Research Article

Classification of Markov Encrypted Traffic on Gaussian Mixture Model Constrained Clustering

Table 1

The comparison of existing recent traffic classification algorithms.

AlgorithmAdvantagesDisadvantages

HEDGE [5]High accuracyDifficult in feature extraction
Tree-RNN [6]Small classificationDifficult in feature extraction and model training
DISTILLER [7]Overcome performance limitations of single-modality DL-based TC proposalsDifficult in feature extraction
SOM [9]Enrich the state transitions in the Markov chain and construct more distinctive application fingerprintsIgnore the state transition of network communication and have duplicate fingerprints
MAAF [10]Can accurately classify the applications of the same developerPoor classification to applications with different developers but similar certificates
MaMPF [11]High accuracy in real networksDifficult in feature extraction
LS-CapsNet [12]Solve difficult in feature extractionHigh computation overhead
MGHMM [4]Need fewer features and computational overheadConstrained by encryption methods