐❝ ▲❙❚▼ ❧❡❛r♥✐♥❣ r❛t❡ ✲ ❆❝❝✉r❛❝② ♦❢ ❛tt❛❝❦ ❝❛t❡❣♦r② ❝❧❛ss✐✜❝❛t✐♦♥
❈❡❧❧ ✉♥✐ts
❚❤✐s s✉❜s❡❝t✐♦♥ ❞❡s❝r✐❜❡s t❤❡ r❡s✉❧ts ♦❢ tr❛✐♥✐♥❣ t❤❡ ♠♦❞❡❧ ✇✐t❤ ✹ ❞✐✛❡r❡♥t ♥✉♠❜❡rs ♦❢❝❡❧❧s ✐♥ ♦♥❡ ▲❙❚▼ ❧❛②❡r✳ ❚❤❡ ♣✉r♣♦s❡ ♦❢ ❝❡❧❧ ✈❛r✐❛t✐♦♥ ✐s t♦ ✜♥❞ ♦✉t t❤❡ ♣❡r❢❡❝t ♥✉♠❜❡r♦❢ t❤❡ ❝❡❧❧s ✐♥ t❤❡ ❧❛②❡r ✐♥ ♦r❞❡r t♦ ❛✈♦✐❞ ♦✈❡r✜tt✐♥❣✳
◆✉♠❜❡r ♦❢ ▲❛②❡rs ◆✉♠❜❡r ♦❢ ❝❡❧❧s ✐♥ ❧❛②❡r ❚②♣❡ ♦❢ ❈❡❧❧s ❊♣♦❝❤s ▲❡❛r♥✐♥❣ ❘❛t❡ ♠❛①❴❜❛t❝❤✶ ✶✷✽✱ ✺✶✷✱ ✶✵✷✹✱ ✶✺✵✵ ▲❙❚▼ ✶ ✵✳✵✵✶ ✶✵✷✹
❚❛❜❧❡ ✶✵✿ ❇❛s✐❝ ▲❙❚▼ ❝❡❧❧ ✉♥✐ts ✲ ❇❛s✐❝ ♣❛r❛♠❡t❡rs
❘❡s✉❧ts s❤♦✇♥ ♦♥ ❚❛❜❧❡✿ ✶✶
✺✼
![Page 65: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/65.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
✺✳✷ P❡r❢♦r♠❛♥❝❡ ❡✈❛❧✉❛t✐♦♥ ✺ ❘❊❙❯▲❚❙
❊✈❛❧✉❛t✐♦♥ ♠❡tr✐❝ ❝❡❧❧❴♥✉♠ ❂ ✶✷✽ ❝❡❧❧❴♥✉♠ ❂ ✺✶✷ ❝❡❧❧❴♥✉♠ ❂ ✶✵✷✹ ❝❡❧❧❴♥✉♠ ❂ ✶✺✵✵❚r✉❡ P♦s✐t✐✈❡s ✶✶✾✶✷ ✶✷✵✺✺ ✶✷✶✵✽ ✶✶✾✾✾❋❛❧s❡ P♦s✐t✐✈❡s ✶✼✺✾ ✶✻✵✹ ✶✺✼✽ ✶✻✸✵❚r✉❡ ◆❡❣❛t✐✈❡s ✸✹✺✾✽✺ ✸✹✻✶✹✵ ✸✹✻✶✻✻ ✸✹✻✶✶✹❋❛❧s❡ ◆❡❣❛t✐✈❡s ✶✻✸✽ ✶✹✾✺ ✶✹✹✷ ✶✺✺✶
❆❝❝✉r❛❝② ✾✾✳✵✺✪ ✾✾✳✶✹✪ ✾✾✳✶✻✪ ✾✾✳✶✶✪Pr❡❝✐s✐♦♥ ✽✼✳✶✸✪ ✽✽✳✷✺✪ ✽✽✳✹✼✪ ✽✽✳✵✹✪❙❡♥s✐t✐✈✐t② ✾✾✳✹✾✪ ✽✽✳✾✻✪ ✽✾✳✸✺✪ ✽✽✳✺✺✪❋✶ s❝♦r❡ ✽✼✳✺✷✪ ✽✽✳✻✶✪ ✽✽✳✾✶✪ ✽✽✳✷✾✪❏✲st❛t✐st✐❝ ✽✼✳✹✵✪ ✽✽✳✺✶✪ ✽✽✳✾✵✪ ✽✽✳✵✽✪
❚❛❜❧❡ ✶✶✿ ❇❛s✐❝ ▲❙❚▼ ❝❡❧❧ ✉♥✐ts ✲ P❡r❢♦r♠❛♥❝❡ ❡✈❛❧✉❛t✐♦♥
■❢ ✇❡ ❧♦♦❦ ♦♥ t❤❡ ❛❝❝✉r❛❝② ❛♥❞ ❥✲st❛t✐st✐❝✱ t❤❡ ❜❡st r❡s✉❧ts ❛r❡ ❛❝❤✐❡✈❡❞ ✇✐t❤ ❝❡❧❧❴♥✉♠❂ ✶✵✷✹✳ ❖✈❡r❛❧❧ r❡s✉❧ts s❤♦✇ t❤❛t ❝❡❧❧❴♥✉♠ ❂ ✶✷✽ ✐s ❜❡tt❡r s♦❧✉t✐♦♥ ❢♦r ❢✉rt❤❡r ❡①♣❡r✲✐♠❡♥ts✳❚❛❜❧❡ ✶✷ s❤♦✇s t❤❡ r❡s✉❧ts ♦❢ t❤❡ ❛tt❛❝❦ ❝❧❛ss✐✜❝❛t✐♦♥ ❛❝❝✉r❛❝②✳
❊✈❛❧✉❛t✐♦♥ ♠❡tr✐❝ ❝❡❧❧❴♥✉♠ ❂ ✶✷✽ ❝❡❧❧❴♥✉♠ ❂ ✺✶✷ ❝❡❧❧❴♥✉♠ ❂ ✶✵✷✹ ❝❡❧❧❴♥✉♠ ❂ ✶✺✵✵●❡♥❡r✐❝ ✽✸✳✵✶✪ ✽✹✳✶✾✪ ✽✹✳✽✸✪ ✽✸✳✻✺✪❉♦❙ ✽✼✳✸✺✪ ✽✽✳✸✾✪ ✽✾✳✹✸✪ ✽✼✳✷✷✪
❊①♣❧♦✐ts ✾✶✳✵✻✪ ✾✷✳✹✻✪ ✾✸✳✺✶✪ ✾✷✳✶✸✪❋✉③③❡rs ✽✻✳✹✻✪ ✽✼✳✹✼✪ ✽✻✳✾✾✪ ✽✼✳✶✾✪
❘❡❝♦♥♥❛✐ss❛♥❝❡ ✵✪ ✵✪ ✵✪ ✵✪❙❤❡❧❧❝♦❞❡ ✵✪ ✵✪ ✵✪ ✵✪❇❛❝❦❞♦♦r ✵✪ ✵✪ ✵✪ ✵✪❆♥❛❧②s✐s ✵✪ ✵✪ ✵✪ ✵✪❲♦r♠s ✵✪ ✵✪ ✵✪ ✵✪
❚❛❜❧❡ ✶✷✿ ❇❛s✐❝ ▲❙❚▼ ❝❡❧❧ ✉♥✐ts ✲ ❆❝❝✉r❛❝② ♦❢ ❛tt❛❝❦ ❝❛t❡❣♦r② ❝❧❛ss✐✜❝❛t✐♦♥
▼❛①❴❜❛t❝❤
❖♥❡ ♦❢ t❤❡ ❞❡❡♣ ❧❡❛r♥✐♥❣ ♣❛r❛♠❡t❡rs t❤❛t ✇❡ ✜♥❞ ✈❡r② ✐♠♣♦rt❛♥t ✐s t❤❡ ♠❛①✐♠✉♠♥✉♠❜❡r ♦❢ ✢♦✇s ✐♥ ❛ ❜❛t❝❤✳ ❲❡ ❛r❡ ✉s✐♥❣ t❤❡ ✈❛r✐❛❜❧❡ ❜❛t❝❤ s✐③❡✱ ❛♥❞ ❡✈❡r② ❜❛t❝❤ ❝❛♥❝♦♥t❛✐♥ t❤❡ ✢♦✇s ✇✐t❤ s❛♠❡ ❧❡♥❣t❤✳ ■t t✉r♥s ♦✉t t❤❛t t❤❡r❡ ✐s ❛ ❤✉❣❡ ❛♠♦✉♥t ♦❢ tr❛✣❝✇✐t❤ ❛♥ ❡q✉❛❧ ✢♦✇ ❧❡♥❣t❤✳ ❚❤✐s r❡s✉❧ts ✐♥ ❛ ❢❡✇ ❤✉♥❞r❡❞ t❤♦✉s❛♥❞ ✢♦✇s ✐♥ ♦♥❡ ❜❛t❝❤✱✇❤✐❝❤ ❝r❛s❤ ♦✉r ♠♦❞❡❧ tr❛✐♥✐♥❣ ❜❡❝❛✉s❡ ✐t r❡q✉✐r❡s ❛♥ ❡①tr❡♠❡ ❛♠♦✉♥t ♦❢ ❘❆▼✳ ❆s✐❞❡❢r♦♠ t❤❛t✱ ❛ ❧❛r❣❡ ❜❛t❝❤ s✐③❡ ❝♦✉❧❞ r❡s✉❧t ✐♥ ♦✈❡rs❤♦♦t✐♥❣ t❤❡ r❡s✉❧t✳❖♥ t❤❡ ♦t❤❡r ❤❛♥❞✱❛ s♠❛❧❧ ♥✉♠❜❡r ♦❢ ❜❛t❝❤ s✐③❡ r❡s✉❧ts ✐♥ ✐♥❝r❡❛s✐♥❣ t❤❡ tr❛✐♥✐♥❣ t✐♠❡✳
◆✉♠❜❡r ♦❢ ▲❛②❡rs ◆✉♠❜❡r ♦❢ ❝❡❧❧s ✐♥ ❧❛②❡r ❚②♣❡ ♦❢ ❈❡❧❧s ❊♣♦❝❤s ▲❡❛r♥✐♥❣ ❘❛t❡ ♠❛①❴❜❛t❝❤✶✱ ✸✱ ✺ ✶✷✽ ▲❙❚▼ ✶ ✵✳✵✵✶ ✺✶✷✱ ✶✵✷✹✱ ✺✵✵✵✱ ✶✵✵✵✵✱✶✺✵✵✵
❚❛❜❧❡ ✶✸✿ ❇❛s✐❝ ▲❙❚▼ ♠❛①❴❜❛t❝❤ ✲ ❇❛s✐❝ ♣❛r❛♠❡t❡rs
✺✽
![Page 66: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/66.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
✺✳✷ P❡r❢♦r♠❛♥❝❡ ❡✈❛❧✉❛t✐♦♥ ✺ ❘❊❙❯▲❚❙
❊✈❛❧✉❛t✐♦♥ ♠❡tr✐❝ ♠❜ ❂ ✺✶✷ ♠❜ ❂ ✶✵✷✹ ♠❜ ❂ ✺✵✵✵ ♠❜ ❂ ✶✵✵✵✵ ♠❜ ❂ ✶✺✵✵✵❚r✉❡ P♦s✐t✐✈❡s ✶✶✾✺✼ ✶✶✾✶✷ ✶✶✾✹✽ ✶✷✸✶✹ ✶✷✵✾✵❋❛❧s❡ P♦s✐t✐✈❡s ✶✸✽✷ ✶✼✺✾ ✶✼✾✽ ✶✹✺✵ ✶✻✹✺❚r✉❡ ◆❡❣❛t✐✈❡s ✸✹✻✺✽✹ ✸✹✺✾✽✺ ✸✹✺✾✹✻ ✸✹✻✷✾✹ ✸✹✻✵✾✾❋❛❧s❡ ◆❡❣❛t✐✈❡s ✶✸✼✶ ✶✻✸✽ ✶✻✵✷ ✶✷✸✻ ✶✹✻✵
❆❝❝✉r❛❝② ✾✾✳✷✸✪ ✾✾✳✵✺✪ ✾✾✳✵✺✪ ✾✾✳✷✺✪ ✾✾✳✶✹✪Pr❡❝✐s✐♦♥ ✽✾✳✻✸✪ ✽✼✳✶✸✪ ✽✻✳✾✶✪ ✽✾✳✹✻✪ ✽✽✳✵✷✪❙❡♥s✐t✐✈✐t② ✽✾✳✼✶✪ ✾✾✳✹✾✪ ✽✽✳✶✼✪ ✾✵✳✽✼✪ ✽✾✳✷✷✪❋✶ s❝♦r❡ ✽✾✳✻✼✪ ✽✼✳✺✷✪ ✽✼✳✺✹✪ ✾✵✳✶✻✪ ✽✽✳✻✷✪❏✲st❛t✐st✐❝ ✽✾✳✸✶✪ ✽✼✳✹✵✪ ✽✼✳✻✻✪ ✾✵✳✹✻✪ ✽✽✳✼✺✪
❚❛❜❧❡ ✶✹✿ ❇❛s✐❝ ▲❙❚▼ ♠❛①❴❜❛t❝❤ ✲ P❡r❢♦r♠❛♥❝❡ ❡✈❛❧✉❛t✐♦♥
❆❝❝♦r❞✐♥❣ t♦ t❤❡ r❡s✉❧ts✱ t❤❡ ❜❡st s❝♦r❡ ✐s ❛❝❤✐❡✈❡❞ ✇✐t❤ ♠❛①❴❜❛t❝❤ ❂ ✶✵✵✵✵✳ ❍♦✇❡✈❡r✐❢ ✇❡ ❧♦♦❦ ❛t t❤❡ ❛❝❝✉r❛❝②✱ ✐t ✐s ♥♦t ♣♦ss✐❜❧❡ t♦ ❞❡t❡❝t r❡❣✉❧❛r ✐♥❝r❡❛s✐♥❣ ♣❛tt❡r♥s✱ s♦✇❡ ❝❛♥ ❛ss✉♠❡ t❤❛t t❤❡ ♠♦❞❡❧ ❡♥❞s ✉♣ ♦✈❡r✜tt✐♥❣✳ ❚❛❜❧❡ ✶✺✱ s❤♦✇s t❤❡ r❡s✉❧ts ♦❢t❤❡ ❛tt❛❝❦ ❝❧❛ss✐✜❝❛t✐♦♥ ❛❝❝✉r❛❝②✱ ❛♥❞ ✐t ❛❧s♦ s❤♦✇s ❝♦♥❢✉s✐♥❣ ♣❛tt❡r♥s ♦❢ ✐♥❝r❡❛s✐♥❣❛❝❝✉r❛❝② ✈❛❧✉❡s ❢♦r ❞✐✛❡r❡♥t ❛tt❛❝❦ ❝❛t❡❣♦r✐❡s✳
❊✈❛❧✉❛t✐♦♥ ♠❡tr✐❝ ♠❜ ❂ ✺✶✷ ♠❜ ❂ ✶✵✷✹ ♠❜ ❂ ✺✵✵✵ ♠❜ ❂ ✶✵✵✵✵ ♠❜ ❂ ✶✺✵✵✵●❡♥❡r✐❝ ✽✸✳✸✸✪ ✽✸✳✵✶✪ ✽✷✳✵✹✪ ✽✺✳✵✺✪ ✽✸✳✸✸✪❉♦❙ ✾✶✳✺✽✪ ✽✼✳✸✺✪ ✽✽✳✺✷✪ ✾✵✳✽✼✪ ✽✾✳✼✵✪
❊①♣❧♦✐ts ✾✸✳✽✶✪ ✾✶✳✵✻✪ ✾✶✳✹✵✪ ✾✹✳✹✺✪ ✾✸✳✵✼✪❋✉③③❡rs ✽✸✳✻✼✪ ✽✻✳✹✻✪ ✽✻✳✹✾✪ ✽✽✳✽✹✪ ✽✼✳✹✵✪
❘❡❝♦♥♥❛✐ss❛♥❝❡ ✵✪ ✵✪ ✵✪ ✵✪ ✵✪❙❤❡❧❧❝♦❞❡ ✵✪ ✵✪ ✵✪ ✵✪ ✵✪❇❛❝❦❞♦♦r ✵✪ ✵✪ ✵✪ ✵✪ ✵✪❆♥❛❧②s✐s ✵✪ ✵✪ ✵✪ ✵✪ ✵✪❲♦r♠s ✵✪ ✵✪ ✵✪ ✵✪ ✵✪
❚❛❜❧❡ ✶✺✿ ❇❛s✐❝ ▲❙❚▼ ♠❛①❴❜❛t❝❤ ✲ ❆❝❝✉r❛❝② ♦❢ ❛tt❛❝❦ ❝❛t❡❣♦r② ❝❧❛ss✐✜❝❛t✐♦♥
✺✳✷✳✷ ▼♦❞❡❧ ✷
