Abstract
With the rapid development of network technology, the Internet has accelerated the generation of network traffic, which has made network security a top priority. In recent years, due to the limitations of deep packet inspection technology and port number-based network traffic identification technology, machine learning-based network traffic identification technology has gradually become the most concerned method in the field of traffic identification with its advantages. As the learning ability of deep learning in machine learning becomes more substantial and more able to adapt to highly complex tasks, deep learning has become more widely used in natural language processing, image identification, and computer vision. Therefore, more and more researchers are applying deep learning to network traffic identification and classification. To address the imbalance of current network traffic, we propose a traffic identification model based on generating adversarial deep convolutional networks (GADCN), which effectively fits and expands traffic images, maintains a balance between classes of the dataset, and enhances the dataset stability. We use the USTC-TFC2016 dataset as training and test samples, and experimental results show that the method based on GADCN has better performance than general deep learning models.
Similar content being viewed by others
References
Berberyan A (2021) Impact of internet dependence on the life meaning system of personality[C]//E3S Web of Conferences. EDP Sciences 258:07061
Schneider P (1996) Tcp/ip traffic classification based on port numbers[J]. Division Of Applied Sciences, Cambridge, MA, 2138(5):1–6
Yoon SH, Park JW, Park JS et al (2009) Internet application traffic classification using fixed IP-port[C]//Asia-Pacific Network Operations and Management Symposium. Springer, Berlin, Heidelberg, pp 21–30
Zander S (2006) Misclassification of game traffic based on port numbers: a case study using enemy territory[J]. Technical Report 060410D, CAIA. http://caia.swin.edu.au/reports/060410D/CAIA-TR-060410D.pdf
El-Maghraby R T, Abd Elazim N M, Bahaa-Eldin A M (2017) A survey on deep packet inspection[C]//2017 12th International Conference on Computer Engineering and Systems (ICCES), IEEE, pp 188-197
Sherry J, Lan C, Popa RA et al (2015) Blindbox: Deep packet inspection over encrypted traffic[C]//Proceedings of the. ACM Conference on Special Interest Group on Data Communication 2015:213–226
Bujlow T, Carela-Español V, Barlet-Ros P (2014) Extended Independent Comparison of Popular Deep Packet Inspection (DPI) Tools for Traffic Classification[J]. Universitat Politècnica de Catalunya. https://www.ac.upc.edu/app/research-reports/html/research_center_index-CBA-2014,en.html
Bakker J, Ng B, Seah W K, Pekar A (2019) Traffic classification with machine learning in a live network[C]//2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), IEEE, pp 488-493
Thupae R, Isong B, Gasela N, Abu-Mahfouz A M (2018) Machine learning techniques for traffic identification and classifiacation in SDWSN: A survey[C]//IECON 2018-44th Annual Conference of the IEEE Industrial Electronics Society, IEEE, pp 4645-4650
Shafiq M, Yu X, Bashir AK et al (2018) A machine learning approach for feature selection traffic classification using security analysis[J]. J Supercomput 74(10):4867–4892
Carlini N, Wagner D (2017) Towards evaluating the robustness of neural networks[C]//2017 ieee symposium on security and privacy (sp). IEEE, 39–57
Doshi-Velez F, Kim B (2018) Considerations for evaluation and generalization in interpretable machine learning[M]//Explainable and interpretable models in computer vision and machine learning. Springer, Cham, pp 3–17
Aldweesh A, Derhab A, Emam A Z (2020)Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues[J]. Knowledge-Based Systems 189: 105-124
Pouyanfar S, Sadiq S, Yan Y et al (2018) A survey on deep learning: algorithms, techniques, and applications[J]. ACM Computing Surveys (CSUR) 51(5):1–36
Dong S, Wang P, Abbas K (2021) A survey on deep learning and its applications[J]. Computer Science Review 40: 100379
Peng M, Zhang Q, Xing X, et al (2019) Trainable undersampling for class-imbalance learning[C]//Proceedings of the AAAI Conference on Artificial Intelligence, pp 4707-4714
Sun B, Chen H, Wang J et al (2018) Evolutionary undersampling based bagging ensemble method for imbalanced data classification[J]. Front Comp Sci 12(2):331–350
Chawla NV, Bowyer KW, Hall LO et al (2002) SMOTE: synthetic minority over-sampling technique[J]. Journal of artificial intelligence research 16:321–357
Gu X, Angelov PP, Soares EA (2020) A self-adaptive synthetic over-sampling technique for imbalanced classification[J]. Int J Intell Syst 35(6):923–943
Goodfellow I, Pouget-Abadie J, Mirza M, et al. (2014) Generative adversarial nets[J]. Advances in neural information processing systems 2014: 2672–2680
Ring M, Schlör D, Landes D, et al (2019) Flow-based network traffic generation using generative adversarial networks[J]. Computers & Security 82: 156-172
Mirza M, Osindero S (2014) Conditional generative adversarial nets[J]. arXiv preprint arXiv 1411:1784
Radford A, Metz L, Chintala S (2015) Unsupervised representation learning with deep convolutional generative adversarial networks[J]. arXiv preprint arXiv 1511:06434
Arjovsky M, Chintala S, Bottou L (2017) Wasserstein gan arXiv preprint arXiv 1701:07875
Heidari A A, Faris H, Mirjalili S et al (2020) Ant lion optimizer: theory, literature review, and application in multi-layer perceptron neural networks[J]. Nature-Inspired Optimizers 2020:23–46
