Publication Details
Towards identification of network applications in encrypted traffic
Matoušek Petr, doc. Ing., Ph.D., M.A. (DIFS FIT BUT)
Ryšavý Ondřej, doc. Ing., Ph.D. (DIFS FIT BUT)
TLS fingerprinting, JA4, encrypted traffic, application identification, machine learning
Network traffic monitoring for security threat detection and network performance management is challenging due to the encryption of most communications. This article addresses the problem of identifying network applications associated with Transport Layer Security (TLS) connections. The evaluation of three primary approaches to classifying TLS-encrypted traffic was carried out: fingerprinting methods, Server Name Indication (SNI)-based identification, and machine learning-based classifiers. Each method has its own strengths and limitations: fingerprinting relies on a regularly updated database of known hashes, SNI is vulnerable to obfuscation or missing information, and AI techniques such as machine learning require sufficient labeled training data. A comparison of these methods highlights the challenges of identifying individual applications, as the TLS properties are significantly shared between applications. Nevertheless, even when identifying a collection of candidate applications, a valuable insight into network monitoring can be gained, and this can be achieved with high accuracy by all the methods considered. To facilitate further research in this area, a novel publicly available dataset of TLS communications has been created, with the communications annotated for popular desktop and mobile applications. Furthermore, the results of three different approaches to refine TLS traffic classification based on a combination of basic classifiers and context are presented. Finally, practical use cases are proposed, and future research directions are identified to further improve application identification methods.
@ARTICLE{FITPUB13566, author = "Ivana Burgetov\'{a} and Petr Matou\v{s}ek and Ond\v{r}ej Ry\v{s}av\'{y}", title = "Towards identification of network applications in encrypted traffic", pages = "1--18", journal = "Annals of Telecommunication", volume = 2025, number = 9, year = 2025, ISSN = "1958-9395", doi = "10.1007/s12243-025-01114-z", language = "english", url = "https://www.fit.vut.cz/research/publication/13566" }