Proceedings of International Conference on Applied Innovation in IT
2025/07/26, Volume 13, Issue 3, pp.191-198

A Graph Neural Network Approach for Identifying Decentralized Applications in Encrypted Traffic


Sufrianto Sufrianto, La Harudin, Abbas Oudah Waheed Alomairi and Mohammed Abdul Jaleel Maktoof


Abstract: Cryptographic network traffic classification has been challenged by the advent of decentralized applications (DApps), especially those based on blockchain platforms like Ethereum. It is difficult to identify DApps using traditional methods, such as port-based identification or deep packet inspection, due to their encryption and protocol similarities. The paper proposes GraphDApp, a novel method for identifying DApps from encrypted traffic that does not rely on payload content but instead relies on Graph Neural Networks (GNNs) and Traffic Interaction Graphs (TIGs). Conventional techniques miss structural patterns and interactions in communication flows due to their representation as graphs. A real-world dataset demonstrates that GraphDApp is significantly more accurate, more efficient in training, and more resilient to unmonitored DApps than existing methods, with near-perfect accuracy and stable performance under diverse conditions. We present a GNN-based framework for detecting decentralized applications (DApps) in encrypted traffic, achieving 92.1% F1-score by analyzing transaction patterns. Our method outperforms traditional classifiers by 18.3% while preserving full traffic encryption.

Keywords: Graph Neural Networks (GNNs), Encrypted Traffic Classification, Decentralized Applications (DApps), Traffic Interaction Graphs (TIGs), Network Traffic Analysis.

DOI: Under Indexing

Download: PDF

References:

  1. P. Rani, S. Verma, S. P. Yadav, B. K. Rai, M. S. Naruka, and D. Kumar, "Simulation of the lightweight blockchain technique based on privacy and security for healthcare data for the cloud system," International Journal of E-Health and Medical Communications (IJEHMC), vol. 13, no. 4, pp. 1-15, 2022.
  2. P. Rani, P. N. Singh, S. Verma, N. Ali, P. K. Shukla, and M. Alhassan, "An implementation of modified blowfish technique with honey bee behavior optimization for load balancing in cloud system environment," Wireless Communications and Mobile Computing, vol. 2022, pp. 1-14, 2022.
  3. R. T. El-Maghraby, N. M. Abd Elazim, and A. M. Bahaa-Eldin, "A survey on deep packet inspection," in Proc. 12th International Conference on Computer Engineering and Systems (ICCES), Cairo, Egypt, Dec. 2017, pp. 188-197, doi: 10.1109/ICCES.2017.8275301.
  4. P. Rani and R. Sharma, "Intelligent transportation system for internet of vehicles based vehicular networks for smart cities," Computers and Electrical Engineering, vol. 105, p. 108543, 2023.
  5. A. Dainotti, A. Pescape, and K. Claffy, "Issues and future directions in traffic classification," IEEE Network, vol. 26, no. 1, pp. 35-40, Jan. 2012, doi: 10.1109/MNET.2012.6135854.
  6. S. Rezaei and X. Liu, "Deep Learning for Encrypted Traffic Classification: An Overview," IEEE Communications Magazine, vol. 57, no. 5, pp. 76-81, May 2019, doi: 10.1109/MCOM.2019.1800819.
  7. N. Hussain, P. Rani, N. Kumar, and M. G. Chaudhary, "A deep comprehensive research architecture, characteristics, challenges, issues, and benefits of routing protocol for vehicular ad-hoc networks," International Journal of Distributed Systems and Technologies (IJDST), vol. 13, no. 8, pp. 1-23, 2022.
  8. X. Li et al., "Prediction of urban human mobility using large-scale taxi traces and its applications," Frontiers of Computer Science, vol. 6, no. 1, pp. 111-121, Feb. 2012, doi: 10.1007/s11704-011-1192-6.
  9. B. Yu, M. Li, J. Zhang, and Z. Zhu, "3D Graph Convolutional Networks with Temporal Graphs: A Spatial Information Free Framework For Traffic Forecasting," arXiv preprint, 2019, doi: 10.48550/ARXIV.1903.00919.
  10. N. Hussain and P. Rani, "Comparative studied based on attack resilient and efficient protocol with intrusion detection system based on deep neural network for vehicular system security," in Distributed Artificial Intelligence, Boca Raton, FL, USA: CRC Press, 2020, pp. 217-236.
  11. L. Moreira-Matias, J. Gama, M. Ferreira, J. Mendes-Moreira, and L. Damas, "Predicting Taxi–Passenger Demand Using Streaming Data," IEEE Transactions on Intelligent Transportation Systems, vol. 14, no. 3, pp. 1393-1402, Sep. 2013, doi: 10.1109/TITS.2013.2262376.
  12. Y. Tong et al., "The Simpler The Better: A Unified Approach to Predicting Original Taxi Demands based on Large-Scale Online Platforms," in Proc. 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Halifax, NS, Canada, Aug. 2017, pp. 1653-1662, doi: 10.1145/3097983.3098018.
  13. A. Panchenko et al., "Website Fingerprinting at Internet Scale," in Proc. Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, 2016, doi: 10.14722/ndss.2016.23477.
  14. T. Wang, X. Cai, R. Nithyanand, R. Johnson, and I. Goldberg, "Effective attacks and provable defenses for website fingerprinting," in Proc. 23rd USENIX Security Symposium, San Diego, CA, USA, 2014, pp. 143-157, [Online]. Available: https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/wang_tao.
  15. V. F. Taylor, R. Spolaor, M. Conti, and I. Martinovic, "AppScanner: Automatic Fingerprinting of Smartphone Apps from Encrypted Network Traffic," in Proc. IEEE European Symposium on Security and Privacy (EuroS&P), Saarbrucken, Germany, Mar. 2016, pp. 439-454, doi: 10.1109/EuroSP.2016.40.
  16. M. Shen, J. Zhang, L. Zhu, K. Xu, X. Du, and Y. Liu, "Encrypted traffic classification of decentralized applications on ethereum using feature fusion," in Proc. ACM International Symposium on Quality of Service, Phoenix, AZ, USA, Jun. 2019, pp. 1-10, doi: 10.1145/3326285.3329053.
  17. G. Ansari, P. Rani, and V. Kumar, "A novel technique of mixed gas identification based on the group method of data handling (GMDH) on time-dependent MOX gas sensor data," in Proc. International Conference on Recent Trends in Computing (ICRTC), 2022, pp. 641-654.
  18. Q. Meng, H. Guo, Y. Liu, H. Chen, and D. Cao, "Trajectory Prediction for Automated Vehicles on Roads With Lanes Partially Covered by Ice or Snow," IEEE Transactions on Vehicular Technology, vol. 72, no. 6, pp. 6972-6986, Jun. 2023, doi: 10.1109/TVT.2023.3236947.
  19. P. Rani, U. C. Garjola, and H. Abbas, "A Predictive IoT and Cloud Framework for Smart Healthcare Monitoring Using Integrated Deep Learning Model," NJF Intelligent Engineering Journal, vol. 1, no. 1, pp. 53-65, 2024.
  20. B. Anderson and D. McGrew, "Identifying Encrypted Malware Traffic with Contextual Flow Data," in Proc. ACM Workshop on Artificial Intelligence and Security, Vienna, Austria, Oct. 2016, pp. 35-46, doi: 10.1145/2996758.2996768.
  21. M. Shen et al., "Machine Learning-Powered Encrypted Network Traffic Analysis: A Comprehensive Survey," IEEE Communications Surveys & Tutorials, vol. 25, no. 1, pp. 791-824, 2023, doi: 10.1109/COMST.2022.3208196.
  22. N. K. Agrawal et al., "TFL-IHOA: Three-Layer Federated Learning-Based Intelligent Hybrid Optimization Algorithm for Internet of Vehicle," IEEE Transactions on Consumer Electronics, vol. 70, no. 3, pp. 5818-5828, Aug. 2024, doi: 10.1109/TCE.2023.3344129.
  23. G. Srivastava et al., "XAI for Cybersecurity: State of the Art, Challenges, Open Issues and Future Directions," arXiv preprint, 2022, doi: 10.48550/ARXIV.2206.03585.
  24. M. Shen, M. Wei, L. Zhu, and M. Wang, "Classification of encrypted traffic with second-order Markov chains and application attribute bigrams," IEEE Transactions on Information Forensics and Security, vol. 12, no. 8, pp. 1830-1843, 2017.
  25. M. Korczyński and A. Duda, "Markov chain fingerprinting to classify encrypted traffic," in Proc. IEEE Conference on Computer Communications (INFOCOM), Toronto, ON, Canada, 2014, pp. 781-789, [Online]. Available: https://ieeexplore.ieee.org/abstract/document/6848005/.


