MODELS AND ALGORITHMS FOR IDENTIFYING RELATIONSHIPS IN TUNNEL TRAFFIC

Authors

DOI:

https://doi.org/10.30888/2663-5712.2026-35-01-100

Keywords:

tunneled traffic, application identification, hidden Markov models, encrypted traffic, network traffic analysis, VPN, machine learning.

Abstract

The article considers the problem of identifying applications in tunnel traffic in conditions of widespread use of encryption, VPN technologies, and anonymous networks. An identification model based on hidden Markov models is proposed, which uses statisti

References

Mazel, J., Saudrais, M. and Hervieu, A. (2022) ML-based tunnel detection and tunneled application classification, arXiv:2201.10371. Available at: https://doi.org/10.48550/arXiv.2201.10371

Zhang, Y., Sun, W. and Zhang, S. (2023) ‘Identify VPN Traffic Under HTTPS Tunnel Using Three-Dimensional Sequence Features’, in Proceedings of the 2022 11th International Conference on Networks, Communication and Computing (ICNCC ’22), ACM, pp. 18–23. doi: 10.1145/3579895.3579899

Razooqi, Y.S. and Pekár, A. (2025) VPN Traffic Analysis: A Survey on Detection and Application Identification, IEEE Access, 13, pp. 132830–132848. doi:10.1109/ACCESS.2025.3592152

Encrypted Network Traffic Classification Based on Machine Learning (2023) Ain Shams Engineering Journal, 15(2), Article 102361. doi:10.1016/j.asej.2023.102361

Жилич, В.A., Цаволик, Т.Г. (2023) Алгоритми безпеки для віртуальних приватних мереж VPN, магіст. кваліфікаційна робота, Західноукраїнський національний університет, Тернопіль. http://dspace.wunu.edu.ua/handle/316497/50201

Published

2026-01-30

How to Cite

Клюшник, В., & Чернецький, Є. (2026). MODELS AND ALGORITHMS FOR IDENTIFYING RELATIONSHIPS IN TUNNEL TRAFFIC. SWorldJournal, 1(35-01), 220–228. https://doi.org/10.30888/2663-5712.2026-35-01-100

Issue

Section

Articles