Skip to main content
Top
Published in: Journal of Network and Systems Management 2/2022

01-04-2022

Network Traffic Classification Using Deep Learning Networks and Bayesian Data Fusion

Authors: Saadat Izadi, Mahmood Ahmadi, Amir Rajabzadeh

Published in: Journal of Network and Systems Management | Issue 2/2022

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The rapid growth of current computer networks and their applications has made network traffic classification more important. The latest approach in this field is the use of deep learning. But the problem of deep learning is that it needs a lot of data for training. On the other hand, the lack of a sufficient amount of data for different types of network traffic has a negative effect on the accuracy of the traffic classification. In this regard, one of the appropriate solutions to address this challenge is the use of data fusion methods in decision level. Data fusion techniques make possible to achieve better results by combining classifiers. In this paper, a network traffic classification approach based on deep learning and data fusion techniques is presented. The proposed method can identify encrypted traffic and distinguish between VPN and non-VPN network traffic. In the proposed approach, first, a preprocessing on the dataset is carried out, then three deep learning networks, namely, Deep Belief Network, Convolution Neural Network, and Multi-layer Perceptron to classify network traffic are employed. Finally, the results of all three classifiers using Bayesian decision fusion are combined. The experimental results on the ISCX VPN-nonVPN dataset show that the proposed method improves the classification accuracy and performs well on different network traffic types. The average accuracy of the proposed method is 97%.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Bagui, S., Fang, X., Kalaimannan, E., Bagui, S.C., Sheehan, J.: Comparison of machine-learning algorithms for classification of VPN network traffic flow using time-related features. J. Cyber Secur. Technol. 1(2), 108–126 (2017)CrossRef Bagui, S., Fang, X., Kalaimannan, E., Bagui, S.C., Sheehan, J.: Comparison of machine-learning algorithms for classification of VPN network traffic flow using time-related features. J. Cyber Secur. Technol. 1(2), 108–126 (2017)CrossRef
3.
go back to reference Tsimenidis, S., Lagkas, T., Rantos, K.: Deep learning in IoT intrusion detection. J. Netw. Syst. Manag. 30(1), 1–40 (2022)CrossRef Tsimenidis, S., Lagkas, T., Rantos, K.: Deep learning in IoT intrusion detection. J. Netw. Syst. Manag. 30(1), 1–40 (2022)CrossRef
4.
go back to reference Verkerken, M., D’hooge, L., Wauters, T., Volckaert, B., De Turck, F.: Towards model generalization for intrusion detection: unsupervised machine learning techniques. J. Netw. Syst. Manag. 30(1), 1–25 (2022)CrossRef Verkerken, M., D’hooge, L., Wauters, T., Volckaert, B., De Turck, F.: Towards model generalization for intrusion detection: unsupervised machine learning techniques. J. Netw. Syst. Manag. 30(1), 1–25 (2022)CrossRef
5.
go back to reference Velan, P., Čermák, M., Čeleda, P., Drašar, M.: A survey of methods for encrypted traffic classification and analysis. Int. J. Netw. Manag. 25(5), 355–374 (2015)CrossRef Velan, P., Čermák, M., Čeleda, P., Drašar, M.: A survey of methods for encrypted traffic classification and analysis. Int. J. Netw. Manag. 25(5), 355–374 (2015)CrossRef
6.
go back to reference Boutaba, R., Salahuddin, M.A., Limam, N., Ayoubi, S., Shahriar, N., Estrada-Solano, F., Caicedo, O.M.: A comprehensive survey on machine learning for networking: evolution, applications and research opportunities. J. Internet Serv. Appl. 9(1), 1–99 (2018)CrossRef Boutaba, R., Salahuddin, M.A., Limam, N., Ayoubi, S., Shahriar, N., Estrada-Solano, F., Caicedo, O.M.: A comprehensive survey on machine learning for networking: evolution, applications and research opportunities. J. Internet Serv. Appl. 9(1), 1–99 (2018)CrossRef
7.
go back to reference Zhao, J., Jing, X., Yan, Z., Pedrycz, W.: Network traffic classification for data fusion: a survey. Inf. Fusion 72, 22–47 (2021)CrossRef Zhao, J., Jing, X., Yan, Z., Pedrycz, W.: Network traffic classification for data fusion: a survey. Inf. Fusion 72, 22–47 (2021)CrossRef