    HOME

       - Conference
       - Journal
       - Paper Submission to Journal
       - Paper Submission to Conference
       - For Authors
       - For Reviewers
       - Important Dates
       - Conference Committee
       - Editorial Board
       - Reviewers
       - Last Proceedings


    PROCEEDINGS

       - Volume 13, Issue 3 (ICAIIT 2025)
       - Volume 13, Issue 2 (ICAIIT 2025)
       - Volume 13, Issue 1 (ICAIIT 2025)
       - Volume 12, Issue 2 (ICAIIT 2024)
       - Volume 12, Issue 1 (ICAIIT 2024)
       - Volume 11, Issue 2 (ICAIIT 2023)
       - Volume 11, Issue 1 (ICAIIT 2023)
       - Volume 10, Issue 1 (ICAIIT 2022)
       - Volume 9, Issue 1 (ICAIIT 2021)
       - Volume 8, Issue 1 (ICAIIT 2020)
       - Volume 7, Issue 1 (ICAIIT 2019)
       - Volume 7, Issue 2 (ICAIIT 2019)
       - Volume 6, Issue 1 (ICAIIT 2018)
       - Volume 5, Issue 1 (ICAIIT 2017)
       - Volume 4, Issue 1 (ICAIIT 2016)
       - Volume 3, Issue 1 (ICAIIT 2015)
       - Volume 2, Issue 1 (ICAIIT 2014)
       - Volume 1, Issue 1 (ICAIIT 2013)


    PAST CONFERENCES

       ICAIIT 2025
         - Photos
         - Reports

       ICAIIT 2024
         - Photos
         - Reports

       ICAIIT 2023
         - Photos
         - Reports

       ICAIIT 2021
         - Photos
         - Reports

       ICAIIT 2020
         - Photos
         - Reports

       ICAIIT 2019
         - Photos
         - Reports

       ICAIIT 2018
         - Photos
         - Reports

    ETHICS IN PUBLICATIONS

    ACCOMODATION

    CONTACT US

 

        

         Proceedings of the International Conference on Applied Innovations in IT by Anhalt University of Applied Sciences is licensed under CC BY-SA 4.0


                                                   This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License


           ISSN 2199-8876
           Publisher: Edition Hochschule Anhalt
           Location: Anhalt University of Applied Sciences
           Email: leiterin.hsb@hs-anhalt.de
           Phone: +49 (0) 3496 67 5611
           Address: Building 01 - Red Building, Top floor, Room 425, Bernburger Str. 55, D-06366 Köthen, Germany

        site traffic counter

Creative Commons License
Except where otherwise noted, all works and proceedings on this site is licensed under Creative Commons Attribution-ShareAlike 4.0 International License.