Skip to main content
Erschienen in: Journal of Network and Systems Management 2/2022

01.04.2022

Network Traffic Classification Using Deep Learning Networks and Bayesian Data Fusion

verfasst von: Saadat Izadi, Mahmood Ahmadi, Amir Rajabzadeh

Erschienen in: Journal of Network and Systems Management | Ausgabe 2/2022

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The rapid growth of current computer networks and their applications has made network traffic classification more important. The latest approach in this field is the use of deep learning. But the problem of deep learning is that it needs a lot of data for training. On the other hand, the lack of a sufficient amount of data for different types of network traffic has a negative effect on the accuracy of the traffic classification. In this regard, one of the appropriate solutions to address this challenge is the use of data fusion methods in decision level. Data fusion techniques make possible to achieve better results by combining classifiers. In this paper, a network traffic classification approach based on deep learning and data fusion techniques is presented. The proposed method can identify encrypted traffic and distinguish between VPN and non-VPN network traffic. In the proposed approach, first, a preprocessing on the dataset is carried out, then three deep learning networks, namely, Deep Belief Network, Convolution Neural Network, and Multi-layer Perceptron to classify network traffic are employed. Finally, the results of all three classifiers using Bayesian decision fusion are combined. The experimental results on the ISCX VPN-nonVPN dataset show that the proposed method improves the classification accuracy and performs well on different network traffic types. The average accuracy of the proposed method is 97%.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Bagui, S., Fang, X., Kalaimannan, E., Bagui, S.C., Sheehan, J.: Comparison of machine-learning algorithms for classification of VPN network traffic flow using time-related features. J. Cyber Secur. Technol. 1(2), 108–126 (2017)CrossRef Bagui, S., Fang, X., Kalaimannan, E., Bagui, S.C., Sheehan, J.: Comparison of machine-learning algorithms for classification of VPN network traffic flow using time-related features. J. Cyber Secur. Technol. 1(2), 108–126 (2017)CrossRef
3.
Zurück zum Zitat Tsimenidis, S., Lagkas, T., Rantos, K.: Deep learning in IoT intrusion detection. J. Netw. Syst. Manag. 30(1), 1–40 (2022)CrossRef Tsimenidis, S., Lagkas, T., Rantos, K.: Deep learning in IoT intrusion detection. J. Netw. Syst. Manag. 30(1), 1–40 (2022)CrossRef
4.
Zurück zum Zitat Verkerken, M., D’hooge, L., Wauters, T., Volckaert, B., De Turck, F.: Towards model generalization for intrusion detection: unsupervised machine learning techniques. J. Netw. Syst. Manag. 30(1), 1–25 (2022)CrossRef Verkerken, M., D’hooge, L., Wauters, T., Volckaert, B., De Turck, F.: Towards model generalization for intrusion detection: unsupervised machine learning techniques. J. Netw. Syst. Manag. 30(1), 1–25 (2022)CrossRef
5.
Zurück zum Zitat Velan, P., Čermák, M., Čeleda, P., Drašar, M.: A survey of methods for encrypted traffic classification and analysis. Int. J. Netw. Manag. 25(5), 355–374 (2015)CrossRef Velan, P., Čermák, M., Čeleda, P., Drašar, M.: A survey of methods for encrypted traffic classification and analysis. Int. J. Netw. Manag. 25(5), 355–374 (2015)CrossRef
6.
Zurück zum Zitat Boutaba, R., Salahuddin, M.A., Limam, N., Ayoubi, S., Shahriar, N., Estrada-Solano, F., Caicedo, O.M.: A comprehensive survey on machine learning for networking: evolution, applications and research opportunities. J. Internet Serv. Appl. 9(1), 1–99 (2018)CrossRef Boutaba, R., Salahuddin, M.A., Limam, N., Ayoubi, S., Shahriar, N., Estrada-Solano, F., Caicedo, O.M.: A comprehensive survey on machine learning for networking: evolution, applications and research opportunities. J. Internet Serv. Appl. 9(1), 1–99 (2018)CrossRef
7.