8.
go back to reference Ding, W., Jing, X., Yan, Z., Yang, L.T.: A survey on data fusion in internet of things: towards secure and privacy-preserving fusion. Inf. Fusion 51, 129–144 (2019)CrossRef Ding, W., Jing, X., Yan, Z., Yang, L.T.: A survey on data fusion in internet of things: towards secure and privacy-preserving fusion. Inf. Fusion 51, 129–144 (2019)CrossRef
9.
go back to reference Chen, Z., Li, W.: Multisensor feature fusion for bearing fault diagnosis using sparse autoencoder and deep belief network. IEEE Trans. Instrum. Meas. 66(7), 1693–1702 (2017)CrossRef Chen, Z., Li, W.: Multisensor feature fusion for bearing fault diagnosis using sparse autoencoder and deep belief network. IEEE Trans. Instrum. Meas. 66(7), 1693–1702 (2017)CrossRef
10.
go back to reference Jing, X., Yan, Z., Jiang, X., Pedrycz, W.: Network traffic fusion and analysis against DDoS flooding attacks with a novel reversible sketch. Inf. Fusion 51, 100–113 (2019)CrossRef Jing, X., Yan, Z., Jiang, X., Pedrycz, W.: Network traffic fusion and analysis against DDoS flooding attacks with a novel reversible sketch. Inf. Fusion 51, 100–113 (2019)CrossRef
11.
go back to reference Jing, X., Zhao, J., Zheng, Q., Yan, Z., Pedrycz, W.: A reversible sketch-based method for detecting and mitigating amplification attacks. J. Netw. Comput. Appl. 142, 15–24 (2019)CrossRef Jing, X., Zhao, J., Zheng, Q., Yan, Z., Pedrycz, W.: A reversible sketch-based method for detecting and mitigating amplification attacks. J. Netw. Comput. Appl. 142, 15–24 (2019)CrossRef
12.
go back to reference Shelke, P.M., Prasad, R.S.: Dbfs: Dragonfly Bayes Fusion System to detect the tampered JPEG image for forensic analysis. Evol. Intell. 5, 1–17 (2019) Shelke, P.M., Prasad, R.S.: Dbfs: Dragonfly Bayes Fusion System to detect the tampered JPEG image for forensic analysis. Evol. Intell. 5, 1–17 (2019)
13.
go back to reference Takruri, M., Abubakar, A.: Bayesian decision fusion for enhancing melanoma recognition accuracy. In: 2017 International Conference on Electrical and Computing Technologies and Applications (ICECTA), IEEE, pp. 1–4. (2017) Takruri, M., Abubakar, A.: Bayesian decision fusion for enhancing melanoma recognition accuracy. In: 2017 International Conference on Electrical and Computing Technologies and Applications (ICECTA), IEEE, pp. 1–4. (2017)
14.
go back to reference Tidriri, K., Tiplica, T., Chatti, N., Verron, S.: A generic framework for decision fusion in fault detection and diagnosis. Eng. Appl. Artif. Intell. 71, 73–86 (2018)CrossRef Tidriri, K., Tiplica, T., Chatti, N., Verron, S.: A generic framework for decision fusion in fault detection and diagnosis. Eng. Appl. Artif. Intell. 71, 73–86 (2018)CrossRef
15.
go back to reference Draper-Gil, G., Lashkari, A.H., Mamun, M.S.I., Ghorbani, A.A.: Characterization of encrypted and VPN traffic using time-related. In: Proceedings of the 2nd International Conference on Information Systems Security and Privacy (ICISSP), pp. 407–414. (2016) Draper-Gil, G., Lashkari, A.H., Mamun, M.S.I., Ghorbani, A.A.: Characterization of encrypted and VPN traffic using time-related. In: Proceedings of the 2nd International Conference on Information Systems Security and Privacy (ICISSP), pp. 407–414. (2016)
16.
go back to reference Lotfollahi, M., Siavoshani, M.J., Zade, R.S.H., Saberian, M.: Deep packet: a novel approach for encrypted traffic classification using deep learning. Soft Comput. 24(3), 1999–2012 (2020)CrossRef Lotfollahi, M., Siavoshani, M.J., Zade, R.S.H., Saberian, M.: Deep packet: a novel approach for encrypted traffic classification using deep learning. Soft Comput. 24(3), 1999–2012 (2020)CrossRef
17.
go back to reference Rezaei, S., Liu, X.: Deep learning for encrypted traffic classification: an overview. IEEE Commun. Mag. 57(5), 76–81 (2019)CrossRef Rezaei, S., Liu, X.: Deep learning for encrypted traffic classification: an overview. IEEE Commun. Mag. 57(5), 76–81 (2019)CrossRef
18.
go back to reference Zeng, Y., Gu, H., Wei, W., Guo, Y.: \(deep-full-range\): a deep learning based network encrypted traffic classification and intrusion detection framework. IEEE Access 7, 45182–45190 (2019)CrossRef Zeng, Y., Gu, H., Wei, W., Guo, Y.: \(deep-full-range\): a deep learning based network encrypted traffic classification and intrusion detection framework. IEEE Access 7, 45182–45190 (2019)CrossRef
