Browse > Article
http://dx.doi.org/10.3837/tiis.2020.11.001

Network Traffic Classification Based on Deep Learning  

Li, Junwei (Institute of Command Control Engineering, Army Engineering University)
Pan, Zhisong (Institute of Command Control Engineering, Army Engineering University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.14, no.11, 2020 , pp. 4246-4267 More about this Journal
Abstract
As the network goes deep into all aspects of people's lives, the number and the complexity of network traffic is increasing, and traffic classification becomes more and more important. How to classify them effectively is an important prerequisite for network management and planning, and ensuring network security. With the continuous development of deep learning, more and more traffic classification begins to use it as the main method, which achieves better results than traditional classification methods. In this paper, we provide a comprehensive review of network traffic classification based on deep learning. Firstly, we introduce the research background and progress of network traffic classification. Then, we summarize and compare traffic classification based on deep learning such as stack autoencoder, one-dimensional convolution neural network, two-dimensional convolution neural network, three-dimensional convolution neural network, long short-term memory network and Deep Belief Networks. In addition, we compare traffic classification based on deep learning with other methods such as based on port number, deep packets detection and machine learning. Finally, the future research directions of network traffic classification based on deep learning are prospected.
Keywords
Traffic classification; deep learning; convolution neural network; stack auto encoder; long short-term memory network;
Citations & Related Records
연도 인용수 순위
  • Reference
1 McGaughey D, Semeniuk D, Smith R, "A systematic approach of feature selection for encrypted network traffic classification," in Proc. of the 2018 Annual IEEE International Systems Conference, Piscataway, NJ: IEEE, pp. 1- 8, 2018.
2 Sarkar A, Dasgupta S, Naskar S K, "Says Who? Deep Learning Models for Joint Speech Recognition, Segmentation and Diarization," in Proc. of 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Calgary, pp. 5229-5233, 2018.
3 Lopez-Martin M, Carro B, Sanchez-Esguevillas A, "Network Traffic Classifier with Convolutional and Recurrent Neural Networks for Internet of Things," IEEE Access, vol. 5, pp. 18042-18050, 2017.   DOI
4 Ducange P, Mannara G, Marcelloni F, "A novel approach for internet traffic classification based on multi-objective evolutionary fuzzy classifiers," in Proc. of 2017 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), IEEE, pp. 1-6, 2017.
5 Shone N, Ngoc T N, Phai V D, "A deep learning approach to network intrusion detection," IEEE Transactions on Emerging Topics in Computational Intelligence, vol. 2, no.1, pp. 41-50, 2018.   DOI
6 Wu K, Chen Z, Li W, "A Novel Intrusion Detection Model for a Massive Network Using Convolutional Neural Networks," IEEE Access, vol. 6, pp. 50850-50859, 2018.   DOI
7 Adie H T R, Pradana I A, "Parallel Computing Accelerated Image Inpainting using GPU CUDA, Theano and Tensorflow," in Proc. of 2018 10th International Conference on Information Technology and Electrical Engineering (ICITEE), Kuta, pp. 621-625, 2018.
8 Ge Y F, Peng F , Feng X X, "Homology Analysis of Malicious Code Based on Dynamic BP Neural Network," Journal of Chinese Computer Systems, vol. 37, no. 11,pp. 2527-2531, 2016.
9 Perera P, Tian Y C, Fidge C, "A comparison of supervised machine learning algorithms for classification of communications network traffic," in Proc. of International Conference on Neural Information Processing. Springer, Cham, pp. 445-454, 2017.
10 Zhang L , Cui Y, "Application of Machine Learning in Cyberspace Security Research," Chinese Journal of Computers, vol. 41, no 9, pp. 1943-1975, 2018.
11 HE H, "A network traffic classification method using support vector machine with feature weighted-degree," Journal of Digital Information Management, vol. 15, no. 5, pp. 76-83, 2017.
12 Moore A W, Zuev D, "Internet traffic classification using Bayesian analysis techniques," ACM SIGMETRICS Performance Evaluation Review, vol. 33, no. 1, 2005.