IDX File Format Specifications, Behaviour and Example, (2016) http://www.fon.hum.uva.nl/praat/manual/IDX_file_format.html
Wang W, Zhu M, Zeng X, Ye X, Sheng Y (2017) Malware traffic classification using convolutional neural network for representation learning[C]//2017 International Conference on Information Networking (ICOIN), IEEE, pp 712-717
El-Sawy A, Hazem E B, Loey M (2016) CNN for handwritten arabic digits recognition based on LeNet-5[C]//International conference on advanced intelligent systems and informatics, Springer, Cham, pp 566-575
Geng Z, Chen GuoFei, Han Y, Gang Lu (2020) FangLi: Semantic relation extraction using sequential and tree-structured LSTM with attention. Inf Sci 509:183–192
Htet Myet Lynn (2019) Sung Bum Pan, Pankoo Kim: A deep bidirectional GRU network model for biometric electrocardiogram classification based on recurrent neural networks. IEEE Access 7:145395–145405
Liu Z, Li S, Zhang Y, Yun X, Cheng Z (2020) Efficient Malware Originated Traffic Classification by Using Generative Adversarial Networks[C]//2020 IEEE Symposium on Computers and Communications(ISCC), IEEE, pp 1-7
Fernández A, Garcia S, Herrera F et al (2018) SMOTE for learning from imbalanced data: progress and challenges, marking the 15-year anniversary[J]. J Artific Intell Res 61:863–905
Zhang J, Chen L (2019) Clustering-based undersampling with random over sampling examples and support vector machine for imbalanced classification of breast cancer diagnosis[J]. Comput Assisted Surg 24(sup2):62–72
Chen Y, Li Z, Shi J, et al. (2020) Not Afraid of the Unseen: a Siamese Network based Scheme for Unknown Traffic Discovery[C]//2020 IEEE Symposium on Computers and Communications (ISCC), IEEE, pp 1-7 35
Li T, Chen S, Yao Z, et al. (2018) Semi-supervised network traffic classification using deep generative models[C]//2018 14th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD). IEEE, 1282–1288.
Wang B, Su Y, Zhang M, et al. (2020) A deep hierarchical network for packet-level malicious traffic detection[J]. IEEE Access
Ran J, Chen Y, Li S (2018) Three-dimensional convolutional neural network based traffic classification for wireless communications[C]//2018 IEEE Global Conference on Signal and Information Processing (GlobalSIP). IEEE: 624–627
Chen W, Li H, Zeng Y, et al. (2019) Model uncertainty for annotation error correction in deep learning based intrusion detection system[C]//2019 IEEE International Conference on Smart Cloud (SmartCloud). IEEE: 137–142
Tang ZZ, Zeng X, Guo Z et al (2020) Malware traffic classification based on recurrence quantification analysis[J]. IJ Network Security 22(3):449–459
Hasibi, Ramin, Matin Shokri, and Mehdi Dehghan (2019) Augmentation scheme for dealing with imbalanced network traffic classification using deep learning. arXiv preprint arXiv:1901.00204
Vu L, Bui C T, Nguyen Q U (2017) A deep learning based method for handling imbalanced problem in network traffic classification[C]//Proceedings of the Eighth International Symposium on Information and Communication Technology, pp 333-339.
Vu L, Van Tra D, Nguyen Q U (2016) Learning from imbalanced data for encrypted traffic identification problem[C]//Proceedings of the Seventh Symposium on Information and Communication Technology, pp 147-152
Tang Z, Zeng X, Chen J (2020) Multi-model coupling method for imbalanced network traffic classification based on clustering[J]. Int J High Perform Comput Networking 16(1):26–35
Amina S I S M, Abdolkhalegh B, Khoa N K, Mohamed C (2018) Featuring Real-Time imbalanced network traffic classification[C]//2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), IEEE, pp 840-846
Saber A, Fergani B, Abbas M (2018) Encrypted traffic classification: combining over-and under-sampling through a PCA-SVM[C]//2018 3rd International Conference on Pattern Analysis and Intelligent Systems (PAIS). IEEE: 1–5
Chen Z, Yan Q, Han H, et al. B (2018) Machine learning based mobile malware detection using highly imbalanced network traffic[J]. Information Sciences 433: 346–364
Lee J H, Park K H. GAN-based imbalanced data intrusion detection system[J]. Personal and Ubiquitous Computing, 2019: 1–8.
CTU University (2016) The Stratosphere IPS Project Dataset[DB/OL], https://stratosphereips.org/creategory/dataset.html (2016)
Ixia Corporation (2016) Ixia Breakpoint Overview and Specifications[CP/OL], https://www.ixiacom.com/products/breakpoints (2016)
Chicco D, Jurman G (2020) The advantages of the Matthews correlation coefficient (MCC) over F1 score and accuracy in binary classification evaluation[J]. BMC Genomics 21(1):1–13
Funding
This paper is supported by Project supported by Key Scientific and Technological Research Projects in Henan Province (Grand No. 192102210125), Open Foundation of State Key Laboratory of Networking and Switching Technology (Beijing University of Posts and Telecommunications) (KLNST-2020–2-01), Hubei Provincial Department of Education Youth Project (Q201316), and Hubei Provincial Department of Education Research Program Key Project (D20191708). In addition, the authors also will thank the anonymous reviewers for their comments and suggestions.
Author information
Authors and Affiliations
Corresponding authors
Ethics declarations
Conflict of interest
The authors declare no competing interests.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Dong, S., Xia, Y. & Peng, T. Traffic identification model based on generative adversarial deep convolutional network. Ann. Telecommun. 77, 573–587 (2022). https://doi.org/10.1007/s12243-021-00876-6
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12243-021-00876-6