MODELS AND ALGORITHMS FOR IDENTIFYING RELATIONSHIPS IN TUNNEL TRAFFIC
DOI:
https://doi.org/10.30888/2663-5712.2026-35-01-100Keywords:
tunneled traffic, application identification, hidden Markov models, encrypted traffic, network traffic analysis, VPN, machine learning.Abstract
The article considers the problem of identifying applications in tunnel traffic in conditions of widespread use of encryption, VPN technologies, and anonymous networks. An identification model based on hidden Markov models is proposed, which uses statistiReferences
Mazel, J., Saudrais, M. and Hervieu, A. (2022) ML-based tunnel detection and tunneled application classification, arXiv:2201.10371. Available at: https://doi.org/10.48550/arXiv.2201.10371
Zhang, Y., Sun, W. and Zhang, S. (2023) ‘Identify VPN Traffic Under HTTPS Tunnel Using Three-Dimensional Sequence Features’, in Proceedings of the 2022 11th International Conference on Networks, Communication and Computing (ICNCC ’22), ACM, pp. 18–23. doi: 10.1145/3579895.3579899
Razooqi, Y.S. and Pekár, A. (2025) VPN Traffic Analysis: A Survey on Detection and Application Identification, IEEE Access, 13, pp. 132830–132848. doi:10.1109/ACCESS.2025.3592152
Encrypted Network Traffic Classification Based on Machine Learning (2023) Ain Shams Engineering Journal, 15(2), Article 102361. doi:10.1016/j.asej.2023.102361
Жилич, В.A., Цаволик, Т.Г. (2023) Алгоритми безпеки для віртуальних приватних мереж VPN, магіст. кваліфікаційна робота, Західноукраїнський національний університет, Тернопіль. http://dspace.wunu.edu.ua/handle/316497/50201
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2026 Authors

This work is licensed under a Creative Commons Attribution 4.0 International License.