13 Wang W, "HAST-IDS: Learning Hierarchical Spatial-Temporal Features Using Deep Neural Networks to Improve Intrusion Detection," IEEE Access, vol. 6, pp. 1792-1806, 2018.   DOI
14 KONG L, HUANG G, WU K, "Identification of abnormal network traffic using support vector machine," in Proc. of the 2017 18th International Conference on Parallel and Distributed Computing, Applications and Technologies, Piscataway, NJ: IEEE, pp. 288-292, 2017.
15 Song L, Chang L, "Application of mutation particle swarm optimization BP neural network in malicious code detection," Journal of Intelligent Systems, vol. 8, no. 6, pp. 558-563, 2013.
16 Wang R, Feng D G, "Feature extraction and detection method of malicious code based on semantics," Journal of Software, vol. 23, no. 2, pp. 378-393, 2012.   DOI
17 Vu L, Bui C T, Nguyen Q U, "A deep learning based method for handling imbalanced problem in network traffic classification," in Proc. of the Eighth International Symposium on Information and Communication Technology, ACM, pp. 333-339, 2017.
18 Rao Z, Niu W, Zhang X S, "Tor anonymous traffic identification based on gravitational clustering," Peer-to-Peer Networking and Applications, vol. 11, pp. 592-601, 2018.   DOI
19 Velan P, Cermak M, Celeda P, "A survey of methods for encrypted traffic classification and analysis," International Journal of Network Management, vol. 25, no.5, pp. 355-374, 2015.   DOI
20 Deng Z, Qian G, Chen Z, "Identifying Tor Anonymous Traffic Based on Gravitational Clustering Analysis," in Proc. of International Conference on Intelligent Human-Machine Systems and Cybernetics, IEEE, pp. 79-83, 2017.
21 Carela-Espanol V, Barlet-Ros P, Mula-Valls O, "An autonomic traffic classification system for network operation and management," Journal of Network and Systems Management, vol. 23, no. 3, pp. 401-419, 2015.   DOI
22 Liu J, Zheng C, Guo L, "Understanding the Network Traffic Constraints for Deep Packet Inspection by Passive Measurement," in Proc. of 2018 3rd International Conference on Information Systems Engineering (ICISE), IEEE, pp. 26-32, 2018.
23 Ho T L, Cho S J, Oh S R, "Parallel multiple pattern matching schemes based on cuckoo filter for deep packet inspection on graphics processing units," IET Information Security, vol. 12, no. 4, pp. 381-388, 2018.   DOI
24 Zhang J, Chen X, Xiang Y, "Robust network traffic classification," IEEE/ACM Transactions on Networking (TON), vol. 23, no. 4, pp. 1257-1270, 2015.   DOI
25 China Internet Network Information Center, "Internet usage," Statistical Report on the Development of Internet in China, pp. 17-18, February 2019.
26 Aceto G, Ciuonzo D, Montieri A, "Mobile encrypted traffic classification using deep learning," in Proc. of 2018 Network Traffic Measurement and Analysis Conference (TMA), pp. 1-8, 2018.
27 Wang W, Zhu M, Zeng X, "Malware traffic classification using convolutional neural network for representation learning," in Proc. of 2017 International Conference on Information Networking (ICOIN), pp. 712-717, 2017.
28 Sun G, Liang L, Chen T, Xiao F, Fang L, "Network traffic classification based on transfer learning," Computers & electrical engineering, vol. 69, pp. 920-927, 2018.   DOI
29 Moore A W, Zuev D, "Discriminators for use in Flow-based classification," Technical Report IRC-TR-04-028, Intel Research, Cambridge, 2005.
30 He G, Yang M, Luo J, "A novel application classification attack against Tor," Concurrency and Computation: Practice and Experience, vol. 27, no.18, pp. 5640-5661, 2015.   DOI
31 Deshpande P, Sharma S C, Peddoju S K, "HIDS: A host based intrusion detection system for cloud computing environment," International Journal of System Assurance Engineering and Management, vol. 9, no. 3, pp. 567-576, 2018.   DOI
32 Araujo I M, Natalino C, Santana A L, "Accelerating VNF-based Deep Packet Inspection with the use of GPUs," in Proc. of 2018 20th International Conference on Transparent Optical Networks (ICTON), IEEE, pp. 1-4, 2018.
33 Sivaprasad A, Ghawalkar N, Hodge S, "Machine learning based traffic classification using statistical analysis," Int. J. Recent Innov. Trends Comput. Commun., vol. 6, no. 3, pp. 187-191, 2018.