19.
go back to reference Chen, Z., He, K., Li, J., Geng, Y.: Seq2img: a sequence-to-image based approach towards ip traffic classification using convolutional neural networks. In: 2017 IEEE International Conference on Big Data (Big Data), IEEE, pp. 1271–1276. (2017) Chen, Z., He, K., Li, J., Geng, Y.: Seq2img: a sequence-to-image based approach towards ip traffic classification using convolutional neural networks. In: 2017 IEEE International Conference on Big Data (Big Data), IEEE, pp. 1271–1276. (2017)
20.
go back to reference Höchst, J., Baumgärtner, L., Hollick, M., Freisleben, B.: Unsupervised traffic flow classification using a neural autoencoder. In: 2017 IEEE 42nd Conference on Local Computer Networks (LCN), IEEE, pp. 523–526. (2017) Höchst, J., Baumgärtner, L., Hollick, M., Freisleben, B.: Unsupervised traffic flow classification using a neural autoencoder. In: 2017 IEEE 42nd Conference on Local Computer Networks (LCN), IEEE, pp. 523–526. (2017)
21.
go back to reference Wang, W., Zhu, M., Wang, J., Zeng, X., Yang, Z.: End-to-end encrypted traffic classification with one-dimensional convolution neural networks. In: 2017 IEEE International Conference on Intelligence and Security Informatics (ISI), IEEE, pp. 43–48. (2017) Wang, W., Zhu, M., Wang, J., Zeng, X., Yang, Z.: End-to-end encrypted traffic classification with one-dimensional convolution neural networks. In: 2017 IEEE International Conference on Intelligence and Security Informatics (ISI), IEEE, pp. 43–48. (2017)
22.
go back to reference Wang, X., Chen, S., Su, J.: Automatic mobile app identification from encrypted traffic with hybrid neural networks. IEEE Access 8, 182065–182077 (2020)CrossRef Wang, X., Chen, S., Su, J.: Automatic mobile app identification from encrypted traffic with hybrid neural networks. IEEE Access 8, 182065–182077 (2020)CrossRef
23.
go back to reference Aceto, G., Ciuonzo, D., Montieri, A., Pescapé, A.: Distiller: encrypted traffic classification via multimodal multitask deep learning. J. Netw. Comput. Appl. 183, 102–115 (2021) Aceto, G., Ciuonzo, D., Montieri, A., Pescapé, A.: Distiller: encrypted traffic classification via multimodal multitask deep learning. J. Netw. Comput. Appl. 183, 102–115 (2021)
24.
go back to reference Aceto, G., Ciuonzo, D., Montieri, A., Pescapé, A.: Toward effective mobile encrypted traffic classification through deep learning. Neurocomputing 409, 306–315 (2020)CrossRef Aceto, G., Ciuonzo, D., Montieri, A., Pescapé, A.: Toward effective mobile encrypted traffic classification through deep learning. Neurocomputing 409, 306–315 (2020)CrossRef
25.
go back to reference Aceto, G., Ciuonzo, D., Montieri, A., Pescapè, A.: Mimetic: mobile encrypted traffic classification using multimodal deep learning. Comput. Netw. 165(106), 944 (2019) Aceto, G., Ciuonzo, D., Montieri, A., Pescapè, A.: Mimetic: mobile encrypted traffic classification using multimodal deep learning. Comput. Netw. 165(106), 944 (2019)
26.
go back to reference Aceto, G., Ciuonzo, D., Montieri, A., Pescapé, A.: Multi-classification approaches for classifying mobile app traffic. J. Netw. Comput. Appl. 103, 131–145 (2018)CrossRef Aceto, G., Ciuonzo, D., Montieri, A., Pescapé, A.: Multi-classification approaches for classifying mobile app traffic. J. Netw. Comput. Appl. 103, 131–145 (2018)CrossRef
27.
go back to reference Tao, X., Kong, D., Wei, Y., Wang, Y.: A big network traffic data fusion approach based on fisher and deep auto-encoder. Information 7(2), 20 (2016)CrossRef Tao, X., Kong, D., Wei, Y., Wang, Y.: A big network traffic data fusion approach based on fisher and deep auto-encoder. Information 7(2), 20 (2016)CrossRef
28.
go back to reference Meng, T., Jing, X., Yan, Z., Pedrycz, W.: A survey on machine learning for data fusion. Inf. Fusion 57, 115–129 (2020)CrossRef Meng, T., Jing, X., Yan, Z., Pedrycz, W.: A survey on machine learning for data fusion. Inf. Fusion 57, 115–129 (2020)CrossRef
29.