Zurück zum Zitat Zhao, J., Jing, X., Yan, Z., Pedrycz, W.: Network traffic classification for data fusion: a survey. Inf. Fusion 72, 22–47 (2021)CrossRef Zhao, J., Jing, X., Yan, Z., Pedrycz, W.: Network traffic classification for data fusion: a survey. Inf. Fusion 72, 22–47 (2021)CrossRef
8.
Zurück zum Zitat Ding, W., Jing, X., Yan, Z., Yang, L.T.: A survey on data fusion in internet of things: towards secure and privacy-preserving fusion. Inf. Fusion 51, 129–144 (2019)CrossRef Ding, W., Jing, X., Yan, Z., Yang, L.T.: A survey on data fusion in internet of things: towards secure and privacy-preserving fusion. Inf. Fusion 51, 129–144 (2019)CrossRef
9.
Zurück zum Zitat Chen, Z., Li, W.: Multisensor feature fusion for bearing fault diagnosis using sparse autoencoder and deep belief network. IEEE Trans. Instrum. Meas. 66(7), 1693–1702 (2017)CrossRef Chen, Z., Li, W.: Multisensor feature fusion for bearing fault diagnosis using sparse autoencoder and deep belief network. IEEE Trans. Instrum. Meas. 66(7), 1693–1702 (2017)CrossRef
10.
Zurück zum Zitat Jing, X., Yan, Z., Jiang, X., Pedrycz, W.: Network traffic fusion and analysis against DDoS flooding attacks with a novel reversible sketch. Inf. Fusion 51, 100–113 (2019)CrossRef Jing, X., Yan, Z., Jiang, X., Pedrycz, W.: Network traffic fusion and analysis against DDoS flooding attacks with a novel reversible sketch. Inf. Fusion 51, 100–113 (2019)CrossRef
11.
Zurück zum Zitat Jing, X., Zhao, J., Zheng, Q., Yan, Z., Pedrycz, W.: A reversible sketch-based method for detecting and mitigating amplification attacks. J. Netw. Comput. Appl. 142, 15–24 (2019)CrossRef Jing, X., Zhao, J., Zheng, Q., Yan, Z., Pedrycz, W.: A reversible sketch-based method for detecting and mitigating amplification attacks. J. Netw. Comput. Appl. 142, 15–24 (2019)CrossRef
12.
Zurück zum Zitat Shelke, P.M., Prasad, R.S.: Dbfs: Dragonfly Bayes Fusion System to detect the tampered JPEG image for forensic analysis. Evol. Intell. 5, 1–17 (2019) Shelke, P.M., Prasad, R.S.: Dbfs: Dragonfly Bayes Fusion System to detect the tampered JPEG image for forensic analysis. Evol. Intell. 5, 1–17 (2019)
13.
Zurück zum Zitat Takruri, M., Abubakar, A.: Bayesian decision fusion for enhancing melanoma recognition accuracy. In: 2017 International Conference on Electrical and Computing Technologies and Applications (ICECTA), IEEE, pp. 1–4. (2017) Takruri, M., Abubakar, A.: Bayesian decision fusion for enhancing melanoma recognition accuracy. In: 2017 International Conference on Electrical and Computing Technologies and Applications (ICECTA), IEEE, pp. 1–4. (2017)
14.
Zurück zum Zitat Tidriri, K., Tiplica, T., Chatti, N., Verron, S.: A generic framework for decision fusion in fault detection and diagnosis. Eng. Appl. Artif. Intell. 71, 73–86 (2018)CrossRef Tidriri, K., Tiplica, T., Chatti, N., Verron, S.: A generic framework for decision fusion in fault detection and diagnosis. Eng. Appl. Artif. Intell. 71, 73–86 (2018)CrossRef
15.