34 Krizhevsky A, Sutskever I, Hinton G E, "ImageNet classification with deep convolutional neural networks," in Proc. of International Conference on Neural Information Processing Systems, Curran Associates Inc., pp. 1097-1105, 2012.
35 LeCun Y, Bengio Y, Hinton G, "Deep learning," Nature, no. 521, pp. 436-444, 2015.
36 Tongaonkar A, Torres R, Iliofotou M, "Towards self-adaptive network traffic classification," Computer Communications, vol. 56, pp. 35-46, 2015.   DOI
37 Amaral P, Dinis J, Pinto P, "Machine learning in software defined networks: Data collection and traffic classification," in Proc. of 2016 IEEE 24th International Conference on Network Protocols (ICNP), IEEE, pp. 1-5, 2016.
38 Ertam F, Avci E, "A new approach for internet traffic classification: GA-WK-ELM," Measurement, vol. 95, pp.135-142, 2017.   DOI
39 Zhu Z, Liang D, Zhang S, "Traffic-sign detection and classification in the wild," in Proc. of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 2110-2118, 2016.
40 Aceto G, Ciuonzo D, Montieri A, "Traffic classification of mobile apps through multi-classification," in Proc. of GLOBECOM 2017-2017 IEEE Global Communications Conference, IEEE, pp. 1-6, 2017.
41 Ran J, Chen Y, Li S, "Three-dimensional Convolutional Neural Network based Traffic Classification for Wireless Communications," in Proc. of 2018 IEEE Global Conference on Signal and Information Processing (Global SIP), Anaheim, CA, USA, pp. 624-627, 2018.
42 Dong Y, Zhao J, Jin J, "Novel feature selection and classification of Internet video traffic based on a hierarchical scheme," Computer Networks, vol. 119, pp. 102-111, 2017.   DOI
43 Avci O, Abdeljaber O, Kiranyaz S, "Structural damage detection in real time: implementation of 1D convolutional neural networks for SHM applications," Structural Health Monitoring & Damage Detection, Springer, Cham, vol. 7, pp. 49-54, 2017.
44 Ran J, Kong X C, "A Self-adaptive Traffic Classification System with Unknown Flow Detection," in Proc. of 3rd IEEE International Conference on Computer and Communications, IEEE, pp. 1215-1220, 2017.
45 Hochst J, Baumgartner L, Hollick M, "Unsupervised traffic flow classification using a neural autoencoder," in Proc. of 2017 IEEE 42nd Conference on Local Computer Networks (LCN), IEEE, pp. 523-526, 2017.
46 Zou Z, Ge J, Zheng H, "Encrypted Traffic Classification with a Convolutional Long Short-Term Memory Neural Network," in Proc. of 2018 IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC/SmartCity/DSS), IEEE, pp. 329-334, 2018.
47 Hinton G E, Salakhutdinov R R, "Reducing the dimensionality of data with neural networks," science, vol. 313, no. 5786, pp. 504-507, 2006.   DOI
48 Shao H, Tang L, Dong L, "A Research of Network Applications Classification Based on Deep Learning," in Proc. of International Conference on Machine Learning and Intelligent Communications. Springer, Cham, pp. 13-21, 2018.
49 Stevanovic M, Pedersen J M, "An analysis of network traffic classification for botnet detection," in Proc. of 2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), IEEE, pp. 1-8, 2015.
50 Gomez S E, Martinez B C, Sanchez-Esguevillas A J, "Ensemble network traffic classification: Algorithm comparison and novel ensemble scheme proposal," Computer Networks, vol. 127, pp. 68-80, 2017.   DOI
51 Karim F, Majumdar S, Darabi H, "Multivariate lstm-fcns for time series classification," Neural Networks, vol. 116, pp. 237-245, 2019.   DOI
52 Kim T Y, Cho S B, "Web traffic anomaly detection using C-LSTM neural networks," Expert Systems with Applications, vol. 106, pp. 66-76, 2018.   DOI
53 Taheri R, Javidan R, Shojafar M, "On Defending Against Label Flipping Attacks on Malware Detection Systems," Neural Computing and Applications, vol. 32, pp. 14781-14800, 2020.   DOI