❆s ✇❡ ❢♦✉♥❞ ❛ ❣♦♦❞ ❝♦♠❜✐♥❛t✐♦♥ ♦❢ t❤❡ ♣❛r❛♠❡t❡rs ❢♦r t❤❡ ❜❛s✐❝ ▲❙❚▼ ♠♦❞❡❧✱ ✇❡ ❛r❡tr②✐♥❣ t♦ ❜♦♦st ♦✉r r❡s✉❧ts ✇✐t❤ t❤❡ ✉s❡ ♦❢ r❡❣✉❧❛r✐③❛t✐♦♥ t❡❝❤♥✐q✉❡s✳ ▼♦❞❡❧ ✷ ❝♦♥t❛✐♥s❜❛t❝❤ ♥♦r♠❛❧✐③❛t✐♦♥ ❧❛②❡rs✱ ✇❤✐❝❤ s❤♦✉❧❞ ✐♥❝r❡❛s❡ t❤❡ ❛❝❝✉r❛❝② ❛♥❞ ♣r❡❝✐s✐♦♥ ♦❢ ♦✉r♠♦❞❡❧✱ ❛♥❞ ✇✐❧❧ ❛❧❧♦✇ ✉s t♦ ✉s❡ ❤✐❣❤❡r ❧❡❛r♥✐♥❣ r❛t❡s t❤❡ s❛♠❡ ♦r s♠❛❧❧ ❛♠♦✉♥t ♦❢ t✐♠❡✳■♥ t❤✐s s❡❝t✐♦♥✱ t❤❡ r❡s✉❧ts ♦❢ ✉s✐♥❣ ❜❛t❝❤ ♥♦r♠❛❧✐③❛t✐♦♥ ❛r❡ s❤♦✇♥✳ ❆ ❝♦♠♣❛r✐s♦♥❜❡t✇❡❡♥ t❤❡ ❜❛s✐❝ ▲❙❚▼ ♠♦❞❡❧ ❛♥❞ ♠♦❞❡❧ ✉s✐♥❣ ❜❛t❝❤ ♥♦r♠❛❧✐③❛t✐♦♥ ❧❛②❡r ✐s ❣✐✈❡♥✳❇❡s✐❞❡s t❤❛t✱ ❛♥♦t❤❡r ❝♦♠♣❛r✐s♦♥ ✐s ♠❛❞❡ ❜❡t✇❡❡♥ t❤❡ ♠♦❞❡❧s ✉s✐♥❣ ▲❙❚▼ ❛♥❞ ●❘❯❝❡❧❧s✱ ❛♥❞ ❞✐✛❡r❡♥t ❧❡❛r♥✐♥❣ r❛t❡s ❛r❡ t❡st❡❞✳
✺✾
![Page 67: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/67.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
✺✳✷ P❡r❢♦r♠❛♥❝❡ ❡✈❛❧✉❛t✐♦♥ ✺ ❘❊❙❯▲❚❙
❋✐❣✉r❡ ✸✶✿ ▼♦❞❡❧ ✷✳❇❛t❝❤ ◆♦r♠❛❧✐③❛t✐♦♥ ✲ ❝♦♥s✐st ♦❢ ✶ ❧❛②❡r ♦❢ ▲❙❚▼ ❝❡❧❧s ✇✐t❤ ♦♥❡❜❛t❝❤ ♥♦r♠❛❧✐③❛t✐♦♥ ❧❛②❡r ❜❡t✇❡❡♥ ▲❙❚▼ ❛♥❞ ❞❡♥s❡ ❧❛②❡r
▲❙❚▼ ✇✐t❤ ❇❛t❝❤ ◆♦r♠❛❧✐③❛t✐♦♥
❚❤✐s s✉❜s❡❝t✐♦♥ s❤♦✇s t❤❡ ❝♦♠♣❛r✐s♦♥ ❜❡t✇❡❡♥ t❤❡ ♠♦❞❡❧s ✇✐t❤ ✶ ❛♥❞ ✸ ❧❛②❡rs ♦❢ ❜❛s✐❝▲❙❚▼ ❝❡❧❧s✭✶✷✽✮✱ ❛♥❞ t❤❡ s❛♠❡ ♠♦❞❡❧s ✇✐t❤ ❛ ❜❛t❝❤ ♥♦r♠❛❧✐③❛t✐♦♥ ❧❛②❡r✳ ❘❡s✉❧ts ❛r❡s❤♦✇♥ ✐♥ ❚❛❜❧❡ ✶✼
◆✉♠❜❡r ♦❢ ▲❛②❡rs ◆✉♠❜❡r ♦❢ ❝❡❧❧s ✐♥ ❧❛②❡r ❚②♣❡ ♦❢ ❈❡❧❧s ❊♣♦❝❤s ▲❡❛r♥✐♥❣ ❘❛t❡ ♠❛①❴❜❛t❝❤✶✱ ✸ ✶✷✽ ❇❛t❝❤◆♦r♠ ✱ ▲❙❚▼ ✶ ✵✳✵✵✶ ✶✵✷✹
❚❛❜❧❡ ✶✻✿ ▲❙❚▼ ✇✐t❤ ❇❛t❝❤ ◆♦r♠❛❧✐③❛t✐♦♥ ✲ ❇❛s✐❝ ♣❛r❛♠❡t❡rs
✻✵
![Page 68: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/68.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
✺✳✷ P❡r❢♦r♠❛♥❝❡ ❡✈❛❧✉❛t✐♦♥ ✺ ❘❊❙❯▲❚❙
❊✈❛❧✉❛t✐♦♥ ♠❡tr✐❝ ❇❛t❝❤◆♦r♠ ▲❙❚▼ ✸①❇❛t❝❤◆♦r♠ ✸①▲❙❚▼❚r✉❡ P♦s✐t✐✈❡s ✶✷✸✹✻ ✶✶✾✶✷ ✶✷✸✸✶ ✶✷✻✸✼❋❛❧s❡ P♦s✐t✐✈❡s ✶✼✶✻ ✶✼✺✾ ✶✺✼✷ ✶✼✺✸❚r✉❡ ◆❡❣❛t✐✈❡s ✸✹✻✵✷✽ ✸✹✺✾✽✺ ✸✹✻✶✼✷ ✸✹✺✾✾✶❋❛❧s❡ ◆❡❣❛t✐✈❡s ✶✷✵✹ ✶✻✸✽ ✶✷✶✾ ✾✶✸
❆❝❝✉r❛❝② ✾✾✳✶✾✪ ✾✾✳✵✺✪ ✾✾✳✷✷✪ ✾✾✳✷✻✪Pr❡❝✐s✐♦♥ ✽✼✳✼✾✪ ✽✼✳✶✸✪ ✽✽✳✻✾✪ ✽✼✳✽✶✪❙❡♥s✐t✐✈✐t② ✾✶✳✶✶✪ ✾✾✳✹✾✪ ✾✶✳✵✵✪ ✾✸✳✷✻✪❋✶ s❝♦r❡ ✽✾✳✹✷✪ ✽✼✳✺✷✪ ✽✾✳✽✸✪ ✾✵✳✹✺✪❏✲st❛t✐st✐❝ ✾✵✳✻✷✪ ✽✼✳✹✵✪ ✾✵✳✺✺✪ ✾✷✳✼✺✪
❚❛❜❧❡ ✶✼✿ ▲❙❚▼ ✇✐t❤ ❇❛t❝❤ ◆♦r♠❛❧✐③❛t✐♦♥ ✲ P❡r❢♦r♠❛♥❝❡ ❡✈❛❧✉❛t✐♦♥
❋r♦♠ t❤❡ r❡s✉❧ts✱ ✇❡ ❝❛♥ s❡❡ t❤❛t t❤❡ ❜❡st s❝♦r❡ ✐s ❛❝❤✐❡✈❡❞ ✇✐t❤ t❤❡ ❇❛s✐❝ ▲❙❚▼❝❡❧❧s ✇✐t❤ t❤❡ ❜❛t❝❤ ♥♦r♠❛❧✐③❛t✐♦♥ ❧❛②❡r✳ ❚❤❡r❡ ✐s ❛ s❧✐❣❤t ❞✐✛❡r❡♥❝❡ ✐♥ ❛❝❝✉r❛❝② ❛♥❞✉s✐♥❣ ❜❛t❝❤ ♥♦r♠❛❧✐③❛t✐♦♥ s❤♦✇❡❞ s✉❝❝❡ss✱ ✇❤✐❝❤ ❝♦✉❧❞ ❜❡ s❡❡♥ ✐♥ ✜rst ❝♦❧✉♠♥✳ ❖♥t❤❡ ♦t❤❡r ❤❛♥❞✱ ✉s✐♥❣ ♠♦r❡ ▲❙❚▼ ❧❛②❡rs ✇✐t❤ ❜❛t❝❤ ♥♦r♠❛❧✐③❛t✐♦♥ s❤♦✇❡❞ s❧✐❣❤t❧②✇♦rs❡ ♣❡r❢♦r♠❛♥❝❡ t❤❡♥ ❜❛s✐❝ ▲❙❚▼ ♠♦❞❡❧ ✇✐t❤ s❛♠❡ ♥✉♠❜❡r ♦❢ ❧❛②❡r✱ s❤♦✇♥ ✐♥ t❤✐r❞❝♦❧✉♠♥✳ ❚❤✐s ✐s ♣r♦❜❛❜❧② ❞✉❡ t♦ ❝♦♠♣❧❡① ❝♦♥♥❡❝t✐♦♥ ❜❡t✇❡❡♥ ❧❛②❡rs✳❚❛❜❧❡ ✶✽✱ s❤♦✇s t❤❡ r❡s✉❧t ♦❢ ❛tt❛❝❦ ❝❧❛ss✐✜❝❛t✐♦♥ ❛❝❝✉r❛❝②✳
❊✈❛❧✉❛t✐♦♥ ♠❡tr✐❝ ❇❛t❝❤◆♦r♠ ▲❙❚▼ ✸①❇❛t❝❤◆♦r♠ ✸①▲❙❚▼●❡♥❡r✐❝ ✽✻✳✺✺✪ ✽✸✳✵✶✪ ✽✼✳✵✾✪ ✽✽✳✹✾✪❉♦❙ ✾✵✳✻✶✪ ✽✼✳✸✺✪ ✽✾✳✼✵✪ ✾✸✳✷✷✪
❊①♣❧♦✐ts ✾✸✳✾✹✪ ✾✶✳✵✻✪ ✾✹✳✼✼✪ ✾✸✳✽✹✪❋✉③③❡rs ✽✾✳✸✷✪ ✽✻✳✹✻✪ ✽✽✳✽✶✪ ✾✷✳✻✻✪
❘❡❝♦♥♥❛✐ss❛♥❝❡ ✵✪ ✵✪ ✵✪ ✵✪❙❤❡❧❧❝♦❞❡ ✵✪ ✵✪ ✵✪ ✵✪❇❛❝❦❞♦♦r ✵✪ ✵✪ ✵✪ ✵✪❆♥❛❧②s✐s ✵✪ ✵✪ ✵✪ ✵✪❲♦r♠s ✵✪ ✵✪ ✵✪ ✵✪
❚❛❜❧❡ ✶✽✿ ▲❙❚▼ ✇✐t❤ ❛♥❞ ✇✐t❤♦✉t ❇❛t❝❤ ◆♦r♠❛❧✐③❛t✐♦♥ ✲ ❆❝❝✉r❛❝② ♦❢ ❛tt❛❝❦ ❝❛t❡❣♦r②❝❧❛ss✐✜❝❛t✐♦♥
▲❡❛r♥✐♥❣ r❛t❡
❚❤❡ ♠❛✐♥ ❣♦❛❧ ♦❢ t❤✐s s❡❝t✐♦♥ ✐s t♦ s❤♦✇ t❤❛t ❜② ✉s✐♥❣ ❇❛t❝❤ ◆♦r♠❛❧✐③❛t✐♦♥✱ ❧❡❛r♥✐♥❣r❛t❡ ❝♦✉❧❞ ❜❡ ❞❡❝r❡❛s❡❞ ✇✐t❤♦✉t s✐❣♥✐✜❝❛♥t ❞✐✛❡r❡♥❝❡ ✐♥ r❡s✉❧ts✳❘❡s✉❧ts ❛r❡ s❤♦✇♥ ✐♥ ❚❛❜❧❡ ✷✵
✻✶
![Page 69: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/69.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
✺✳✷ P❡r❢♦r♠❛♥❝❡ ❡✈❛❧✉❛t✐♦♥ ✺ ❘❊❙❯▲❚❙
◆✉♠❜❡r ♦❢ ▲❛②❡rs ◆✉♠❜❡r ♦❢ ❝❡❧❧s ✐♥ ❧❛②❡r ❚②♣❡ ♦❢ ❈❡❧❧s ❊♣♦❝❤s ▲❡❛r♥✐♥❣ ❘❛t❡ ♠❛①❴❜❛t❝❤✶✱ ✸ ✶✷✽ ❇❛t❝❤◆♦r♠ ✶ ✵✳✵✵✶✱ ✵✳✵✵✶ ✶✵✷✹
❚❛❜❧❡ ✶✾✿ ❇❛t❝❤ ◆♦r♠❛❧✐③❛t✐♦♥ ❧❡❛r♥✐♥❣ r❛t❡ ✲ ❇❛s✐❝ ♣❡r❢♦r♠❛♥❝❡
❊✈❛❧✉❛t✐♦♥ ♠❡tr✐❝ ❇❛t❝❤◆♦r♠✭✵✳✵✶✮ ✸①❇❛t❝❤◆♦r♠✭✵✳✵✶✮ ❇❛t❝❤◆♦r♠✭✵✳✵✵✶✮ ✸①❇❛t❝❤◆♦r♠✭✵✳✵✵✶✮❚r✉❡ P♦s✐t✐✈❡s ✷✾✷✵ ✶✶✷✶ ✶✷✸✹✻ ✶✷✸✸✶❋❛❧s❡ P♦s✐t✐✈❡s ✶✾✾✶ ✽✻✽ ✶✼✶✻ ✶✺✼✷❚r✉❡ ◆❡❣❛t✐✈❡s ✸✹✺✼✺✸ ✸✹✻✽✼✻ ✸✹✻✵✷✽ ✸✹✻✶✼✷❋❛❧s❡ ◆❡❣❛t✐✈❡s ✶✵✻✸✵ ✶✷✹✷✾ ✶✷✵✹ ✶✷✶✾
❆❝❝✉r❛❝② ✾✻✳✺✵✪ ✾✻✳✸✶✪ ✾✾✳✶✾✪ ✾✾✳✷✷✪Pr❡❝✐s✐♦♥ ✺✾✳✹✺✪ ✺✻✳✸✻✪ ✽✼✳✼✾✪ ✽✽✳✻✾✪❙❡♥s✐t✐✈✐t② ✷✶✳✺✹✪ ✽✳✷✼✪ ✾✶✳✶✶✪ ✾✶✳✵✵✪❋✶ s❝♦r❡ ✸✶✳✻✸✪ ✶✹✳✹✷✪ ✽✾✳✹✷✪ ✽✾✳✽✸✪❏✲st❛t✐st✐❝ ✷✵✳✾✼✪ ✽✳✵✷✪ ✾✵✳✻✷✪ ✾✵✳✺✺✪
❚❛❜❧❡ ✷✵✿ ❇❛t❝❤ ◆♦r♠❛❧✐③❛t✐♦♥ ❧❡❛r♥✐♥❣ r❛t❡ ✲ P❡r❢♦r♠❛♥❝❡ ❡✈❛❧✉❛t✐♦♥
❚r❛✐♥✐♥❣ t❤❡ ♠♦❞❡❧ ✇✐t❤ ❧❡❛r♥✐♥❣❴r❛t❡ ❂ ✵✳✵✶ ✐s r❡s✉❧t✐♥❣ ✐♥ ♠✉❝❤ ✇♦rs❡ ♣❡r❢♦r♠❛♥❝❡t❤❡♥ ❧❡❛r♥✐♥❣❴r❛t❡ ❂ ✵✳✵✵✶✳ ■t s❤♦✇❡❞ ❡✈❡♥ ✇♦rs❡ r❡s✉❧ts t❤❛♥ tr❛✐♥✐♥❣ ♠♦❞❡❧ ✶ ✇✐t❤❧❡❛r♥✐♥❣❴r❛t❡ ❂ ✵✳✵✶✳ ❚❤❡r❡ ✐s ♥♦t ❛♥② ♣♦ss✐❜✐❧✐t② t♦ ❞❡❝r❡❛s❡ t❤❡ ❧❡❛r♥✐♥❣ r❛t❡ ✉s✐♥❣❇❛t❝❤ ◆♦r♠❛❧✐③❛t✐♦♥ ▲❛②❡r✱ ❛❝❝♦r❞✐♥❣ t♦ t❤❡ r❡s✉❧ts✳❚❤❡ ❚❛❜❧❡ ✷✶✱ s❤♦✇s t❤❡ r❡s✉❧t ♦❢ ❛tt❛❝❦ ♣r❡❞✐❝t✐♦♥ ❛❝❝✉r❛❝②✳ ❚❤❡ r❡s✉❧ts ❢♦❧❧♦✇ t❤❡s❛♠❡ tr❡♥❞ ❧✐❦❡ ✐♥ ♣r❡✈✐♦✉s t❛❜❧❡✳ ■t ✐s ❛❧s♦ ✇♦rt❤ ♠❡♥t✐♦♥✐♥❣ t❤❛t t❤❡ r❡s✉❧ts ❢♦r ✸❧❛②❡rs ♦❢ ▲❙❚▼ ✇✐t❤ ❜❛t❝❤ ♥♦r♠❛❧✐③❛t✐♦♥ s❤♦✇❡❞ ✇♦rs❡ r❡s✉❧t✱ ♣r♦❜❛❜❧② ❞✉❡ t♦ t❤❡❧❛②❡r ❝♦♠♣❧❡①✐t②✳
