Research Article

Deep Encrypted Traffic Detection: An Anomaly Detection Framework for Encryption Traffic Based on Parallel Automatic Feature Extraction

Table 1

Accuracy comparison of DETD and eight current encryption traffic intrusion detection algorithms.

AlgorithmsDescriptionAccuracy (%)

Yang et al. [17]Autoencoder96.190
CNN97.901

Zeng et al. [18]1D-CNN + L1 regularization99.851
LSTM + L1 regularization99.222
SAE + L1 regularization98.741

Anderson and Mcgrew [10]SPLT + BD + TLS + HTTP + DNS99.993
SPLT + BD + TLS + HTTP99.983
SPLT + BD + TLS + DNS99.988
HTTP + DNS99.985

Anderson and Mcgrew [11]Meta + SPLT + BD + TLS + SS99.601
Meta + SPLT + BD + TLS99.610
TLS98.202
Meta + SPLT + BD98.900

Anderson et al. [12]Linear regression99.281
L1-logistic regression98.972
Random forest99.990
MLP99.542

Odiathevar et al. [30]AE + MW + IGMM97.435

Kim et al. [31]RVAE97.534

Wang et al. [32]Model collaboration94.353

Our proposed DETDPASE + RF + adaboost/gradient boosting99.994
PASE + L1_R + adaboosting99.998

The bolded values represent the best-performing result.