Zurück zum Zitat Draper-Gil, G., Lashkari, A.H., Mamun, M.S.I., Ghorbani, A.A.: Characterization of encrypted and VPN traffic using time-related. In: Proceedings of the 2nd International Conference on Information Systems Security and Privacy (ICISSP), pp. 407–414. (2016) Draper-Gil, G., Lashkari, A.H., Mamun, M.S.I., Ghorbani, A.A.: Characterization of encrypted and VPN traffic using time-related. In: Proceedings of the 2nd International Conference on Information Systems Security and Privacy (ICISSP), pp. 407–414. (2016)
16.
Zurück zum Zitat Lotfollahi, M., Siavoshani, M.J., Zade, R.S.H., Saberian, M.: Deep packet: a novel approach for encrypted traffic classification using deep learning. Soft Comput. 24(3), 1999–2012 (2020)CrossRef Lotfollahi, M., Siavoshani, M.J., Zade, R.S.H., Saberian, M.: Deep packet: a novel approach for encrypted traffic classification using deep learning. Soft Comput. 24(3), 1999–2012 (2020)CrossRef
17.
Zurück zum Zitat Rezaei, S., Liu, X.: Deep learning for encrypted traffic classification: an overview. IEEE Commun. Mag. 57(5), 76–81 (2019)CrossRef Rezaei, S., Liu, X.: Deep learning for encrypted traffic classification: an overview. IEEE Commun. Mag. 57(5), 76–81 (2019)CrossRef
18.
Zurück zum Zitat Zeng, Y., Gu, H., Wei, W., Guo, Y.: \(deep-full-range\): a deep learning based network encrypted traffic classification and intrusion detection framework. IEEE Access 7, 45182–45190 (2019)CrossRef Zeng, Y., Gu, H., Wei, W., Guo, Y.: \(deep-full-range\): a deep learning based network encrypted traffic classification and intrusion detection framework. IEEE Access 7, 45182–45190 (2019)CrossRef
19.
Zurück zum Zitat Chen, Z., He, K., Li, J., Geng, Y.: Seq2img: a sequence-to-image based approach towards ip traffic classification using convolutional neural networks. In: 2017 IEEE International Conference on Big Data (Big Data), IEEE, pp. 1271–1276. (2017) Chen, Z., He, K., Li, J., Geng, Y.: Seq2img: a sequence-to-image based approach towards ip traffic classification using convolutional neural networks. In: 2017 IEEE International Conference on Big Data (Big Data), IEEE, pp. 1271–1276. (2017)
20.
Zurück zum Zitat Höchst, J., Baumgärtner, L., Hollick, M., Freisleben, B.: Unsupervised traffic flow classification using a neural autoencoder. In: 2017 IEEE 42nd Conference on Local Computer Networks (LCN), IEEE, pp. 523–526. (2017) Höchst, J., Baumgärtner, L., Hollick, M., Freisleben, B.: Unsupervised traffic flow classification using a neural autoencoder. In: 2017 IEEE 42nd Conference on Local Computer Networks (LCN), IEEE, pp. 523–526. (2017)
21.
Zurück zum Zitat Wang, W., Zhu, M., Wang, J., Zeng, X., Yang, Z.: End-to-end encrypted traffic classification with one-dimensional convolution neural networks. In: 2017 IEEE International Conference on Intelligence and Security Informatics (ISI), IEEE, pp. 43–48. (2017) Wang, W., Zhu, M., Wang, J., Zeng, X., Yang, Z.: End-to-end encrypted traffic classification with one-dimensional convolution neural networks. In: 2017 IEEE International Conference on Intelligence and Security Informatics (ISI), IEEE, pp. 43–48. (2017)
22.
Zurück zum Zitat Wang, X., Chen, S., Su, J.: Automatic mobile app identification from encrypted traffic with hybrid neural networks. IEEE Access 8, 182065–182077 (2020)CrossRef Wang, X., Chen, S., Su, J.: Automatic mobile app identification from encrypted traffic with hybrid neural networks. IEEE Access 8, 182065–182077 (2020)CrossRef
23.