❊✈❛❧✉❛t✐♦♥ ♠❡tr✐❝ ❇❛t❝❤◆♦r♠✭✵✳✵✶✮ ✸①❇❛t❝❤◆♦r♠✭✵✳✵✶✮ ❇❛t❝❤◆♦r♠✭✵✳✵✵✶✮ ✸①❇❛t❝❤◆♦r♠✭✵✳✵✵✶✮●❡♥❡r✐❝ ✷✺✳✾✶✪ ✶✸✳✷✷✪ ✽✻✳✺✺✪ ✽✼✳✵✾✪❉♦❙ ✶✼✳✼✸✪ ✹✳✸✵✪ ✾✵✳✻✶✪ ✽✾✳✼✵✪
❊①♣❧♦✐ts ✶✹✳✼✶✪ ✵✳✾✽✪ ✾✸✳✾✹✪ ✾✹✳✼✼✪❋✉③③❡rs ✷✹✳✷✸✪ ✶✵✳✹✷✪ ✽✾✳✸✷✪ ✽✽✳✽✶✪
❘❡❝♦♥♥❛✐ss❛♥❝❡ ✵✪ ✵✪ ✵✪ ✵✪❙❤❡❧❧❝♦❞❡ ✵✪ ✵✪ ✵✪ ✵✪❇❛❝❦❞♦♦r ✵✪ ✵✪ ✵✪ ✵✪❆♥❛❧②s✐s ✵✪ ✵✪ ✵✪ ✵✪❲♦r♠s ✵✪ ✵✪ ✵✪ ✵✪
❚❛❜❧❡ ✷✶✿ ❇❛t❝❤ ◆♦r♠❛❧✐③❛t✐♦♥ ❧❡❛r♥✐♥❣ r❛t❡ ✲ ❆❝❝✉r❛❝② ♦❢ ❛tt❛❝❦ ❝❛t❡❣♦r② ❝❧❛ss✐✜❝❛t✐♦♥
✺✳✷✳✸ ▼♦❞❡❧ ✸
❆♥♦t❤❡r t❡❝❤♥✐q✉❡ ❢♦r r❡❣✉❧❛r✐③❛t✐♦♥ t❤❛t ✇❡ ❛r❡ ✉s✐♥❣ ✐s ▲❛②❡r ◆♦r♠❛❧✐③❛t✐♦♥✳ ❆s ❛❧✲r❡❛❞② ♠❡♥t✐♦♥❡❞ ✐♥ ❈❤❛♣t❡r ✹✳✺✱ ▲❛②❡r ◆♦r♠❛❧✐③❛t✐♦♥ s❤♦✉❧❞ ♣r♦✈✐❞❡ ✉s ✇✐t❤ ❛❞❞✐t✐♦♥❛❧
✻✷
![Page 70: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/70.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
✺✳✷ P❡r❢♦r♠❛♥❝❡ ❡✈❛❧✉❛t✐♦♥ ✺ ❘❊❙❯▲❚❙
❡✣❝✐❡♥❝② ❞✉r✐♥❣ t❤❡ tr❛✐♥✐♥❣✳ ❲❡ ❛r❡ ❝♦♠♣❛r✐♥❣ ♠♦❞❡❧s ✇✐t❤ ▲❛②❡r ◆♦r♠❛❧✐③❛t✐♦♥✱❇❛t❝❤ ◆♦r♠❛❧✐③❛t✐♦♥ ❧❛②❡rs ❛♥❞ ❜❛s✐❝ ♠♦❞❡❧✳
❋✐❣✉r❡ ✸✷✿ ▼♦❞❡❧ ✸✳▲❛②❡r ◆♦r♠❛❧✐③❛t✐♦♥ ✲ ❝♦♥s✐st ♦❢ ✶ ❧❛②❡r ♦❢ ▲❙❚▼ ❝❡❧❧s ❢♦❧❧♦✇❡❞ ❜②❧❛②❡r ♥♦r♠❛❧✐③❛t✐♦♥ ❧❛②❡r✱ ✇❤✐❝❤ ✐s ❝♦♥♥❡❝t❡❞ t♦ ❞❡♥s❡ ❧❛②❡r
▲❛②❡r ◆♦r♠❛❧✐③❛t✐♦♥ ▲❛②❡r ✈s ❇❛t❝❤ ◆♦r♠❛❧✐③❛t✐♦♥ ✈s ▲❙❚▼
◆✉♠❜❡r ♦❢ ▲❛②❡rs ◆✉♠❜❡r ♦❢ ❝❡❧❧s ✐♥ ❧❛②❡r ❚②♣❡ ♦❢ ❈❡❧❧s ❊♣♦❝❤s ▲❡❛r♥✐♥❣ ❘❛t❡ ♠❛①❴❜❛t❝❤✶✱ ✸ ✶✷✽ ▲❛②❡r◆♦r♠✱ ❇❛t❝❤◆♦r♠ ✱ ▲❙❚▼ ✶ ✵✳✵✵✶ ✶✵✷✹
❚❛❜❧❡ ✷✷✿ ▲❙❚▼ ✇✐t❤ ▲❛②❡r ◆♦r♠❛❧✐③❛t✐♦♥ ▲❛②❡r ❛♥❞ ❇❛t❝❤ ◆♦r♠❛❧✐③❛t✐♦♥ ✲ ❇❛s✐❝♣❛r❛♠❡t❡rs
❘❡s✉❧ts ❛r❡ s❤♦✇♥ ✐♥ ❚❛❜❧❡ ✷✸
✻✸
![Page 71: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/71.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
✺✳✷ P❡r❢♦r♠❛♥❝❡ ❡✈❛❧✉❛t✐♦♥ ✺ ❘❊❙❯▲❚❙
❊✈❛❧✉❛t✐♦♥ ♠❡tr✐❝ ▲❛②❡r◆♦r♠ ❇❛t❝❤◆♦r♠ ▲❙❚▼❚r✉❡ P♦s✐t✐✈❡s ✶✶✼✼✵ ✶✷✸✹✻ ✶✶✾✶✷❋❛❧s❡ P♦s✐t✐✈❡s ✺✷✷✺ ✶✼✶✻ ✶✼✺✾❚r✉❡ ◆❡❣❛t✐✈❡s ✸✹✷✺✶✾ ✸✹✻✵✷✽ ✸✹✺✾✽✺❋❛❧s❡ ◆❡❣❛t✐✈❡s ✶✼✽✵ ✶✷✵✹ ✶✻✸✽
❆❝❝✉r❛❝② ✾✽✳✵✻✪ ✾✾✳✶✾✪ ✾✾✳✵✺✪Pr❡❝✐s✐♦♥ ✻✾✳✷✺✪ ✽✼✳✼✾✪ ✽✼✳✶✸✪❙❡♥s✐t✐✈✐t② ✽✻✳✽✻✪ ✾✶✳✶✶✪ ✽✼✳✾✶✪❋✶ s❝♦r❡ ✼✼✳✵✻✪ ✽✾✳✹✷✪ ✽✼✳✺✷✪❏✲st❛t✐st✐❝ ✽✺✳✸✻✪ ✾✵✳✻✷✪ ✽✼✳✹✵✪
❚❛❜❧❡ ✷✸✿ ▲❙❚▼ ✇✐t❤ ▲❛②❡r ◆♦r♠❛❧✐③❛t✐♦♥ ▲❛②❡r ❛♥❞ ❇❛t❝❤ ◆♦r♠❛❧✐③❛t✐♦♥ ✲ P❡r❢♦r✲♠❛♥❝❡ ❡✈❛❧✉❛t✐♦♥
❆❢t❡r ❝♦♠♣❛r✐♥❣ t❤❡ r❡s✉❧ts✱ ✇❡ ❝❛♥ ❝♦♥❝❧✉❞❡ t❤❛t ✉s✐♥❣ ❧❛②❡r ♥♦r♠❛❧✐③❛t✐♦♥ ❞✐❞ ♥♦t❤❡❧♣ ✉s t♦ ♣r♦✈✐❞❡ ❜❡tt❡r ❝❧❛s✐✜❝❛t✐♦♥ ♣❡r❢♦r♠❛♥❝❡ t♦ ♦✉r ♠♦❞❡❧✳ ❲❡ ✇♦✉❧❞ ♥♦t ❣✉✐❞❡♦✉r ❡①♣❡r✐♠❡♥t ✐♥ t❤✐s ❞✐r❡❝t✐♦♥ ❛♥② ♠♦r❡ s✐♥❝❡ ♦✉r r❡s✉❧ts ❤❛✈❡ ♥♦t s❤♦✇♥ ❡①♣❡❝t❡❞✐♠♣r♦✈❡♠❡♥t ♦❢ ♣❡r❢♦r♠❛♥❝❡✳
❊✈❛❧✉❛t✐♦♥ ♠❡tr✐❝ ▲❛②❡r◆♦r♠ ❇❛t❝❤◆♦r♠ ▲❙❚▼●❡♥❡r✐❝ ✽✸✳✾✼✪ ✽✻✳✺✺✪ ✽✸✳✵✶✪❉♦❙ ✽✼✳✷✷✪ ✾✵✳✻✶✪ ✽✼✳✸✺✪
❊①♣❧♦✐ts ✽✾✳✶✺✪ ✾✸✳✾✹✪ ✾✶✳✵✻✪❋✉③③❡rs ✽✹✳✹✾✪ ✽✾✳✸✷✪ ✽✻✳✹✻✪
❘❡❝♦♥♥❛✐ss❛♥❝❡ ✵✪ ✵✪ ✵✪❙❤❡❧❧❝♦❞❡ ✵✪ ✵✪ ✵✪❇❛❝❦❞♦♦r ✵✪ ✵✪ ✵✪❆♥❛❧②s✐s ✵✪ ✵✪ ✵✪❲♦r♠s ✵✪ ✵✪ ✵✪
❚❛❜❧❡ ✷✹✿ ▲❙❚▼ ✇✐t❤ ▲❛②❡r ◆♦r♠❛❧✐③❛t✐♦♥ ▲❛②❡r ❛♥❞ ❇❛t❝❤ ◆♦r♠❛❧✐③❛t✐♦♥ ✲ ❆❝❝✉r❛❝②♦❢ ❛tt❛❝❦ ❝❛t❡❣♦r② ❝❧❛ss✐✜❝❛t✐♦♥
✺✳✷✳✹ ▼♦❞❡❧ ✹
❚❤❡ ▲❛st ♠♦❞❡❧ t❤❛t ✇❡ ❛r❡ t❡st✐♥❣ ✐s ♠❛❞❡ ♦❢ ●❘❯ ❝❡❧❧s✳ ❲❡ ✇♦✉❧❞ ❧✐❦❡ t♦ t❡st♣❡r❢♦r♠❛♥❝❡ ❡✣❝✐❡♥❝② ♦❢ ●❘❯ ❝❡❧❧s ✐♥ ❝♦♠♣❛r✐s♦♥ ✇✐t❤ ❛❧r❡❛❞② ♣r♦✈❡♥ ▲❙❚▼ ♠♦❞❡❧✳❙✐♥❝❡ ●❘❯ ❤❛s s♦♠❡ ✐♠♣r♦✈❡♠❡♥ts ✐♥ ❝❡❧❧ ❞❡s✐❣♥✱ ✇❡ ❛r❡ ❡①♣❡❝t✐♥❣ ❜❡tt❡r ❡✣❝✐❡♥❝②✳
✻✹
![Page 72: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/72.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
✺✳✷ P❡r❢♦r♠❛♥❝❡ ❡✈❛❧✉❛t✐♦♥ ✺ ❘❊❙❯▲❚❙
❋✐❣✉r❡ ✸✸✿ ▼♦❞❡❧ ✹✳ ●❘❯ ❝❡❧❧ ▲❛②❡r ✲ ❝♦♥s✐st ♦❢ ✶ ❧❛②❡r ♦❢ ●❘❯ ❝❡❧❧s ✐♥st❡❛❞ ▲❙❚▼❝❡❧❧s ❝♦♥♥❡❝t❡❞ t♦ ❞❡♥s❡ ❧❛②❡r
●❘❯ ✈s ▲❙❚▼
◆✉♠❜❡r ♦❢ ▲❛②❡rs ◆✉♠❜❡r ♦❢ ❝❡❧❧s ✐♥ ❧❛②❡r ❚②♣❡ ♦❢ ❈❡❧❧s ❊♣♦❝❤s ▲❡❛r♥✐♥❣ ❘❛t❡ ♠❛①❴❜❛t❝❤✶✱ ✸ ✶✷✽ ▲❙❚▼✱ ●❘❯ ✶ ✵✳✵✵✶ ✶✵✷✹
❚❛❜❧❡ ✷✺✿ ●❘❯ ✈s✳ ▲❙❚▼ ✲ ❇❛s✐❝ ♣❛r❛♠❡t❡rs
❘❡s✉❧ts ❛r❡ s❤♦✇♥ ✐♥ ❚❛❜❧❡ ✷✻
✻✺
![Page 73: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/73.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
✺✳✸ ❙✉♠♠❛r② ✺ ❘❊❙❯▲❚❙
❊✈❛❧✉❛t✐♦♥ ♠❡tr✐❝ ▲❙❚▼ ●❘❯ ✸①▲❙❚▼ ✸①●❘❯❚r✉❡ P♦s✐t✐✈❡s ✶✶✾✶✷ ✶✷✵✸✻ ✶✷✻✸✼ ✶✶✹✾✹❋❛❧s❡ P♦s✐t✐✈❡s ✶✼✺✾ ✶✺✶✻ ✶✼✺✸ ✷✻✹✻❚r✉❡ ◆❡❣❛t✐✈❡s ✸✹✺✾✽✺ ✸✹✻✷✷✽ ✸✹✺✾✾✶ ✸✹✺✵✾✽❋❛❧s❡ ◆❡❣❛t✐✈❡s ✶✻✸✽ ✶✺✶✹ ✾✶✸ ✷✵✺✻
❆❝❝✉r❛❝② ✾✾✳✵✺✪ ✾✾✳✶✻✪ ✾✾✳✷✻✪ ✾✽✳✻✾✪Pr❡❝✐s✐♦♥ ✽✼✳✶✸✪ ✽✽✳✽✶✪ ✽✼✳✽✶✪ ✽✶✳✷✽✪❙❡♥s✐t✐✈✐t② ✾✾✳✹✾✪ ✽✽✳✽✷✪ ✾✸✳✷✻✪ ✽✹✳✽✷✪❋✶ s❝♦r❡ ✽✼✳✺✷✪ ✽✽✳✽✷✪ ✾✵✳✹✺✪ ✽✸✳✵✶✪❏✲st❛t✐st✐❝ ✽✼✳✹✵✪ ✽✽✳✸✾✪ ✾✷✳✼✺✪ ✽✹✳✵✻✪
❚❛❜❧❡ ✷✻✿ ●❘❯ ✈s✳ ▲❙❚▼ ✲ P❡r❢♦r♠❛♥❝❡ ❡✈❛❧✉❛t✐♦♥
❋r♦♠ t❤❡ r❡s✉❧ts ✇❡ ❝❛♥ s❡❡ t❤❛t ●❘❯ ✐s ❣✐✈✐♥❣ ❜❡tt❡r ♣❡r❢♦r♠❛♥❝❡ t❤❡♥ ▲❙❚▼✳ ❖♥t❤❡ ♦t❤❡r ❤❛♥❞✱ ✐♥❝r❡❛s✐♥❣ t❤❡ ♥✉♠❜❡r ♦❢ ❧❛②❡rs ♦❢ ●❘❯ ❝❡❧❧s ❡♥❞s ✉♣ ✐♥ ♦✈❡r✜tt✐♥❣ ❛♥❞✐♥ t❤❡ ❧♦♥❣ r✉♥✱ ▲❙❚▼ ✐s ❛ ❜❡tt❡r ❝❤♦✐❝❡✳❚❤❡ ❚❛❜❧❡✿ ✷✼✱ s❤♦✇s t❤❡ r❡s✉❧t ♦❢ ❛tt❛❝❦ ♣r❡❞✐❝t✐♦♥ ❛❝❝✉r❛❝②✳
❊✈❛❧✉❛t✐♦♥ ♠❡tr✐❝ ▲❙❚▼ ●❘❯ ✸①▲❙❚▼ ✸①●❘❯●❡♥❡r✐❝ ✽✸✳✵✶✪ ✽✹✳✸✵✪ ✽✽✳✹✾✪ ✽✷✳✹✼✪❉♦❙ ✽✼✳✸✺✪ ✽✼✳✷✷✪ ✾✸✳✷✷✪ ✽✶✳✸✺✪