go back to reference Kuncheva, L.I., Rodríguez, J.J.: A weighted voting framework for classifiers ensembles. Knowl. Inf. Syst. 38(2), 259–275 (2014)CrossRef Kuncheva, L.I., Rodríguez, J.J.: A weighted voting framework for classifiers ensembles. Knowl. Inf. Syst. 38(2), 259–275 (2014)CrossRef
30.
go back to reference Purwins, H., Li, B., Virtanen, T., Schlüter, J., Chang, S.Y., Sainath, T.: Deep learning for audio signal processing. IEEE J. Sel. Top. Signal Process. 13(2), 206–219 (2019)CrossRef Purwins, H., Li, B., Virtanen, T., Schlüter, J., Chang, S.Y., Sainath, T.: Deep learning for audio signal processing. IEEE J. Sel. Top. Signal Process. 13(2), 206–219 (2019)CrossRef
31.
go back to reference Wang, J., Fu, P., Gao, R.X.: Machine vision intelligence for product defect inspection based on deep learning and hough transform. J. Manuf. Syst. 51, 52–60 (2019)CrossRef Wang, J., Fu, P., Gao, R.X.: Machine vision intelligence for product defect inspection based on deep learning and hough transform. J. Manuf. Syst. 51, 52–60 (2019)CrossRef
32.
go back to reference Young, T., Hazarika, D., Poria, S., Cambria, E.: Recent trends in deep learning based natural language processing. IEEE Comput. Intell. Mag. 13(3), 55–75 (2018)CrossRef Young, T., Hazarika, D., Poria, S., Cambria, E.: Recent trends in deep learning based natural language processing. IEEE Comput. Intell. Mag. 13(3), 55–75 (2018)CrossRef
33.
go back to reference Zhang, K., Zuo, W., Gu, S., Zhang, L.: Learning deep cnn denoiser prior for image restoration. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 3929–3938. (2017) Zhang, K., Zuo, W., Gu, S., Zhang, L.: Learning deep cnn denoiser prior for image restoration. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 3929–3938. (2017)
34.
go back to reference Wang, W., Zhu, M., Zeng, X., Ye, X., Sheng, Y.: Malware traffic classification using convolutional neural network for representation learning. In: 2017 International Conference on Information Networking (ICOIN), IEEE, pp. 712–717. (2017) Wang, W., Zhu, M., Zeng, X., Ye, X., Sheng, Y.: Malware traffic classification using convolutional neural network for representation learning. In: 2017 International Conference on Information Networking (ICOIN), IEEE, pp. 712–717. (2017)
35.
go back to reference Arel, I., Rose, D.C., Karnowski, T.P.: Deep machine learning—a new frontier in artificial intelligence research [research frontier]. IEEE Comput. Intell. Mag. 5(4), 13–18 (2010)CrossRef Arel, I., Rose, D.C., Karnowski, T.P.: Deep machine learning—a new frontier in artificial intelligence research [research frontier]. IEEE Comput. Intell. Mag. 5(4), 13–18 (2010)CrossRef
36.
go back to reference Marir, N., Wang, H., Feng, G., Li, B., Jia, M.: Distributed abnormal behavior detection approach based on deep belief network and ensemble SVM using spark. IEEE Access 6, 59657–59671 (2018)CrossRef Marir, N., Wang, H., Feng, G., Li, B., Jia, M.: Distributed abnormal behavior detection approach based on deep belief network and ensemble SVM using spark. IEEE Access 6, 59657–59671 (2018)CrossRef
37.
go back to reference Xiang, W., Tran, H.D., Johnson, T.T.: Output reachable set estimation and verification for multilayer neural networks. IEEE Trans. Neural Netw. Learn. Syst. 29(11), 5777–5783 (2018)MathSciNetCrossRef Xiang, W., Tran, H.D., Johnson, T.T.: Output reachable set estimation and verification for multilayer neural networks. IEEE Trans. Neural Netw. Learn. Syst. 29(11), 5777–5783 (2018)MathSciNetCrossRef
38.
go back to reference Géron, A.: Hands-On Machine Learning with Scikit-Learn, Keras, and TensorFlow: Concepts, Tools, and Techniques to Build Intelligent Systems. O’Reilly Media, Beijing (2019) Géron, A.: Hands-On Machine Learning with Scikit-Learn, Keras, and TensorFlow: Concepts, Tools, and Techniques to Build Intelligent Systems. O’Reilly Media, Beijing (2019)
Metadata
Title
Network Traffic Classification Using Deep Learning Networks and Bayesian Data Fusion
Authors
Saadat Izadi
Mahmood Ahmadi
Amir Rajabzadeh
Publication date
01-04-2022
Publisher
Springer US
Published in
Journal of Network and Systems Management / Issue 2/2022
Print ISSN: 1064-7570
Electronic ISSN: 1573-7705
DOI
https://doi.org/10.1007/s10922-021-09639-z

Other articles of this Issue 2/2022

Journal of Network and Systems Management 2/2022 Go to the issue

Premium Partner