Zurück zum Zitat Aceto, G., Ciuonzo, D., Montieri, A., Pescapé, A.: Distiller: encrypted traffic classification via multimodal multitask deep learning. J. Netw. Comput. Appl. 183, 102–115 (2021) Aceto, G., Ciuonzo, D., Montieri, A., Pescapé, A.: Distiller: encrypted traffic classification via multimodal multitask deep learning. J. Netw. Comput. Appl. 183, 102–115 (2021)
24.
Zurück zum Zitat Aceto, G., Ciuonzo, D., Montieri, A., Pescapé, A.: Toward effective mobile encrypted traffic classification through deep learning. Neurocomputing 409, 306–315 (2020)CrossRef Aceto, G., Ciuonzo, D., Montieri, A., Pescapé, A.: Toward effective mobile encrypted traffic classification through deep learning. Neurocomputing 409, 306–315 (2020)CrossRef
25.
Zurück zum Zitat Aceto, G., Ciuonzo, D., Montieri, A., Pescapè, A.: Mimetic: mobile encrypted traffic classification using multimodal deep learning. Comput. Netw. 165(106), 944 (2019) Aceto, G., Ciuonzo, D., Montieri, A., Pescapè, A.: Mimetic: mobile encrypted traffic classification using multimodal deep learning. Comput. Netw. 165(106), 944 (2019)
26.
Zurück zum Zitat Aceto, G., Ciuonzo, D., Montieri, A., Pescapé, A.: Multi-classification approaches for classifying mobile app traffic. J. Netw. Comput. Appl. 103, 131–145 (2018)CrossRef Aceto, G., Ciuonzo, D., Montieri, A., Pescapé, A.: Multi-classification approaches for classifying mobile app traffic. J. Netw. Comput. Appl. 103, 131–145 (2018)CrossRef
27.
Zurück zum Zitat Tao, X., Kong, D., Wei, Y., Wang, Y.: A big network traffic data fusion approach based on fisher and deep auto-encoder. Information 7(2), 20 (2016)CrossRef Tao, X., Kong, D., Wei, Y., Wang, Y.: A big network traffic data fusion approach based on fisher and deep auto-encoder. Information 7(2), 20 (2016)CrossRef
28.
Zurück zum Zitat Meng, T., Jing, X., Yan, Z., Pedrycz, W.: A survey on machine learning for data fusion. Inf. Fusion 57, 115–129 (2020)CrossRef Meng, T., Jing, X., Yan, Z., Pedrycz, W.: A survey on machine learning for data fusion. Inf. Fusion 57, 115–129 (2020)CrossRef
29.
Zurück zum Zitat Kuncheva, L.I., Rodríguez, J.J.: A weighted voting framework for classifiers ensembles. Knowl. Inf. Syst. 38(2), 259–275 (2014)CrossRef Kuncheva, L.I., Rodríguez, J.J.: A weighted voting framework for classifiers ensembles. Knowl. Inf. Syst. 38(2), 259–275 (2014)CrossRef
30.
Zurück zum Zitat Purwins, H., Li, B., Virtanen, T., Schlüter, J., Chang, S.Y., Sainath, T.: Deep learning for audio signal processing. IEEE J. Sel. Top. Signal Process. 13(2), 206–219 (2019)CrossRef Purwins, H., Li, B., Virtanen, T., Schlüter, J., Chang, S.Y., Sainath, T.: Deep learning for audio signal processing. IEEE J. Sel. Top. Signal Process. 13(2), 206–219 (2019)CrossRef
31.
Zurück zum Zitat Wang, J., Fu, P., Gao, R.X.: Machine vision intelligence for product defect inspection based on deep learning and hough transform. J. Manuf. Syst. 51, 52–60 (2019)CrossRef Wang, J., Fu, P., Gao, R.X.: Machine vision intelligence for product defect inspection based on deep learning and hough transform. J. Manuf. Syst. 51, 52–60 (2019)CrossRef
32.