❊①♣❧♦✐ts ✾✶✳✵✻✪ ✾✷✳✸✻✪ ✾✸✳✽✹✪ ✽✸✳✻✹✪❋✉③③❡rs ✽✻✳✹✻✪ ✽✼✳✻✽✪ ✾✷✳✻✻✪ ✽✺✳✷✵✪
❘❡❝♦♥♥❛✐ss❛♥❝❡ ✵✪ ✵✪ ✵✪ ✵✪❙❤❡❧❧❝♦❞❡ ✵✪ ✵✪ ✵✪ ✵✪❇❛❝❦❞♦♦r ✵✪ ✵✪ ✵✪ ✵✪❆♥❛❧②s✐s ✵✪ ✵✪ ✵✪ ✵✪❲♦r♠s ✵✪ ✵✪ ✵✪ ✵✪
❚❛❜❧❡ ✷✼✿ ●❘❯ ✈s✳ ▲❙❚▼ ✲ ❆❝❝✉r❛❝② ♦❢ ❛tt❛❝❦ ❝❛t❡❣♦r② ❝❧❛ss✐✜❝❛t✐♦♥
✺✳✸ ❙✉♠♠❛r②
❇❛s❡❞ ♦♥ t❤❡ st❛t❡❞ r❡s✉❧ts ✐♥ ♣r❡✈✐♦✉s s✉❜s❡❝t✐♦♥✱ ✇❡ ❝❛♥ ❝♦♥❝❧✉❞❡ t❤❛t t❤❡ ❜❡st♣❡r❢♦r♠❛♥❝❡ ✐s ❣✐✈❡♥ ❜② ▼♦❞❡❧ ✶✱ t❤❡ ❇❛s✐❝ ▲❙❚▼ ♠♦❞❡❧✳ ❖✉r ❡①♣❡r✐♠❡♥ts s❤♦✇❡❞t❤❛t ✐♥❝r❡❛s✐♥❣ t❤❡ ♥✉♠❜❡r ♦❢ ❧❛②❡rs t♦ ✸ ♠❛❞❡ ❛♥ ✐♠♣r♦✈❡♠❡♥t ✐♥ ♣❡r❢♦r♠❛♥❝❡✱❛❧t❤♦✉❣❤ ✐♥❝r❡❛s✐♥❣ ✐t ♠♦r❡ t❤❡♥ ✸ ❡♥❞❡❞ ✉♣ ✐♥ ♦✈❡r✜tt✐♥❣✳ ▲❡❛r♥✐♥❣ r❛t❡ ✇❤✐❝❤ s❤♦✇❡❞t❤❡ ❜❡st r❡s✉❧ts ✇✐t❤ ❛❧❧ t❤❡ t❡st❡❞ ♠♦❞❡❧s ✇❛s ✵✳✵✵✶✳ ■♥❝r❡❛s✐♥❣ t❤❡ ♥✉♠❜❡r ♦❢ ❝❡❧❧s✐♥ ❧❛②❡r t♦ ✶✵✷✹ ❜② ♠♦❞❡❧ ✶ s❤♦✇❡❞ ✐♥❝r❡❛s❡ ✐♥ ❛❝❝✉r❛❝②✱ ❥✲st❛t✐st✐❝ ❛♥❞ ♣r❡❝✐s✐♦♥✱ ❜✉t♦✈❡r❛❧❧ t❤❡ ❜❡st s❝♦r❡ ✇❛s ❛❝❤✐❡✈❡❞ ❜② ❝❡❧❧ ♥✉♠❜❡r ✶✷✽✳ ❊①♣❡r✐♠❡♥t✐♥❣ ✇✐t❤ ♠❛①✐♠❛❧
✻✻
![Page 74: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/74.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
✺✳✸ ❙✉♠♠❛r② ✺ ❘❊❙❯▲❚❙
❜❛t❝❤ s✐③❡ ❡♥❞❡❞ ✉♣ ✐♥ ♦✈❡r✜tt✐♥❣✱ s♦ t❤❡ ♦♣t✐♠❛❧ ✈❛❧✉❡s ✇♦✉❧❞ ❜❡ ✶✵✷✹✳
❚❡st✐♥❣ ❛ ❞✐✛❡r❡♥t r❡❣✉❧❛r✐③❛t✐♦♥ t❡❝❤♥✐q✉❡s✱ ❡♥❞❡❞ ✉♣ ✇♦rs❡ t❤❡♥ ✇❡ ❡①♣❡❝t❡❞✳ ▲❛②❡r♥♦r♠❛❧✐③❛t✐♦♥ t❡❝❤♥✐q✉❡ ✇❛s ❛❝❤✐❡✈❡❞ ✇♦rs❡ r❡s✉❧t ❝♦♠♣❛r❡ t♦ t❤❡ ❜❛t❝❤ ♥♦r♠❛❧✐③❛t✐♦♥♠♦❞❡❧ ❛♥❞ ❜❛s✐❝ ▲❙❚▼ ♠♦❞❡❧✳ ❇❛t❝❤ ♥♦r♠❛❧✐③❛t✐♦♥ s❤♦✇❡❞ ✐♠♣r♦✈❡♠❡♥t ✐♥ ❛❧❧♣❡r❢♦r♠❛♥❝❡ ♠❡tr✐❝ ♣❛r❛♠❡t❡rs✳ ▼♦✈✐♥❣ t♦✇❛r❞s ✉s✐♥❣ ♠♦r❡ ▲❙❚▼ ❧❛②❡rs ✇✐t❤ ❜❛t❝❤♥♦r♠❛❧✐③❛t✐♦♥ ❧❛②❡r✱ s❤♦✇❡❞ ✇♦rs❡ ♣❡r❢♦r♠❛♥❝❡ t❤❛♥ ♠✉❧t✐✲❧❛②❡r ▲❙❚▼ ✇✐t❤♦✉t ❜❛t❝❤♥♦r♠❛❧✐③❛t✐♦♥ ❧❛②❡r✳
❆♥♦t❤❡r ✉s❡❢✉❧ ❡①♣❡r✐♠❡♥t ✉s✐♥❣ ♠♦❞❡❧ ✹ ✇✐t❤ ●❘❯ ❝❡❧❧s✱ s❤♦✇❡❞ ❣r❛t❡ ✐♠♣r♦✈❡♠❡♥t❝♦♠♣❛r❡❞ t♦ ▲❙❚▼ ❝❡❧❧ ♠♦❞❡❧✳ ❯♥❢♦rt✉♥❛t❡❧②✱ ✐♥❝r❡❛s✐♥❣ t❤❡ ♥✉♠❜❡r ♦❢ ❧❛②❡rs ✐t ❛❧❧t❤❡ ♣❡r❢♦r♠❛♥❝❡ ♠❡tr✐❝ ♣❛r❛♠❡t❡rs ❜❛❞❧② ❞❡❝r❡❛s❡❞✳
❚❤❡ ❜❡st ♠♦❞❡❧ ✇✐t❤ ❡✣❝✐❡♥t ✈❛❧✉❡s ♦❢ ♣❛r❛♠❡t❡rs✿
▼♦❞❡❧ ▲❛②❡r ♥✉♠❜❡r ❈❡❧❧ ♥✉♠❜❡rs ❚②♣❡ ♦❢ ❈❡❧❧s ❊♣♦❝❤s ▲❡❛r♥✐♥❣ ❘❛t❡ ♠❛①❴❜❛t❝❤▼♦❞❡❧ ✶ ✸ ✶✷✽ ▲❙❚▼ ✶ ✵✳✵✵✶ ✶✵✷✹
❚❛❜❧❡ ✷✽✿ ❚❤❡ ♠♦st ❡✣❝✐❡♥t ♠♦❞❡❧ ❛❝❝♦r❞✐♥❣ t♦ ♦✉r ❡①♣❡r✐♠❡♥ts
✻✼
![Page 75: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/75.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
✻ ❈❖◆❈▲❯❙■❖◆
✻ ❈♦♥❝❧✉s✐♦♥
❉✉r✐♥❣ t❤❡ r❡s❡❛r❝❤✱ ♦✉r ♠❛✐♥ ❣♦❛❧ ✇❛s t♦ ❝❧❛ss✐❢② t❤❡ ❡♥❝r②♣t❡❞ ♥❡t✇♦r❦ tr❛✣❝✉s✐♥❣ ❞❡❡♣ ❧❡❛r♥✐♥❣ ♠❡t❤♦❞s✳ ❚❤✐s ✇❛s ❞♦♥❡ ❜② ✉s✐♥❣ ❛ r❡❝✉rr❡♥t ♥❡✉r❛❧ ♥❡t✇♦r❦✇✐t❤ ❧♦♥❣✲s❤♦rt t❡r♠ ♠❡♠♦r② ❝❡❧❧s ❛♥❞ ❣❛t❡❞ r❡❝✉rr❡♥t ✉♥✐t ❝❡❧❧s✳ ❚❤❡ ♣❡r❢♦r♠❛♥❝❡❡✈❛❧✉❛t✐♦♥ ✇❛s ♣❡r❢♦r♠❡❞ ✐♥ ♦r❞❡r t♦ ♣r♦✈❡ t❤❛t t❤♦s❡ ♠❡t❤♦❞s✱ ✉s✉❛❧❧② ✉s❡❞ ✐♥❧❛♥❣✉❛❣❡ ♣r♦❝❡ss✐♥❣✱ ❛r❡ ❛❧s♦ s✉✐t❛❜❧❡ ❢♦r tr❛✣❝ ❝❧❛ss✐✜❝❛t✐♦♥✳
❋♦r t❤❛t ♣✉r♣♦s❡✱ ✇❡ ✉s❡❞ t❤❡ ❯◆❙❲✲◆❇✶✺ ❞❛t❛ s❡t ✇✐t❤ ♠♦r❡ t❤❛♥ ✶✵✵●❇ ❞❛t❛ ❛♥❞✷ ♠✐❧❧✐♦♥ ✢♦✇s ❢♦r t❤❡ tr❛✐♥✐♥❣ ❛♥❞ ❛r♦✉♥❞ ✸✺✵✵✵✵ ✢♦✇s ❢♦r t❡st✐♥❣✳ ❚❤❡ ❞❡❡♣ ❧❡❛r♥✐♥❣♣❧❛t❢♦r♠ ❚❡♥s♦r❋❧♦✇ ✇❛s ✉s❡❞ ❢♦r ♠♦❞❡❧ ❞❡✈❡❧♦♣♠❡♥t✳ ■t ✇❛s t❤❡ r✐❣❤t ❝❤♦✐❝❡ ❜❡❝❛✉s❡✐t s✉✐t❡❞ t❤❡ s❤❛♣❡ ❛♥❞ ❝♦♥✜❣✉r❛t✐♦♥ ♦❢ ❞❛t❛✳
❆s st❛t❡❞ ✐♥ ❙❡❝t✐♦♥ ✶✳✷✱ ✇❡ s♦✉❣❤t t❤❡ ❛♥s✇❡r t♦ ♦✉r ♠❛✐♥ q✉❡st✐♦♥ ◗✶✳ ❉✉r✐♥❣t❤❡ tr❛✐♥✐♥❣ ♣❤❛s❡✱ ✇❡ ❡♠♣❧♦②❡❞ ✹ ❞✐✛❡r❡♥t ♠♦❞❡❧s t♦ ✜♥❞ ♦✉t t❤❡ ❛♥s✇❡r ♦♥ t❤✐sq✉❡st✐♦♥✱ ✇❤✐❝❤ ✇❡r❡ ❜✉✐❧t ✇✐t❤ ▲❙❚▼ ❛♥❞ ●❘❯ ❝❡❧❧s✳ ❲❡ ✉s❡❞ ✈❛r✐❛❜❧❡ ❧❛②❡r ♥✉♠❜❡rs✱❝❡❧❧ ♥✉♠❜❡rs✱ ❧❡❛r♥✐♥❣ r❛t❡s✱ ♠❛①❴❜❛t❝❤ s✐③❡s✱ ❡t❝✳ ❚❤❡ ♠♦❞❡❧s ✇❡r❡ ❡✈❛❧✉❛t❡❞ ❜②✉s✐♥❣ ❞✐✛❡r❡♥t ♣❡r❢♦r♠❛♥❝❡ ♠❡tr✐❝ ✐♥❝❧✉❞✐♥❣ ❛❝❝✉r❛❝②✱ ♣r❡❝✐s✐♦♥✱ s❡♥s✐t✐✈✐t②✱ ❢✶ s❝♦r❡✱❛s ✇❡❧❧ ❛s ❥✲st❛t✐❝t✐❝✳ ❖✉r ❡✈❛❧✉❛t✐♦♥ s❤♦✇❡❞ ❣♦♦❞ r❡s✉❧ts✳ ❆❧❧ ♠♦❞❡❧s ❞✐s♣❧❛②❡❞ t❤❡❛❝❝✉r❛❝② ♦❢ ♠♦r❡ t❤❡♥ ✾✾✪ ❛♥❞ ❛ ❥✲st❛t✐st✐❝ ♦❢ ✽✽✲✾✵✪✳ ❚❤❡ ✜♥❛❧ r❡s✉❧ts s❤♦✇❡❞t❤❛t t❤❡ r❡s✉❧ts ✇✐t❤ ❛ ❤✐❣❤❡r ♥✉♠❜❡r ♦❢ ❝❡❧❧s ✐♥ ❛ ❧❛②❡r ❛♥❞ ❧❛r❣❡r ♠❛①❴❜❛t❝❤ s✐③❡✐♠♣r♦✈❡❞ t❤❡ ♣❡r❢♦r♠❛♥❝❡ ♦❢ t❤❡ ♠♦❞❡❧✳ ❚❤❡ ▲❙❚▼ ✇✐t❤ ✸ ❧❛②❡rs s❤♦✇❡❞ t❤❡ ❜❡str❡s✉❧ts ♦♥ s♠❛❧❧❡r ♥✉♠❜❡r ♦❢ ❝❡❧❧s ❛♥❞ ♠❛①❴❜❛t❝❤ s✐③❡✳ ❆ s❧✐❣❤t ✐♠♣r♦✈❡♠❡♥t ✐♥ t❤❡♣❡r❢♦r♠❛♥❝❡ ✐s ♥♦t✐❝❡❛❜❧❡ ♦♥ ❛ s✐♥❣❧❡ ❧❛②❡r ●❘❯✱ ❜✉t ♦✈❡r❛❧❧✱ t❤❡ ♠✉❧t✐❧❛②❡r ▲❙❚▼s❤♦✇❡❞ t❤❡ ❜❡st s❝♦r❡✳ ❚❤❡ ▲❙❚▼ s❤♦✇❡❞ ❛ ❣♦♦❞ ♣❡r❢♦r♠❛♥❝❡ ❡s♣❡❝✐❛❧❧② ❢♦r ❛tt❛❝❦s✇✐t❤ ❛ ❧❛r❣❡ ♥✉♠❜❡r ♦❢ ♣❛❝❦❡ts✳ ❙♦♠❡ ❛tt❛❝❦s✭❘❡❝♦♥♥❛✐ss❛♥❝❡✱ ❙❤❡❧❧❝♦❞❡✱ ❇❛❝❦❞♦♦r✱❆♥❛❧②s✐s✱ ❲♦r♠s✮ ✇❡r❡ ♥♦t r❡❝♦❣♥✐③❡❞ ❜❡❝❛✉s❡ ♦❢ ❧♦✇ ♥✉♠❜❡r ♦❢ ❛♣♣❡❛r❛♥❝❡ ✐♥ ❞❛t❛s❡t✳
❚❤❡ s❡❝♦♥❞ ✐♠♣♦rt❛♥t ❝❤❛❧❧❡♥❣❡ ✇❛s t♦ ❢♦❝✉s ♦♥ tr❛✣❝ ❢❡❛t✉r❡s✳ ❲❡ ❛tt❡♠♣t❡❞ t♦❞✐s❝♦✈❡r t❤❡ ❢❡❛t✉r❡s ♦❢ tr❛✣❝ t❤❛t ❛r❡ ♥♦t ❝❤❛♥❣✐♥❣ ❞✉r✐♥❣ t❤❡ ❡♥❝r②♣t✐♦♥✳ ❲❡ ❛❧s♦tr✐❡❞ t♦ tr❛✐♥ t❤❡ ♠♦❞❡❧ ✇✐t❤ t❤✐s ❞❛t❛ ❢❡❛t✉r❡s✳ ❚❤✐s ♠♦❞❡❧ ✇❛s ❡①♣❡❝t❡❞ t♦ ❜❡ ❛❜❧❡ t♦❛❝❝✉r❛t❡❧② ❝❧❛ss✐❢② t❤❡ ❡♥❝r②♣t❡❞ tr❛✣❝ ❛♥❞ t♦ ❞✐✛❡r❡♥t✐❛t❡ ❜❡t✇❡❡♥ ♠❛❧✐❝✐♦✉s tr❛✣❝❛♥❞ ♥♦r♠❛❧ tr❛✣❝✳ ❚❤❡ ✜rst ❛tt❡♠♣t ✐♥❝❧✉❞❡❞ ✉s✐♥❣ t❤❡ ♣❛❝❦❡t ❧❡♥❣t❤✱ ❞✐r❡❝t✐♦♥ ♦❢♣❛❝❦❡t ❛♥❞ t✐♠❡ ❞✐✛❡r❡♥❝❡ ❜❡t✇❡❡♥ t❤❡ ✜rst ❛♥❞ ❢♦❧❧♦✇✐♥❣ ♣❛❝❦❡ts ✐♥ t❤❡ ✢♦✇✳ ❚❤❡♠❛✐♥ ✐❞❡❛ ❜❡❤✐♥❞ ✉s✐♥❣ t❤❡ t✐♠❡ ❞✐✛❡r❡♥❝❡ ✇❛s t♦ ✉t✐❧✐③❡ t❤❡ ▲❙❚▼ ❛♥❞ t♦ t❡st t❤❡❞❡♣t❤ ♦❢ ♠❡♠♦r②✳ ❚❤✐s ❡♥❞❡❞ ✉♣ ✇✐t❤ ❧❡ss t❤❛♥ ✾✻✪ ❛❝❝✉r❛❝②✱ ✇❤✐❝❤ ✐s ✇♦rs❡ t❤❛♥r❛♥❞♦♠ ❣✉❡ss✐♥❣✱ ❜❡❝❛✉s❡ ♦✉r ❞❛t❛ s❡t ❝♦♥t❛✐♥s ❧❡ss t❤❡♥ ✹✪ ♦❢ ❛tt❛❝❦s ❛♥❞ ❡✈❡♥ ✇✐t❤r❛♥❞♦♠ ❣✉❡ss✐♥❣✱ ✇❡ ❝♦✉❧❞ ❛❝❤✐❡✈❡ r❡s✉❧t ✇❤✐❝❤ ✐s ♠♦r❡ t❤❡♥ ✾✻✪✳❆♥♦t❤❡r ❛tt❡♠♣t ✐♥❝❧✉❞❡❞ ✉s✐♥❣ t❤❡ ♣❛❝❦❡t ❧❡♥❣t❤✱ ❞✐r❡❝t✐♦♥ ♦❢ ♣❛❝❦❡ts ❛♥❞ ♣❛❝❦❡t✐♥t❡r✲❛rr✐✈❛❧ t✐♠❡ ✭t✐♠❡ ❜❡t✇❡❡♥ t❤❡ ♣❛❝❦❡ts✮✳ ❚❤❡ ✐❞❡❛ ❜❡❤✐♥❞ t❤✐s ❛♣♣r♦❛❝❤ ❝❛♠❡❢r♦♠ ❧❛♥❣✉❛❣❡ ♣r♦❝❡ss✐♥❣✳ ❉✐✛❡r❡♥t ♣❛❝❦❡ts ✐♥ ✢♦✇ r❡♣r❡s❡♥t ✇♦r❞s✱ ❛♥❞ ❛ ✇❤♦❧❡ ✢♦✇
✻✽
![Page 76: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/76.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
✻✳✶ ❋✉t✉r❡ ❲♦r❦ ✻ ❈❖◆❈▲❯❙■❖◆
r❡♣r❡s❡♥ts t❤❡ s❡♥t❡♥❝❡✳ ❉✉r✐♥❣ t❤❡ tr❛✐♥✐♥❣✱ t❤❡ ♠♦❞❡❧ ❧❡❛r♥s t❤❛t ❛ ♥❡①t ♣❛❝❦❡t✇✐t❤ s♣❡❝✐✜❝ ❢❡❛t✉r❡s ✭♣❛❝❦❡t ❧❡♥❣t❤ ❛♥❞ ❞✐r❡❝t✐♦♥✮ ✐s ❝♦♠✐♥❣ ❛❢t❡r ❝❡rt❛✐♥ ❛♠♦✉♥t♦❢ t✐♠❡ ✭✐♥t❡r✲❛rr✐✈❛❧ t✐♠❡✮✳ ❚❤✐s ❝♦♥❝❡♣t ✇❛s ♣r♦✈❡♥ ❛s ❛ ❣♦♦❞ ❛♣♣r♦❛❝❤✳ ❆❢t❡rs✇✐t❝❤✐♥❣ t♦ ❛ ♥❡✇ ❢❡❛t✉r❡ s❡t✱ ♦✉r ♣❡r❢♦r♠❛♥❝❡ ❡①♣❡r✐❡♥❝❡❞ ❛ s✐❣♥✐✜❝❛♥t ✐♠♣r♦✈❡♠❡♥t✳
❚❤❡ t❤✐r❞ ✐♠♣♦rt❛♥t q✉❡st✐♦♥ t❤❛t ✇❡ ♥❡❡❞❡❞ t♦ ❝❧❛r✐❢② ✐♥ t❤✐s r❡s❡❛r❝❤ r❡❣❛r❞❡❞t❤❡ ✐♠♣❧❡♠❡♥t❛t✐♦♥ ♦❢ ❞✐✛❡r❡♥t r❡❣✉❧❛r✐③❛t✐♦♥ t❡❝❤♥✐q✉❡s ✐♥ ♦r❞❡r t♦ ✐♠♣r♦✈❡ t❤❡♣❡r❢♦r♠❛♥❝❡ ♦❢ t❤❡ ♠♦❞❡❧s✳ ❚❤❡ ✜rst ♠❡t❤♦❞ ✇❡ ✉s❡❞ ✇❛s ❜❛t❝❤ ♥♦r♠❛❧✐③❛t✐♦♥✱ ✇❤✐❝❤s❤♦✇❡❞ ❛ s✐❣♥✐✜❝❛♥t ✐♠♣r♦✈❡♠❡♥t ✐♥ t❤❡ ♣❡r❢♦r♠❛♥❝❡ ♦♥ ❛ s✐♥❣❧❡ ❧❛②❡r✳ ❍♦✇❡✈❡r✱ ✇❤❡♥t❤❡ ♥✉♠❜❡r ♦❢ t❤❡ ❧❛②❡rs ✐♥❝r❡❛s❡❞✱ ✐t r❡s✉❧t❡❞ ✐♥ ♦✈❡r✜tt✐♥❣ ❛♥❞ ❡♥❞❡❞ ✉♣ ❜❡❤✐♥❞♠✉❧t✐✲❧❛②❡r ▲❙❚▼✳ ▲❛②❡r ♥♦r♠❛❧✐③❛t✐♦♥ ✇❛s ❛ ♠♦r❡ ❝♦♠♣❧❡① t❡❝❤♥✐q✉❡ t❤❛t ✇❡ ✉s❡❞❢♦r t❤❡ r❡❣✉❧❛r✐③❛t✐♦♥✳ ■t s❤♦✇❡❞ ❛ ♥♦t✐❝❡❛❜❧❡ ✐♥❝r❡❛s❡ ✐♥ t❤❡ t✐♠❡ ❝♦♥s✉♠❡❞ ❢♦r t❤❡tr❛✐♥✐♥❣ ❛♥❞ ❛ ❞❡❝r❡❛s❡ ✐♥ ❛❝❝✉r❛❝② ❛♥❞ t❤❡ ❥✲st❛t✐st✐❝✳
❚❤❡r❡❢♦r❡✱ ✇❡ s✉❣❣❡st t♦ ✉s❡ t❤❡ ❇❛s✐❝ ▲❙❚▼ ♠♦❞❡❧ ✇✐t❤ ✸ ❧❛②❡rs✱ ✶✷✽ ♥✉♠❜❡rs ♦❢ ❝❡❧❧s✐♥ ❧❛②❡r✱ ♠❛①✐♠✉♠ ❜❛t❝❤ s✐③❡ ✇✐t❤ ✶✵✷✹ ✢♦✇s ❛♥❞ t♦ tr❛✐♥ ✇✐t❤ ❧❡❛r♥✐♥❣ r❛t❡ ✵✳✵✵✶✳
✻✳✶ ❋✉t✉r❡ ❲♦r❦
❆❢t❡r ♦✉r r❡s❡❛r❝❤ q✉❡st✐♦♥ ✇❡r❡ s✉❝❝❡ss❢✉❧❧② ❛♥s✇❡r❡❞✱ ♠❛♥② ♥❡✇ q✉❡st✐♦♥s ❛♣♣❡❛r❡❞✳❚❤❡r❡ ✐s ❛ ♣❧❡♥t② ♦❢ r♦♦♠ ❢♦r ❛♥♦t❤❡r t②♣❡s ♦❢ t❡st✐♥❣ ✇❤✐❝❤ ❝♦✉❧❞ ✐♠♣r♦✈❡ ❡✣❝✐❡♥❝②❛♥❞ ♣❡r❢♦r♠❛♥❝❡ ♦❢ ♦✉r ♠♦❞❡❧✳ ❚❤✐s ❝♦✉❧❞ ❜❡ ❞♦♥❡ ❜② ✐♠♣r♦✈✐♥❣ ❡✐t❤❡r t❤❡ ❞❛t❛ ♦rt❤❡ ♠♦❞❡❧✳
❆ ❞❛t❛ ✐♠♣r♦✈❡♠❡♥t ✐s t❤❡ ✜rst ❛♥❞ ♠❛②❜❡ t❤❡ ♠♦st ✐♠♣♦rt❛♥t t♦♣✐❝ ❢♦r ❢✉t✉r❡✇♦r❦✳ ❚❤❡ ❞❛t❛ s❡t t❤❛t ✇❡ ✉s❡❞ ✇❛s ❛r♠❡❞ ✇✐t❤ ♥❡✇ ❛♥❞ ✉♣✲t♦✲❞❛t❡ ❛tt❛❝❦s✱ ❜✉tt❤❡r❡ ✇❡r❡ ♠❛♥② ❞❡✜❝✐❡♥❝✐❡s ✇❤✐❧❡ tr❛✣❝ ✢♦✇ ❝❧❛ss✐✜❝❛t✐♦♥✱ t❤❡r❡ ✐s s♠❛❧❧ ♥✉♠❜❡r♦❢ ❛tt❛❝❦s✱ ❛tt❛❝❦s ❛r❡ ❣❡♥❡r❛t❡❞ ✐♥ ❧❛❜ ❡♥✈✐r♦♥♠❡♥t✱ ❡t❝✳ ❚❤❡ ♥❡①t st❡♣ ❝♦✉❧❞ ❜❡t❡st✐♥❣ t❤❡ ♠♦❞❡❧ ✇✐t❤ t❤❡ ❛❧r❡❛❞② ❦♥♦✇♥ ❑❉❉ ❞❛t❛ s❡t✱ ✇❤✐❝❤ ✐s ♠♦r❡ ✉s❡❞ ✐♥ t❤✐st②♣❡ ♦❢ ❡①♣❡r✐♠❡♥ts✳ ❚❤❡ ❜❡st ✇❛② t♦ ♣r♦❝❡❡❞ ✇✐t❤ t❤❡ ❡①♣❡r✐♠❡♥t ✇♦✉❧❞ ❜❡ t♦ ❝r❡❛t❡❛♥♦t❤❡r ❞❛t❛ s❡t ✇✐t❤ ❧✐✈❡ ❞❛t❛ ❝♦❧❧❡❝t❡❞ ✇✐t❤ ❞❛r❦s♣❛❝❡ ♦r ❤♦♥❡②♣♦t✳ ❚❤❡s❡ ❞❛t❛❝♦♥t❛✐♥s ✉♣✲t♦✲❞❛t❡ ♥❡t✇♦r❦ tr❛✣❝✱❛s ✇❡❧❧ ❛s ❦♥♦✇♥ ❛♥❞ ✉♥❦♥♦✇♥ ❛tt❛❝❦s✳ ❚❤✐s ❦✐♥❞♦❢ ❞❛t❛ s❡t ❝♦✉❧❞ ❜❡ ✉s❡❞ ❢♦r s✉♣❡r✈✐s❡❞ ♦r ✉♥s✉♣❡r✈✐s❡❞ ❧❡❛r♥✐♥❣ ✇❤✐❝❤ ❝♦✉❧❞ ✐♠♣r♦✈❡✐♥tr✉s✐♦♥ ❞❡t❡❝t✐♦♥ s②st❡♠s✳
▼♦❞❡❧ ✐♠♣r♦✈❡♠❡♥ts ✇♦✉❧❞ ❜❡ t❤❡ ♥❡①t st❡♣✳ ❋✐rst❧②✱ ✉♥s✉♣❡r✈✐s❡❞ ❧❡❛r♥✐♥❣ ❝♦✉❧❞ r❡♣✲r❡s❡♥t ❛♥♦t❤❡r ✐♠♣♦rt❛♥t t♦♣✐❝ ❢♦r r❡s❡❛r❝❤✱ s✐♥❝❡ ✐t r❡♣r❡s❡♥t r❡❛❧ ✐♥tr✉s✐♦♥ ❞❡t❡❝✲t✐♦♥ s②st❡♠ ♠♦r❡ ❝❧♦s❡❧②✳ ❙❡❝♦♥❞❧②✱ ✐♠♣❧❡♠❡♥t✐♥❣ ♥❡✇ ♠❛❝❤✐♥❡ ❧❡❛r♥✐♥❣ ♠♦❞❡❧s✱ s✉❝❤❛✉t♦❡♥❝♦❞❡rs✱❛s ✇❡❧❧ ❛s s❡q✉❡♥❝❡✲t♦✲s❡q✉❡♥❝❡ ♠♦❞❡❧s ✇♦✉❧❞ ❜❡ ❛♥♦t❤❡r ❧♦❣✐❝❛❧ st❡♣❢♦r✇❛r❞✳ ❚❤✐s ♠♦❞❡❧s s❤♦✇❡❞ ❣♦♦❞ r❡s✉❧ts ✐♥ ♦t❤❡r ✜❡❧❞s ♦❢ r❡s❡❛r❝❤✱ s♦ ✐t ✇♦✉❧❞ ❜❡✐♥t❡r❡st✐♥❣ t♦ s❡❡ ❤♦✇ t❤❡② ♣❡r❢♦r♠❡❞ ♦♥ ❝❧❛ss✐❢②✐♥❣ t❤❡ ♥❡t✇♦r❦ ❞❛t❛✳ ❚❤✐r❞❧②✱ ♠♦✈✲
✻✾
![Page 77: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/77.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
✻✳✶ ❋✉t✉r❡ ❲♦r❦ ✻ ❈❖◆❈▲❯❙■❖◆
✐♥❣ ❢♦❝✉s t♦ ❛ s♣❡❝✐✜❝ ❛tt❛❝❦ ❝❧❛ss✐✜❝❛t✐♦♥ ♦r ✉♥❦♥♦✇♥ ❛tt❛❝❦ ❝❧❛ss✐✜❝❛t✐♦♥ ✇♦✉❧❞ ❜❡❛❧s♦ ✈❡r② ✉s❡❢✉❧✳ ❚❤✐s t♦♣✐❝ s❤♦✉❧❞ ❜r✐♥❣ ❛ ♠❛♥② ✐♠♣r♦✈❡♠❡♥ts t♦ t❤❡ ♥❡t✇♦r❦ s❡❝✉r✐t②✐♥❞✉str② ❛♥❞ t♦ ❝♦♠♠❡r❝✐❛❧ ✉s❡✳
✼✵
![Page 78: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/78.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
✼ ❘❡❢❡r❡♥❝❡s
❬✶❪ ✶✾✾✽ ❉❆❘P❆ ■◆❚❘❯❙■❖◆ ❉❊❚❊❈❚■❖◆ ❊❱❆▲❯❆❚■❖◆❉❆❚❆❙❊❚✳ ❤tt♣s✿✴✴✇✇✇✳❧❧✳♠✐t✳❡❞✉✴r✲❞✴❞❛t❛s❡ts✴
✶✾✾✽✲❞❛r♣❛✲✐♥tr✉s✐♦♥✲❞❡t❡❝t✐♦♥✲❡✈❛❧✉❛t✐♦♥✲❞❛t❛s❡t✳
❬✷❪ ❈◆❚❑✳ ❤tt♣s✿✴✴❛r❝❤✐✈❡✳❢♦✴❯❲❥❜❧✳
❬✸❪ ❈❱❊ ▼✐tr❡ ❲❡❜ s✐t❡✳ ❤tt♣s✿✴✴❝✈❡✳♠✐tr❡✳♦r❣✳
❬✹❪ ■❳■❆ P❡r❢❡❝t ❙t♦r♠✳ ❤tt♣s✿✴✴✇✇✇✳✐①✐❛❝♦♠✳❝♦♠✴♣r♦❞✉❝ts✴♣❡r❢❡❝tst♦r♠✳