Zurück zum Zitat Young, T., Hazarika, D., Poria, S., Cambria, E.: Recent trends in deep learning based natural language processing. IEEE Comput. Intell. Mag. 13(3), 55–75 (2018)CrossRef Young, T., Hazarika, D., Poria, S., Cambria, E.: Recent trends in deep learning based natural language processing. IEEE Comput. Intell. Mag. 13(3), 55–75 (2018)CrossRef
33.
Zurück zum Zitat Zhang, K., Zuo, W., Gu, S., Zhang, L.: Learning deep cnn denoiser prior for image restoration. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 3929–3938. (2017) Zhang, K., Zuo, W., Gu, S., Zhang, L.: Learning deep cnn denoiser prior for image restoration. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 3929–3938. (2017)
34.
Zurück zum Zitat Wang, W., Zhu, M., Zeng, X., Ye, X., Sheng, Y.: Malware traffic classification using convolutional neural network for representation learning. In: 2017 International Conference on Information Networking (ICOIN), IEEE, pp. 712–717. (2017) Wang, W., Zhu, M., Zeng, X., Ye, X., Sheng, Y.: Malware traffic classification using convolutional neural network for representation learning. In: 2017 International Conference on Information Networking (ICOIN), IEEE, pp. 712–717. (2017)
35.
Zurück zum Zitat Arel, I., Rose, D.C., Karnowski, T.P.: Deep machine learning—a new frontier in artificial intelligence research [research frontier]. IEEE Comput. Intell. Mag. 5(4), 13–18 (2010)CrossRef Arel, I., Rose, D.C., Karnowski, T.P.: Deep machine learning—a new frontier in artificial intelligence research [research frontier]. IEEE Comput. Intell. Mag. 5(4), 13–18 (2010)CrossRef
36.
Zurück zum Zitat Marir, N., Wang, H., Feng, G., Li, B., Jia, M.: Distributed abnormal behavior detection approach based on deep belief network and ensemble SVM using spark. IEEE Access 6, 59657–59671 (2018)CrossRef Marir, N., Wang, H., Feng, G., Li, B., Jia, M.: Distributed abnormal behavior detection approach based on deep belief network and ensemble SVM using spark. IEEE Access 6, 59657–59671 (2018)CrossRef
37.
Zurück zum Zitat Xiang, W., Tran, H.D., Johnson, T.T.: Output reachable set estimation and verification for multilayer neural networks. IEEE Trans. Neural Netw. Learn. Syst. 29(11), 5777–5783 (2018)MathSciNetCrossRef Xiang, W., Tran, H.D., Johnson, T.T.: Output reachable set estimation and verification for multilayer neural networks. IEEE Trans. Neural Netw. Learn. Syst. 29(11), 5777–5783 (2018)MathSciNetCrossRef
38.
Zurück zum Zitat Géron, A.: Hands-On Machine Learning with Scikit-Learn, Keras, and TensorFlow: Concepts, Tools, and Techniques to Build Intelligent Systems. O’Reilly Media, Beijing (2019) Géron, A.: Hands-On Machine Learning with Scikit-Learn, Keras, and TensorFlow: Concepts, Tools, and Techniques to Build Intelligent Systems. O’Reilly Media, Beijing (2019)
Metadaten
Titel
Network Traffic Classification Using Deep Learning Networks and Bayesian Data Fusion
verfasst von
Saadat Izadi
Mahmood Ahmadi
Amir Rajabzadeh
Publikationsdatum
01.04.2022
Verlag
Springer US
Erschienen in
Journal of Network and Systems Management / Ausgabe 2/2022
Print ISSN: 1064-7570
Elektronische ISSN: 1573-7705
DOI
https://doi.org/10.1007/s10922-021-09639-z

Weitere Artikel der Ausgabe 2/2022

Journal of Network and Systems Management 2/2022 Zur Ausgabe

Premium Partner