❬✺❪ ❑❉❉ ❈✉♣ ✶✾✾✾ ❉❛t❛✳ ❤tt♣✿✴✴❦❞❞✳✐❝s✳✉❝✐✳❡❞✉✴❞❛t❛❜❛s❡s✴❦❞❞❝✉♣✾✾✴
❦❞❞❝✉♣✾✾✳❤t♠❧✳
❬✻❪ ❑❡r❛s✳ ❤tt♣s✿✴✴❦❡r❛s✳✐♦✴✳
❬✼❪ ▼❳◆❡t✳ ❤tt♣s✿✴✴♠①♥❡t✳❛♣❛❝❤❡✳♦r❣✴✳
❬✽❪ ♣r♦t♦❝♦❧♥✉♠❜❡rs✳ ❤tt♣s✿✴✴✇✇✇✳✐❛♥❛✳♦r❣✴❛ss✐❣♥♠❡♥ts✴
♣r♦t♦❝♦❧✲♥✉♠❜❡rs✴♣r♦t♦❝♦❧✲♥✉♠❜❡rs✳①❤t♠❧✳
❬✾❪ P②❚♦r❝❤✳ ❤tt♣s✿✴✴♣②t♦r❝❤✳♦r❣✴✳
❬✶✵❪ t❝♣❞✉♠♣✳ ❤tt♣s✿✴✴✇✇✇✳t❝♣❞✉♠♣✳♦r❣✴♠❛♥♣❛❣❡s✴t❝♣❞✉♠♣✳✶✳❤t♠❧✳
❬✶✶❪ ❚❡♥s♦r✢♦✇✳ ❤tt♣s✿✴✴✇✇✇✳t❡♥s♦r❢❧♦✇✳♦r❣✴✳
❬✶✷❪ ts❤❛r❦✳ ❤tt♣s✿✴✴✇✇✇✳✇✐r❡s❤❛r❦✳♦r❣✴❞♦❝s✴♠❛♥✲♣❛❣❡s✴ts❤❛r❦✳❤t♠❧✳
❬✶✸❪ ❨♦s❤✉❛ ❇❡♥❣✐♦✱ P❛tr✐❝❡ ❙✐♠❛r❞✱ P❛♦❧♦ ❋r❛s❝♦♥✐✱ ❡t ❛❧✳ ▲❡❛r♥✐♥❣ ❧♦♥❣✲t❡r♠ ❞❡♣❡♥✲❞❡♥❝✐❡s ✇✐t❤ ❣r❛❞✐❡♥t ❞❡s❝❡♥t ✐s ❞✐✣❝✉❧t✳ ■❊❊❊ tr❛♥s❛❝t✐♦♥s ♦♥ ♥❡✉r❛❧ ♥❡t✇♦r❦s✱✺✭✷✮✿✶✺✼✕✶✻✻✱ ✶✾✾✹✳
❬✶✹❪ ▲❛✉r❡♥t ❇❡r♥❛✐❧❧❡✱ ❘❡♥❛t❛ ❚❡✐①❡✐r❛✱ ■s♠❛❡❧ ❆❦♦❞❦❡♥♦✉✱ ❆✉❣✉st✐♥ ❙♦✉❧❡✱ ❛♥❞ ❑❛✈❡❙❛❧❛♠❛t✐❛♥✳ ❚r❛✣❝ ❝❧❛ss✐✜❝❛t✐♦♥ ♦♥ t❤❡ ✢②✳ ❆❈▼ ❙■●❈❖▼▼ ❈♦♠♣✉t❡r ❈♦♠♠✉✲♥✐❝❛t✐♦♥ ❘❡✈✐❡✇✱ ✸✻✭✷✮✿✷✸✕✷✻✱ ✷✵✵✻✳
❬✶✺❪ ❨✳ ◆✐r P✳ ❊r♦♥❡♥ ❚✳ ❑✐✈✐♥❡♥ ❈✳ ❑❛✉❢♠❛♥✱ P✳ ❍♦✛♠❛♥✳ ■♥t❡r♥❡t ❑❡② ❊①❝❤❛♥❣❡Pr♦t♦❝♦❧ ❱❡rs✐♦♥ ✷ ✭■❑❊✈✷✮✳ ❘❋❈ ✼✷✾✻✱ ❖❝t♦❜❡r ✷✵✶✹✳
❬✶✻❪ ❩✐❣❛♥❣ ❈❛♦✱ ●❛♥❣ ❳✐♦♥❣✱ ❨♦♥❣ ❩❤❛♦✱ ❩❤❡♥③❤❡♥ ▲✐✱ ❛♥❞ ▲✐ ●✉♦✳ ❆ s✉r✈❡② ♦♥❡♥❝r②♣t❡❞ tr❛✣❝ ❝❧❛ss✐✜❝❛t✐♦♥✳ ■♥ ■♥t❡r♥❛t✐♦♥❛❧ ❈♦♥❢❡r❡♥❝❡ ♦♥ ❆♣♣❧✐❝❛t✐♦♥s ❛♥❞❚❡❝❤♥✐q✉❡s ✐♥ ■♥❢♦r♠❛t✐♦♥ ❙❡❝✉r✐t②✱ ♣❛❣❡s ✼✸✕✽✶✳ ❙♣r✐♥❣❡r✱ ✷✵✶✹✳
✼✶
![Page 79: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/79.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
❬✶✼❪ ❑②✉♥❣❤②✉♥ ❈❤♦✱ ❇❛rt ❱❛♥ ▼❡rr✐ë♥❜♦❡r✱ ❈❛❣❧❛r ●✉❧❝❡❤r❡✱ ❉③♠✐tr② ❇❛❤❞❛♥❛✉✱❋❡t❤✐ ❇♦✉❣❛r❡s✱ ❍♦❧❣❡r ❙❝❤✇❡♥❦✱ ❛♥❞ ❨♦s❤✉❛ ❇❡♥❣✐♦✳ ▲❡❛r♥✐♥❣ ♣❤r❛s❡ r❡♣r❡✲s❡♥t❛t✐♦♥s ✉s✐♥❣ r♥♥ ❡♥❝♦❞❡r✲❞❡❝♦❞❡r ❢♦r st❛t✐st✐❝❛❧ ♠❛❝❤✐♥❡ tr❛♥s❧❛t✐♦♥✳ ❛r❳✐✈♣r❡♣r✐♥t ❛r❳✐✈✿✶✹✵✻✳✶✵✼✽✱ ✷✵✶✹✳
❬✶✽❪ ❈■❙❈❖✳ ❊♥❝r②♣t❡❞ ❚r❛✣❝ ❆♥❛❧②t✐❝s✳ ❤tt♣s✿✴✴
✇✇✇✳❝✐s❝♦✳❝♦♠✴❝✴❞❛♠✴❡♥✴✉s✴s♦❧✉t✐♦♥s✴❝♦❧❧❛t❡r❛❧✴
❡♥t❡r♣r✐s❡✲♥❡t✇♦r❦s✴❡♥t❡r♣r✐s❡✲♥❡t✇♦r❦✲s❡❝✉r✐t②✴
♥❜✲✵✾✲❡♥❝r②t❞✲tr❛❢✲❛♥❧②t❝s✲✇♣✲❝t❡✲❡♥✳♣❞❢✱ ✷✵✶✾✳
❬✶✾❪ ❱◆■ ❈✐s❝♦✳ ❈✐s❝♦ ✈✐s✉❛❧ ♥❡t✇♦r❦✐♥❣ ✐♥❞❡①✿ ❋♦r❡❝❛st ❛♥❞ tr❡♥❞s✱ ✷✵✶✼✕✷✵✷✷✳ ❲❤✐t❡P❛♣❡r✱ ✶✱ ✷✵✶✽✳
❬✷✵❪ ❆❧❜❡rt♦ ❉❛✐♥♦tt✐✱ ❆♥t♦♥✐♦ P❡s❝❛♣❡✱ ❛♥❞ ❑✐♠❜❡r❧② ❈ ❈❧❛✛②✳ ■ss✉❡s ❛♥❞ ❢✉t✉r❡❞✐r❡❝t✐♦♥s ✐♥ tr❛✣❝ ❝❧❛ss✐✜❝❛t✐♦♥✳ ■❊❊❊ ♥❡t✇♦r❦✱ ✷✻✭✶✮✿✸✺✕✹✵✱ ✷✵✶✷✳
❬✷✶❪ ❈♦♠♣✉t❡r ❙❡❝✉r✐t② ❉❡♣❛rt♠❡♥t✳ ●❧♦ss❛r② ♦❢ ❦❡② ✐♥❢♦r♠❛t✐♦♥ s❡❝✉r✐t② t❡r♠s✳ ◆■❙❚■♥t❡r♥❛❧✴■♥t❡r❛❣❡♥❝② ❘❡♣♦rt ◆■❙❚■❘ ✼✷✾✽✱ ✷✵✶✸✳
❬✷✷❪ ❉❛♥✐❡❧ ❈ ❋❡rr❡✐r❛✱ ❋é❧✐① ■❣❧❡s✐❛s ❱á③q✉❡③✱ ●❡r♥♦t ❱♦r♠❛②r✱ ▼❛①✐♠✐❧✐❛♥ ❇❛❝❤❧✱ ❛♥❞❚❛♥❥❛ ❩s❡❜②✳ ❆ ♠❡t❛✲❛♥❛❧②s✐s ❛♣♣r♦❛❝❤ ❢♦r ❢❡❛t✉r❡ s❡❧❡❝t✐♦♥ ✐♥ ♥❡t✇♦r❦ tr❛✣❝r❡s❡❛r❝❤✳ ■♥ Pr♦❝❡❡❞✐♥❣s ♦❢ t❤❡ ❘❡♣r♦❞✉❝✐❜✐❧✐t② ❲♦r❦s❤♦♣✱ ♣❛❣❡s ✶✼✕✷✵✳ ❆❈▼✱✷✵✶✼✳
❬✷✸❪ ❏❡✛ ❍❡❛t♦♥✳ ■❛♥ ❣♦♦❞❢❡❧❧♦✇✱ ②♦s❤✉❛ ❜❡♥❣✐♦✱ ❛♥❞ ❛❛r♦♥ ❝♦✉r✈✐❧❧❡✿ ❉❡❡♣ ❧❡❛r♥✐♥❣✱✷✵✶✽✳
❬✷✹❪ ❙❡♣♣ ❍♦❝❤r❡✐t❡r ❛♥❞ ❏ür❣❡♥ ❙❝❤♠✐❞❤✉❜❡r✳ ▲♦♥❣ s❤♦rt✲t❡r♠ ♠❡♠♦r②✳ ◆❡✉r❛❧❝♦♠♣✉t❛t✐♦♥✱ ✾✭✽✮✿✶✼✸✺✕✶✼✽✵✱ ✶✾✾✼✳
❬✷✺❪ ❋é❧✐① ■❣❧❡s✐❛s ❛♥❞ ❚❛♥❥❛ ❩s❡❜②✳ ❚✐♠❡✲❛❝t✐✈✐t② ❢♦♦t♣r✐♥ts ✐♥ ✐♣ tr❛✣❝✳ ❈♦♠♣✉t❡r◆❡t✇♦r❦s✱ ✶✵✼✿✻✹✕✼✺✱ ✷✵✶✻✳
❬✷✻❪ ❋é❧✐① ■❣❧❡s✐❛s ❛♥❞ ❚❛♥❥❛ ❩s❡❜②✳ P❛tt❡r♥ ❞✐s❝♦✈❡r② ✐♥ ✐♥t❡r♥❡t ❜❛❝❦❣r♦✉♥❞ r❛❞✐❛t✐♦♥✳■❊❊❊ ❚r❛♥s❛❝t✐♦♥s ♦♥ ❇✐❣ ❉❛t❛✱ ✷✵✶✼✳
❬✷✼❪ ❙❡r❣❡② ■♦✛❡ ❛♥❞ ❈❤r✐st✐❛♥ ❙③❡❣❡❞②✳ ❇❛t❝❤ ♥♦r♠❛❧✐③❛t✐♦♥✿ ❆❝❝❡❧❡r❛t✐♥❣ ❞❡❡♣ ♥❡t✲✇♦r❦ tr❛✐♥✐♥❣ ❜② r❡❞✉❝✐♥❣ ✐♥t❡r♥❛❧ ❝♦✈❛r✐❛t❡ s❤✐❢t✳ ❛r❳✐✈ ♣r❡♣r✐♥t ❛r❳✐✈✿✶✺✵✷✳✵✸✶✻✼✱✷✵✶✺✳
❬✷✽❪ ❇✳ ❈❧❛✐s❡ ❏✳ ◗✉✐tt❡❦✱ ❚✳ ❩s❡❜② ❛♥❞ ❙✳ ❩❛♥❞❡r✳ ❘❡q✉✐r❡♠❡♥ts ❢♦r ■P ❋❧♦✇ ■♥❢♦r♠❛✲t✐♦♥ ❊①♣♦rt ✭■P❋■❳✮✳ ❘❋❈ ✸✾✶✼✱ ♦❝t ✷✵✵✹✳
❬✷✾❪ ❇✳ ❈❛r♣❡♥t❡r ❏✳ ❘❛❥❛❤❛❧♠❡✱ ❆✳ ❈♦♥t❛ ❛♥❞ ❙✳ ❉❡❡r✐♥❣✳ ■P✈✻ ❋❧♦✇ ▲❛❜❡❧ ❙♣❡❝✐✜❝❛✲t✐♦♥✳ ❘❋❈ ✸✻✾✼✱ ♠❛r ✷✵✵✹✳
✼✷
![Page 80: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/80.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
❬✸✵❪ ▼❛r❦❦✉ ❑♦❥♦ ❑✉♠✐❦♦ ❖♥♦ ▼❛rt✐♥ ❙t✐❡♠❡r❧✐♥❣ ▲❛rs ❊❣❣❡rt ❆❧❡①❡② ▼❡❧✲♥✐❦♦✈ ❲❡s ❊❞❞② ❆❧❡①❛♥❞❡r ❩✐♠♠❡r♠❛♥♥ ❇r✐❛♥ ❚r❛♠♠❡❧❧ ❏♦❡ ❚♦✉❝❤❀❊❧✐♦t ▲❡❛r✱ ❆❧❧✐s♦♥ ▼❛♥❦✐♥ ❛♥❞ ❏❛♥❛ ■②❡♥❣❛r✳ ❙❡r✈✐❝❡ ♥❛♠❡ ❛♥❞ tr❛♥s♣♦rt♣r♦t♦❝♦❧ ♣♦rt ♥✉♠❜❡r r❡❣✐str②✳ ❤tt♣s✿✴✴✇✇✇✳✐❛♥❛✳♦r❣✴❛ss✐❣♥♠❡♥ts✴
s❡r✈✐❝❡✲♥❛♠❡s✲♣♦rt✲♥✉♠❜❡rs✴s❡r✈✐❝❡✲♥❛♠❡s✲♣♦rt✲♥✉♠❜❡rs✳①❤t♠❧✱✷✵✵✾✳
❬✸✶❪ ●②✉✇❛♥ ❑✐♠✱ ❍❛②♦♦♥ ❨✐✱ ❏❛♥❣❤♦ ▲❡❡✱ ❨✉♥❤❡✉♥❣ P❛❡❦✱ ❛♥❞ ❙✉♥❣r♦❤ ❨♦♦♥✳ ▲st♠✲❜❛s❡❞ s②st❡♠✲❝❛❧❧ ❧❛♥❣✉❛❣❡ ♠♦❞❡❧✐♥❣ ❛♥❞ r♦❜✉st ❡♥s❡♠❜❧❡ ♠❡t❤♦❞ ❢♦r ❞❡s✐❣♥✐♥❣❤♦st✲❜❛s❡❞ ✐♥tr✉s✐♦♥ ❞❡t❡❝t✐♦♥ s②st❡♠s✳ ❛r❳✐✈ ♣r❡♣r✐♥t ❛r❳✐✈✿✶✻✶✶✳✵✶✼✷✻✱ ✷✵✶✻✳
❬✸✷❪ ❨❛♥♥ ❆ ▲❡❈✉♥✱ ▲é♦♥ ❇♦tt♦✉✱ ●❡♥❡✈✐❡✈❡ ❇ ❖rr✱ ❛♥❞ ❑❧❛✉s✲❘♦❜❡rt ▼ü❧❧❡r✳ ❊✣❝✐❡♥t❜❛❝❦♣r♦♣✳ ■♥ ◆❡✉r❛❧ ♥❡t✇♦r❦s✿ ❚r✐❝❦s ♦❢ t❤❡ tr❛❞❡✱ ♣❛❣❡s ✾✕✹✽✳ ❙♣r✐♥❣❡r✱ ✷✵✶✷✳
❬✸✸❪ ❏✐♠♠② ▲❡✐ ❇❛✱ ❏❛♠✐❡ ❘②❛♥ ❑✐r♦s✱ ❛♥❞ ●❡♦✛r❡② ❊ ❍✐♥t♦♥✳ ▲❛②❡r ♥♦r♠❛❧✐③❛t✐♦♥✳❛r❳✐✈ ♣r❡♣r✐♥t ❛r❳✐✈✿✶✻✵✼✳✵✻✹✺✵✱ ✷✵✶✻✳
❬✸✹❪ ❲❛rr❡♥ ❙ ▼❝❈✉❧❧♦❝❤ ❛♥❞ ❲❛❧t❡r P✐tts✳ ❆ ❧♦❣✐❝❛❧ ❝❛❧❝✉❧✉s ♦❢ t❤❡ ✐❞❡❛s ✐♠♠❛♥❡♥t✐♥ ♥❡r✈♦✉s ❛❝t✐✈✐t②✳ ❚❤❡ ❜✉❧❧❡t✐♥ ♦❢ ♠❛t❤❡♠❛t✐❝❛❧ ❜✐♦♣❤②s✐❝s✱ ✺✭✹✮✿✶✶✺✕✶✸✸✱ ✶✾✹✸✳
❬✸✺❪ ❋❛r❡s ▼❡❣❤❞♦✉r✐✱ ❚❛♥❥❛ ❩s❡❜②✱ ❛♥❞ ❋é❧✐① ■❣❧❡s✐❛s✳ ❆♥❛❧②s✐s ♦❢ ❧✐❣❤t✇❡✐❣❤t ❢❡❛t✉r❡✈❡❝t♦rs ❢♦r ❛tt❛❝❦ ❞❡t❡❝t✐♦♥ ✐♥ ♥❡t✇♦r❦ tr❛✣❝✳ ❆♣♣❧✐❡❞ ❙❝✐❡♥❝❡s✱ ✽✭✶✶✮✿✷✶✾✻✱✷✵✶✽✳
❬✸✻❪ ❚♦♠ ▼✐❝❤❛❡❧ ▼✐t❝❤❡❧❧✳ ❚❤❡ ❞✐s❝✐♣❧✐♥❡ ♦❢ ♠❛❝❤✐♥❡ ❧❡❛r♥✐♥❣✱ ✈♦❧✉♠❡ ✾✳ ❈❛r♥❡❣✐❡▼❡❧❧♦♥ ❯♥✐✈❡rs✐t②✱ ❙❝❤♦♦❧ ♦❢ ❈♦♠♣✉t❡r ❙❝✐❡♥❝❡✱ ▼❛❝❤✐♥❡ ▲❡❛r♥✐♥❣ ✳ ✳ ✳ ✱ ✷✵✵✻✳
❬✸✼❪ ❆♥❞r❡✇ ❲ ▼♦♦r❡ ❛♥❞ ❉❡♥✐s ❩✉❡✈✳ ■♥t❡r♥❡t tr❛✣❝ ❝❧❛ss✐✜❝❛t✐♦♥ ✉s✐♥❣ ❜❛②❡s✐❛♥❛♥❛❧②s✐s t❡❝❤♥✐q✉❡s✳ ■♥ ❆❈▼ ❙■●▼❊❚❘■❈❙ P❡r❢♦r♠❛♥❝❡ ❊✈❛❧✉❛t✐♦♥ ❘❡✈✐❡✇✱ ✈♦❧✲✉♠❡ ✸✸✱ ♣❛❣❡s ✺✵✕✻✵✳ ❆❈▼✱ ✷✵✵✺✳
❬✸✽❪ ◆♦✉r ▼♦✉st❛❢❛ ❛♥❞ ❏✐❧❧ ❙❧❛②✳ ❯♥s✇✲♥❜✶✺✿ ❛ ❝♦♠♣r❡❤❡♥s✐✈❡ ❞❛t❛ s❡t ❢♦r ♥❡t✲✇♦r❦ ✐♥tr✉s✐♦♥ ❞❡t❡❝t✐♦♥ s②st❡♠s ✭✉♥s✇✲♥❜✶✺ ♥❡t✇♦r❦ ❞❛t❛ s❡t✮✳ ■♥ ✷✵✶✺ ♠✐❧✐t❛r②❝♦♠♠✉♥✐❝❛t✐♦♥s ❛♥❞ ✐♥❢♦r♠❛t✐♦♥ s②st❡♠s ❝♦♥❢❡r❡♥❝❡ ✭▼✐❧❈■❙✮✱ ♣❛❣❡s ✶✕✻✳ ■❊❊❊✱✷✵✶✺✳
❬✸✾❪ ◆♦✉r ▼♦✉st❛❢❛ ❛♥❞ ❏✐❧❧ ❙❧❛②✳ ❚❤❡ ❡✈❛❧✉❛t✐♦♥ ♦❢ ♥❡t✇♦r❦ ❛♥♦♠❛❧② ❞❡t❡❝t✐♦♥ s②s✲t❡♠s✿ ❙t❛t✐st✐❝❛❧ ❛♥❛❧②s✐s ♦❢ t❤❡ ✉♥s✇✲♥❜✶✺ ❞❛t❛ s❡t ❛♥❞ t❤❡ ❝♦♠♣❛r✐s♦♥ ✇✐t❤ t❤❡❦❞❞✾✾ ❞❛t❛ s❡t✳ ■♥❢♦r♠❛t✐♦♥ ❙❡❝✉r✐t② ❏♦✉r♥❛❧✿ ❆ ●❧♦❜❛❧ P❡rs♣❡❝t✐✈❡✱ ✷✺✭✶✲✸✮✿✶✽✕✸✶✱ ✷✵✶✻✳
❬✹✵❪ ❆♥❞r❡✇ ◆❣ ❡t ❛❧✳ ❙♣❛rs❡ ❛✉t♦❡♥❝♦❞❡r✳ ❈❙✷✾✹❆ ▲❡❝t✉r❡ ♥♦t❡s✱ ✼✷✭✷✵✶✶✮✿✶✕✶✾✱✷✵✶✶✳
✼✸
![Page 81: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/81.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
❬✹✶❪ ❈❤r✐st♦♣❤❡r ❖❧❛❤✳ ❯♥❞❡rst❛♥❞✐♥❣ ❧st♠ ♥❡t✇♦r❦s✕❝♦❧❛❤✬s ❜❧♦❣✳ ❈♦❧❛❤✳ ❣✐t❤✉❜✳ ✐♦✱✷✵✶✺✳
❬✹✷❪ ❙✳ ❑r✐s❤♥❛♥ ❙✳ ❋r❛♥❦❡❧✳ ■P ❙❡❝✉r✐t② ✭■Ps❡❝✮ ❛♥❞ ■♥t❡r♥❡t ❑❡② ❊①❝❤❛♥❣❡ ✭■❑❊✮✳❘❋❈ ✻✵✼✶✱ ❋❡❜r✉❛r② ✷✵✶✶✳
❬✹✸❪ ❘✳ ❙❤✐r❡②✳ ■♥t❡r♥❡t ❙❡❝✉r✐t② ●❧♦ss❛r②✳ ❘❋❈ ✷✽✷✽✱ ▼❛② ✷✵✵✵✳
❬✹✹❪ ❲✐❧❧✐❛♠ ❙t❛❧❧✐♥❣s ❛♥❞ ▲❛✇r✐❡ ❇r♦✇♥✳ ❈♦♠♣✉t❡r s❡❝✉r✐t②✿ ♣r✐♥❝✐♣❧❡s ❛♥❞ ♣r❛❝t✐❝❡✳P❡❛rs♦♥ ❊❞✉❝❛t✐♦♥ ❯♣♣❡r ❙❛❞❞❧❡ ❘✐✈❡r ✭◆❏✱ ✷✵✶✽✳
❬✹✺❪ ❚✉❛♥ ❆ ❚❛♥❣✱ ▲♦t✜ ▼❤❛♠❞✐✱ ❉❡s ▼❝▲❡r♥♦♥✱ ❙②❡❞ ❆❧✐ ❘❛③❛ ❩❛✐❞✐✱ ❛♥❞ ▼♦✉♥✐r●❤♦❣❤♦✳ ❉❡❡♣ ❧❡❛r♥✐♥❣ ❛♣♣r♦❛❝❤ ❢♦r ♥❡t✇♦r❦ ✐♥tr✉s✐♦♥ ❞❡t❡❝t✐♦♥ ✐♥ s♦❢t✇❛r❡ ❞❡✲✜♥❡❞ ♥❡t✇♦r❦✐♥❣✳ ♣❛❣❡s ✷✺✽✕✷✻✸✱ ✷✵✶✻✳
❬✹✻❪ ▼❛❤❜♦❞ ❚❛✈❛❧❧❛❡❡✱ ❊❜r❛❤✐♠ ❇❛❣❤❡r✐✱ ❲❡✐ ▲✉✱ ❛♥❞ ❆❧✐ ❆ ●❤♦r❜❛♥✐✳ ❆ ❞❡t❛✐❧❡❞❛♥❛❧②s✐s ♦❢ t❤❡ ❦❞❞ ❝✉♣ ✾✾ ❞❛t❛ s❡t✳ ■♥ ✷✵✵✾ ■❊❊❊ ❙②♠♣♦s✐✉♠ ♦♥ ❈♦♠♣✉t❛t✐♦♥❛❧■♥t❡❧❧✐❣❡♥❝❡ ❢♦r ❙❡❝✉r✐t② ❛♥❞ ❉❡❢❡♥s❡ ❆♣♣❧✐❝❛t✐♦♥s✱ ♣❛❣❡s ✶✕✻✳ ■❊❊❊✱ ✷✵✵✾✳
❬✹✼❪ ❲❡✐ ❲❛♥❣✱ ▼✐♥❣ ❩❤✉✱ ❏✐♥❧✐♥ ❲❛♥❣✱ ❳✉❡✇❡♥ ❩❡♥❣✱ ❛♥❞ ❩❤♦♥❣③❤❡♥ ❨❛♥❣✳ ❊♥❞✲t♦✲❡♥❞ ❡♥❝r②♣t❡❞ tr❛✣❝ ❝❧❛ss✐✜❝❛t✐♦♥ ✇✐t❤ ♦♥❡✲❞✐♠❡♥s✐♦♥❛❧ ❝♦♥✈♦❧✉t✐♦♥ ♥❡✉r❛❧♥❡t✇♦r❦s✳ ■♥ ✷✵✶✼ ■❊❊❊ ■♥t❡r♥❛t✐♦♥❛❧ ❈♦♥❢❡r❡♥❝❡ ♦♥ ■♥t❡❧❧✐❣❡♥❝❡ ❛♥❞ ❙❡❝✉r✐t②■♥❢♦r♠❛t✐❝s ✭■❙■✮✱ ♣❛❣❡s ✹✸✕✹✽✳ ■❊❊❊✱ ✷✵✶✼✳
❬✹✽❪ ❙✐♠♦♥ ❲✐❡s❧❡r ❛♥❞ ❍❡r♠❛♥♥ ◆❡②✳ ❆ ❝♦♥✈❡r❣❡♥❝❡ ❛♥❛❧②s✐s ♦❢ ❧♦❣✲❧✐♥❡❛r tr❛✐♥✐♥❣✳■♥ ❆❞✈❛♥❝❡s ✐♥ ◆❡✉r❛❧ ■♥❢♦r♠❛t✐♦♥ Pr♦❝❡ss✐♥❣ ❙②st❡♠s✱ ♣❛❣❡s ✻✺✼✕✻✻✺✱ ✷✵✶✶✳
❬✹✾❪ ◆✐❣❡❧ ❲✐❧❧✐❛♠s✱ ❙❡❜❛st✐❛♥ ❩❛♥❞❡r✱ ❛♥❞ ●r❡♥✈✐❧❧❡ ❆r♠✐t❛❣❡✳ ❆ ♣r❡❧✐♠✐♥❛r② ♣❡r❢♦r✲♠❛♥❝❡ ❝♦♠♣❛r✐s♦♥ ♦❢ ✜✈❡ ♠❛❝❤✐♥❡ ❧❡❛r♥✐♥❣ ❛❧❣♦r✐t❤♠s ❢♦r ♣r❛❝t✐❝❛❧ ✐♣ tr❛✣❝ ✢♦✇❝❧❛ss✐✜❝❛t✐♦♥✳ ❆❈▼ ❙■●❈❖▼▼ ❈♦♠♣✉t❡r ❈♦♠♠✉♥✐❝❛t✐♦♥ ❘❡✈✐❡✇✱ ✸✻✭✺✮✿✺✕✶✻✱✷✵✵✻✳
❬✺✵❪ ❆❧✐❝❡ ❩❤❡♥❣ ❛♥❞ ❆♠❛♥❞❛ ❈❛s❛r✐✳ ❋❡❛t✉r❡ ❊♥❣✐♥❡❡r✐♥❣ ❢♦r ▼❛❝❤✐♥❡ ▲❡❛r♥✐♥❣✿Pr✐♥❝✐♣❧❡s ❛♥❞ ❚❡❝❤♥✐q✉❡s ❢♦r ❉❛t❛ ❙❝✐❡♥t✐sts✳ ✧ ❖✬❘❡✐❧❧② ▼❡❞✐❛✱ ■♥❝✳✧✱ ✷✵✶✽✳
❬✺✶❪ ❉❡♥✐s ❩✉❡✈ ❛♥❞ ❆♥❞r❡✇ ❲ ▼♦♦r❡✳ ❚r❛✣❝ ❝❧❛ss✐✜❝❛t✐♦♥ ✉s✐♥❣ ❛ st❛t✐st✐❝❛❧ ❛♣✲♣r♦❛❝❤✳ ■♥ ■♥t❡r♥❛t✐♦♥❛❧ ✇♦r❦s❤♦♣ ♦♥ ♣❛ss✐✈❡ ❛♥❞ ❛❝t✐✈❡ ♥❡t✇♦r❦ ♠❡❛s✉r❡♠❡♥t✱♣❛❣❡s ✸✷✶✕✸✷✹✳ ❙♣r✐♥❣❡r✱ ✷✵✵✺✳
✼✹
![Page 82: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/82.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
❆ ❆PP❊◆❉■❳
❆ ❆♣♣❡♥❞✐①
✼✺
![Page 83: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/83.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.Die approbierte gedruckte Originalversion dieser Diplomarbeit ist an der TU Wien Bibliothek verfügbar.The approved original version of this thesis is available in print at TU Wien Bibliothek.
❆❆PP❊◆❉■❳
▼♦❞❡❧s ◆✉♠❜❡r ♦❢ ▲❛②❡rs ◆✉♠❜❡r ♦❢ ❝❡❧❧s ✐♥ ❧❛②❡r ❚②♣❡ ♦❢ ❈❡❧❧s ❊♣♦❝❤s ▲❡❛r♥✐♥❣ ❘❛t❡ ♠❛①❴❜❛t❝❤▼♦❞❡❧ ✶ ✶✱ ✸✱ ✺ ✶✷✽✱ ✺✶✷✱ ✶✵✷✹✱ ✶✺✵✵ ▲❙❚▼ ✶ ✵✳✵✵✶✱ ✵✳✵✶ ✺✶✷✱ ✶✵✷✹✱ ✺✵✵✵✱ ✶✵✵✵✵✱ ✶✺✵✵✵▼♦❞❡❧ ✷ ✶✱ ✸ ✶✷✽ ❇❛t❝❤◆♦r♠✱ ▲❙❚▼ ✶ ✵✳✵✵✶✱ ✵✳✵✶ ✶✵✷✹▼♦❞❡❧ ✸ ✶✱ ✸ ✶✷✽ ▲❛②❡r◆♦r♠✱ ❇❛t❝❤◆♦r♠✱ ▲❙❚▼ ✶ ✵✳✵✵✶ ✶✵✷✹▼♦❞❡❧ ✹ ✶✱ ✸ ✶✷✽ ●❘❯✱ ▲❙❚▼ ✶ ✵✳✵✵✶ ✶✵✷✹
❚❛❜❧❡ ✷✾✿ ❚r❛✐♥✐♥❣ ♣❛r❛♠❡t❡rs
✼✻
![Page 84: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/84.jpg)
Die approbierte gedruckte Originalversion dieser Diplomarbeit ist an der TU Wien Bibliothek verfügbar.The approved original version of this thesis is available in print at TU Wien Bibliothek.
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.
❆ ❆PP❊◆❉■❳
❚❛❜❧❡ ♦❢ ❆❜❜r❡✈✐❛t✐♦♥s
■❉❙ ■♥tr✉s✐♦♥ ❉❡t❡❝t✐♦♥ ❙②st❡♠
●P❙ ●❧♦❜❛❧ P♦s✐t✐♦♥✐♥❣ ❙②st❡♠
▼▲ ▼❛❝❤✐♥❡ ▲❡❛r♥✐♥❣
❉P■ ❉❡❡♣ P❛❝❦❡t ■♥s♣❡❝t✐♦♥
❉◆◆ ❉❡❡♣ ◆❡✉r❛❧ ◆❡t✇♦r❦
❑◆◆ ❦✲◆❡❛r❡st ◆❡✐❣❤❜♦rs
◆▲P ◆❛t✉r❛❧ ▲❛♥❣✉❛❣❡ Pr♦❝❡ss✐♥❣
❘◆◆ ❘❡❝✉rr❡♥t ◆❡✉r❛❧ ◆❡t✇♦r❦
▲❙❚▼ ▲♦♥❣✲❙❤♦rt ❚❡r♠ ▼❡♠♦r②
●❘❯ ●❛t❡❞ ❘❡❝✉rr❡♥t ❯♥✐t
◆❇ ◆❛✐✈❡ ❇❛②❡s
❙❱▼ ❙✉♣♣♦rt ❱❡❝t♦r ▼❛❝❤✐♥❡
❉❚ ❉❡❝✐s✐♦♥ ❚r❡❡
❑◆◆ ❑✲◆❡❛r❡st ◆❡✐❣❤❜♦r
❑▼❈ ❑✲▼❡❛♥s ❈❧✉st❡r✐♥❣
❈■❆ ❈♦♥✜❞❡♥t✐❛❧✐t② ■♥t❡❣r✐t② ❆✈❛✐❧❛❜✐❧✐t②
❉♦❙ ❉❡♥✐❛❧ ♦❢ ❙❡r✈✐❝❡
■P ■♥t❡r♥❡t Pr♦t♦❝♦❧
❚❈P ❚r❛♥s♣♦rt ❈♦♥tr♦❧ Pr♦t♦❝♦❧
❯❉P ❯s❡r ❉❛t❛❣r❛♠ Pr♦t♦❝♦❧
■❆◆❆ ■♥t❡r♥❡t ❆ss✐❣♥❡❞ ◆✉♠❜❡rs ❆✉t❤♦r✐t②
❉♦❙ ❉❡♥✐❛❧ ♦❢ ❙❡r✈✐❝❡
●❚ ●r♦✉♥❞ ❚r✉t❤
✼✼
![Page 85: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/85.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
▲■❙❚ ❖❋ ❋■●❯❘❊❙ ▲■❙❚ ❖❋ ❋■●❯❘❊❙
◗♦❙ ◗✉❛❧✐t② ♦❢ ❙❡r✈✐❝❡
❈♦❙ ❈❧❛ss ♦❢ ❙❡r✈✐❝❡
❙❉◆ ❙♦❢t✇❛r❡ ❉❡✜♥❡ ◆❡t✇♦r❦
❙❈❆❉❆ ❙②st❡♠ ❈♦♥tr♦❧ ❛♥❞ ❉❛t❛ ❆❝q✉✐s✐t✐♦♥
❚❯ ❲✐❡♥ ❱✐❡♥♥❛ ❯♥✐✈❡rs✐t② ♦❢ ❚❡❝❤♥♦❧♦❣②
❆❈❈❙ ❆✉str❛❧✐❛♥ ❈❡♥tr❡ ❢♦r ❈②❜❡r ❙❡❝✉r✐t②
▲✐st ♦❢ ❋✐❣✉r❡s
✶ ◆❡t✇♦r❦ ❙❡❝✉r✐t② Pr✐♥❝✐♣❧❡ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✻✷ ■♥tr✉s✐♦♥ ❉❡t❡❝t✐♦♥ ❙②st❡♠ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✽✸ ❉❛t❛ ❊♥❝r②♣t✐♦♥ ♣❤❛s❡s ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✶✵✹ ■Ps❡❝ ✭❛✮tr❛♥s♣♦rt ♠♦❞❡✱ ✭❜✮ t✉♥♥❡❧ ♠♦❞❡ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✶✶✺ ❚r❛♥s♣♦rt ▲❛②❡r ❙❡❝✉r✐t② ♣❛❝❦❡t ❢♦r♠❛t ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✶✶✻ ❚▲❙ ✐♥✐t✐❛❧ ❤❛♥❞s❤❛❦❡ ✲ ♣r♦❝❡ss ♦❢ ❡st❛❜❧✐s❤✐♥❣ t❤❡ ❚▲❙ ❡♥❝r②♣t✐♦♥✳ ■♥
t❤❡ ✜rst ♣❤❛s❡✱ ❚❈P ❤❛♥❞s❤❛❦❡ ✐s ❡st❛❜❧✐s❤❡❞✱ t❤❡♥ t❤❡ ✈❡rs✐♦♥ ♦❢ ❚▲❙✐s ❡①❝❤❛♥❣❡❞ ❛♥❞ ❝✐♣❤❡rs✉✐t❡ ♥❡❣♦t✐❛t❡❞✳ ❆❢t❡r ❝✐♣❤❡rs✉✐t❡ ♥❡❣♦t✐❛t✐♦♥✱t❤❡ ❦❡② ♣❛r❛♠❡t❡rs ❛r❡ ❡①❝❤❛♥❣❡❞✱ ❛♥❞ ❛❢t❡r ❦❡② ❤❛s ❜❡❡♥ ♣r♦✈❡♥✱ t❤❡❡♥❝r②♣t❡❞ ❞❛t❛ ❡①❝❤❛♥❣❡ ❝❛♥ ❜❡ st❛rt❡❞✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✶✷
✼ ❊①♣❧♦✐ts ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✶✻✽ ●❡♥❡r✐❝ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✶✻✾ ❉♦❙ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✶✻✶✵ ❘❡❝♦♥♥❛✐ss❛♥❝❡ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✶✻✶✶ ❙❤❡❧❧❝♦❞❡ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✶✻✶✷ ❋✉③③❡rs ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✶✻✶✸ ❲♦r♠s ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✶✼✶✹ ◆❡✉r♦♥ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✷✵✶✺ ❙✐❣♠♦✐❞ ❛❝t✐✈❛t✐♦♥ ❢✉♥❝t✐♦♥ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✷✶✶✻ ❚❛♥❤ ❛❝t✐✈❛t✐♦♥ ❢✉♥❝t✐♦♥ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✷✶✶✼ ❘❡▲❯ ❛❝t✐✈❛t✐♦♥ ❢✉♥❝t✐♦♥ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✷✷✶✽ ❙♦❢t♠❛① ❛❝t✐✈❛t✐♦♥ ❢✉♥❝t✐♦♥ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✷✷✶✾ ◆❡✉r❛❧ ◆❡t✇♦r❦ ❬✹✵❪ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✷✸✷✵ ❘❡❝✉rr❡♥t ◆❡✉r❛❧ ◆❡t✇♦r❦ ❬✹✶❪ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✷✻✷✶ ▲♦♥❣✲s❤♦rt ❚❡r♠ ▼❡♠♦r② ❝❡❧❧ ❬✹✶❪ ✲ s❤♦✇s ✹ ❣❛t❡ str✉❝t✉r❡ ❞❡s❝r✐❜❡❞
✐♥ ❢♦❧❧♦✇✐♥❣ t❡①t ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✷✼
✼✽
![Page 86: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/86.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
▲■❙❚ ❖❋ ❚❆❇▲❊❙ ▲■❙❚ ❖❋ ❚❆❇▲❊❙
✷✷ ●❛t❡❞ ❘❡❝✉rr❡♥t ❯♥✐t ❬✹✶❪ ✲ s✐♠✐❧❛r str✉❝t✉r❡ ❛s t❤❡ ▲❙❚▼✱ ❞❡s❝r✐❜❡❞✐♥ ❢♦❧❧♦✇✐♥❣ ♣❛r❛❣r❛♣❤ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✷✾
✷✸ ❊①♣❡r✐♠❡♥t ❞✐❛❣r❛♠ ✲ s❤♦✇s ♠❛✐♥ ❝❤❡❝❦♣♦✐♥ts ❞✉r✐♥❣ ♦✉r r❡s❡❛r❝❤ ✭❡①✲♣❧❛✐♥❡❞ ✐♥ ❞❡t❛✐❧s ✐♥✿ ✹✳✷ ❛♥❞ ✹✳✸ ✮ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✸✸
✷✹ ❯◆❙❲✲◆❇✶✺ ❞❛t❛ s❡t ❣❡♥❡r❛t♦r ❛r❝❤✐t❡❝t✉r❡ ❬✸✽❪ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✸✺✷✺ ❋❡❛t✉r❡ s❡t ❝♦♠♣❛r✐s♦♥ ❬✸✺❪ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✸✼✷✻ ❇❛t❝❤ ❚r❛✐♥✐♥❣ ❡①❛♠♣❧❡ ✲ ❞✐✛❡r❡♥t ❝♦❧♦r r❡❝t❛♥❣❧❡s r❡♣r❡s❡♥t ✈❛r✐❛❜❧❡
s✐③❡ ❜❛t❝❤❡s✳ ■♥s✐❞❡ t❤❡ ❜❛t❝❤❡s✱ ✢♦✇s r❡♣r❡s❡♥t❡❞ ❜② t❤❡✐r ❢❡❛t✉r❡✈❡❝t♦rs ❛r❡ s❤♦✇♥ ✇✐t❤ ❞✐✛❡r❡♥t ❝♦❧♦rs✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✹✷
✷✼ ❈♦♥❢✉s✐♦♥ ▼❛tr✐① ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✹✸✷✽ ❇❛t❝❤ ◆♦r♠❛❧✐③❛t✐♦♥ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✹✼✷✾ ▲❛②❡r ◆♦r♠❛❧✐③❛t✐♦♥ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✹✾✸✵ ▼♦❞❡❧ ✶✳ ❇❛s✐❝▲❙❚▼ ✲ ❝♦♥s✐st ♦❢ ✶ ❧❛②❡r ♦❢ ▲❙❚▼ ❝❡❧❧s✳ ❚❤❡ ✐♥♣✉t
❞❛t❛ ✐s ♣❛ss❡❞ t❤r♦✉❣❤ ✶ ❧❛②❡r ♦❢ ▲❙❚▼ ❝❡❧❧s ❛♥❞ ♣❛ss❡❞ t♦ ❞❡♥s❡ ❧❛②❡r✳❉❡♥s❡ ❧❛②❡r ✐s ❢✉❧❧② ❝♦♥♥❡❝t❡❞ ❧❛②❡r ✇❤✐❝❤ ♦✉t♣✉ts s✐♥❣❧❡ ✈❛❧✉❡s ♣❡r ✢♦✇✇❤✐❝❤ ✐s t❤❡♥ ✉s❡❞ t♦ ❝♦♠♣❛r❡ ✇✐t❤ ✐♥♣✉t ❞❛t❛ ❛♥❞ t♦ ❝❛❧❝✉❧❛t❡ ❧♦ss❛♥❞ ❛❝❝✉r❛❝②✭r❡❞✉❝❡ ♠❡❛♥✮ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✺✹
✸✶ ▼♦❞❡❧ ✷✳❇❛t❝❤ ◆♦r♠❛❧✐③❛t✐♦♥ ✲ ❝♦♥s✐st ♦❢ ✶ ❧❛②❡r ♦❢ ▲❙❚▼ ❝❡❧❧s ✇✐t❤♦♥❡ ❜❛t❝❤ ♥♦r♠❛❧✐③❛t✐♦♥ ❧❛②❡r ❜❡t✇❡❡♥ ▲❙❚▼ ❛♥❞ ❞❡♥s❡ ❧❛②❡r ✳ ✳ ✳ ✳ ✳ ✻✵
✸✷ ▼♦❞❡❧ ✸✳▲❛②❡r ◆♦r♠❛❧✐③❛t✐♦♥ ✲ ❝♦♥s✐st ♦❢ ✶ ❧❛②❡r ♦❢ ▲❙❚▼ ❝❡❧❧s ❢♦❧❧♦✇❡❞❜② ❧❛②❡r ♥♦r♠❛❧✐③❛t✐♦♥ ❧❛②❡r✱ ✇❤✐❝❤ ✐s ❝♦♥♥❡❝t❡❞ t♦ ❞❡♥s❡ ❧❛②❡r ✳ ✳ ✳ ✳ ✻✸
✸✸ ▼♦❞❡❧ ✹✳ ●❘❯ ❝❡❧❧ ▲❛②❡r ✲ ❝♦♥s✐st ♦❢ ✶ ❧❛②❡r ♦❢ ●❘❯ ❝❡❧❧s ✐♥st❡❛❞ ▲❙❚▼❝❡❧❧s ❝♦♥♥❡❝t❡❞ t♦ ❞❡♥s❡ ❧❛②❡r ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✻✺
▲✐st ♦❢ ❚❛❜❧❡s
✶ ❯◆❙❲✲◆❇✶✺ ❞❛t❛ s❡t s♣❡❝✐✜❝❛t✐♦♥s ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✸✺✷ ❉❛t❛ s❡t ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✹✶✸ ❚❡st ❞❛t❛ s♣❡❝✐✜❝❛t✐♦♥ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✺✸✹ ❇❛s✐❝ ▲❙❚▼ ◆✉♠❜❡r ♦❢ ❧❛②❡rs ✲ ❇❛s✐❝ ♣❛r❛♠❡t❡rs ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✺✺✺ ❇❛s✐❝ ▲❙❚▼ ◆✉♠❜❡r ♦❢ ❧❛②❡rs ✲ P❡r❢♦r♠❛♥❝❡ ❡✈❛❧✉❛t✐♦♥ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✺✺✻ ❇❛s✐❝ ▲❙❚▼ ◆✉♠❜❡r ♦❢ ❧❛②❡rs ✲ ❆❝❝✉r❛❝② ♦❢ ❛tt❛❝❦ ❝❛t❡❣♦r② ❝❧❛ss✐✜❝❛✲
t✐♦♥ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✺✻✼ ❇❛s✐❝ ▲❙❚▼ ❧❡❛r♥✐♥❣ r❛t❡ ✲ ❇❛s✐❝ ♣❛r❛♠❡t❡rs ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✺✻✽ ❇❛s✐❝ ▲❙❚▼ ❧❡❛r♥✐♥❣ r❛t❡ ✲ P❡r❢♦r♠❛♥❝❡ ❡✈❛❧✉❛t✐♦♥ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✺✻✾ ❇❛s✐❝ ▲❙❚▼ ❧❡❛r♥✐♥❣ r❛t❡ ✲ ❆❝❝✉r❛❝② ♦❢ ❛tt❛❝❦ ❝❛t❡❣♦r② ❝❧❛ss✐✜❝❛t✐♦♥ ✳ ✺✼✶✵ ❇❛s✐❝ ▲❙❚▼ ❝❡❧❧ ✉♥✐ts ✲ ❇❛s✐❝ ♣❛r❛♠❡t❡rs ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✺✼✶✶ ❇❛s✐❝ ▲❙❚▼ ❝❡❧❧ ✉♥✐ts ✲ P❡r❢♦r♠❛♥❝❡ ❡✈❛❧✉❛t✐♦♥ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✺✽✶✷ ❇❛s✐❝ ▲❙❚▼ ❝❡❧❧ ✉♥✐ts ✲ ❆❝❝✉r❛❝② ♦❢ ❛tt❛❝❦ ❝❛t❡❣♦r② ❝❧❛ss✐✜❝❛t✐♦♥ ✳ ✳ ✳ ✺✽✶✸ ❇❛s✐❝ ▲❙❚▼ ♠❛①❴❜❛t❝❤ ✲ ❇❛s✐❝ ♣❛r❛♠❡t❡rs ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✺✽
✼✾
![Page 87: Classifying Encrypted Network Traffic based on Deep Learning](https://reader030.fdocuments.in/reader030/viewer/2022012618/619f9b4f7af99a393b6db497/html5/thumbnails/87.jpg)
Die
app
robi
erte
ged
ruck
te O
rigin
alve
rsio
n di
eser
Dip
lom
arbe
it is
t an
der
TU
Wie
n B
iblio
thek
ver
fügb
ar.
The
app
rove
d or
igin
al v
ersi
on o
f thi
s th
esis
is a
vaila
ble
in p
rint a
t TU
Wie
n B
iblio
thek
.D
ie a
ppro
bier
te g
edru
ckte
Orig
inal
vers
ion
dies
er D
iplo
mar
beit
ist a
n de
r T
U W
ien
Bib
lioth
ek v
erfü
gbar
.T
he a
ppro
ved
orig
inal
ver
sion
of t
his
thes
is is
ava
ilabl
e in
prin
t at T
U W
ien
Bib
lioth
ek.
▲■❙❚ ❖❋ ❚❆❇▲❊❙ ▲■❙❚ ❖❋ ❚❆❇▲❊❙
✶✹ ❇❛s✐❝ ▲❙❚▼ ♠❛①❴❜❛t❝❤ ✲ P❡r❢♦r♠❛♥❝❡ ❡✈❛❧✉❛t✐♦♥ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✺✾✶✺ ❇❛s✐❝ ▲❙❚▼ ♠❛①❴❜❛t❝❤ ✲ ❆❝❝✉r❛❝② ♦❢ ❛tt❛❝❦ ❝❛t❡❣♦r② ❝❧❛ss✐✜❝❛t✐♦♥ ✳ ✺✾✶✻ ▲❙❚▼ ✇✐t❤ ❇❛t❝❤ ◆♦r♠❛❧✐③❛t✐♦♥ ✲ ❇❛s✐❝ ♣❛r❛♠❡t❡rs ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✻✵✶✼ ▲❙❚▼ ✇✐t❤ ❇❛t❝❤ ◆♦r♠❛❧✐③❛t✐♦♥ ✲ P❡r❢♦r♠❛♥❝❡ ❡✈❛❧✉❛t✐♦♥ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✻✶✶✽ ▲❙❚▼ ✇✐t❤ ❛♥❞ ✇✐t❤♦✉t ❇❛t❝❤ ◆♦r♠❛❧✐③❛t✐♦♥ ✲ ❆❝❝✉r❛❝② ♦❢ ❛tt❛❝❦
❝❛t❡❣♦r② ❝❧❛ss✐✜❝❛t✐♦♥ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✻✶✶✾ ❇❛t❝❤ ◆♦r♠❛❧✐③❛t✐♦♥ ❧❡❛r♥✐♥❣ r❛t❡ ✲ ❇❛s✐❝ ♣❡r❢♦r♠❛♥❝❡ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✻✷✷✵ ❇❛t❝❤ ◆♦r♠❛❧✐③❛t✐♦♥ ❧❡❛r♥✐♥❣ r❛t❡ ✲ P❡r❢♦r♠❛♥❝❡ ❡✈❛❧✉❛t✐♦♥ ✳ ✳ ✳ ✳ ✳ ✳ ✻✷✷✶ ❇❛t❝❤ ◆♦r♠❛❧✐③❛t✐♦♥ ❧❡❛r♥✐♥❣ r❛t❡ ✲ ❆❝❝✉r❛❝② ♦❢ ❛tt❛❝❦ ❝❛t❡❣♦r② ❝❧❛s✲
s✐✜❝❛t✐♦♥ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✻✷✷✷ ▲❙❚▼ ✇✐t❤ ▲❛②❡r ◆♦r♠❛❧✐③❛t✐♦♥ ▲❛②❡r ❛♥❞ ❇❛t❝❤ ◆♦r♠❛❧✐③❛t✐♦♥ ✲ ❇❛s✐❝
♣❛r❛♠❡t❡rs ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✻✸✷✸ ▲❙❚▼ ✇✐t❤ ▲❛②❡r ◆♦r♠❛❧✐③❛t✐♦♥ ▲❛②❡r ❛♥❞ ❇❛t❝❤ ◆♦r♠❛❧✐③❛t✐♦♥ ✲ P❡r✲
❢♦r♠❛♥❝❡ ❡✈❛❧✉❛t✐♦♥ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✻✹✷✹ ▲❙❚▼ ✇✐t❤ ▲❛②❡r ◆♦r♠❛❧✐③❛t✐♦♥ ▲❛②❡r ❛♥❞ ❇❛t❝❤ ◆♦r♠❛❧✐③❛t✐♦♥ ✲ ❆❝✲
❝✉r❛❝② ♦❢ ❛tt❛❝❦ ❝❛t❡❣♦r② ❝❧❛ss✐✜❝❛t✐♦♥ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✻✹✷✺ ●❘❯ ✈s✳ ▲❙❚▼ ✲ ❇❛s✐❝ ♣❛r❛♠❡t❡rs ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✻✺✷✻ ●❘❯ ✈s✳ ▲❙❚▼ ✲ P❡r❢♦r♠❛♥❝❡ ❡✈❛❧✉❛t✐♦♥ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✻✻✷✼ ●❘❯ ✈s✳ ▲❙❚▼ ✲ ❆❝❝✉r❛❝② ♦❢ ❛tt❛❝❦ ❝❛t❡❣♦r② ❝❧❛ss✐✜❝❛t✐♦♥ ✳ ✳ ✳ ✳ ✳ ✳ ✻✻✷✽ ❚❤❡ ♠♦st ❡✣❝✐❡♥t ♠♦❞❡❧ ❛❝❝♦r❞✐♥❣ t♦ ♦✉r ❡①♣❡r✐♠❡♥ts ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✻✼✷✾ ❚r❛✐♥✐♥❣ ♣❛r❛♠❡t❡rs ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✳ ✼✻
✽✵