Nothing Special   »   [go: up one dir, main page]

Skip to main content
Log in

Traffic identification model based on generative adversarial deep convolutional network

  • Published:
Annals of Telecommunications Aims and scope Submit manuscript

Abstract

With the rapid development of network technology, the Internet has accelerated the generation of network traffic, which has made network security a top priority. In recent years, due to the limitations of deep packet inspection technology and port number-based network traffic identification technology, machine learning-based network traffic identification technology has gradually become the most concerned method in the field of traffic identification with its advantages. As the learning ability of deep learning in machine learning becomes more substantial and more able to adapt to highly complex tasks, deep learning has become more widely used in natural language processing, image identification, and computer vision. Therefore, more and more researchers are applying deep learning to network traffic identification and classification. To address the imbalance of current network traffic, we propose a traffic identification model based on generating adversarial deep convolutional networks (GADCN), which effectively fits and expands traffic images, maintains a balance between classes of the dataset, and enhances the dataset stability. We use the USTC-TFC2016 dataset as training and test samples, and experimental results show that the method based on GADCN has better performance than general deep learning models.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Berberyan A (2021) Impact of internet dependence on the life meaning system of personality[C]//E3S Web of Conferences. EDP Sciences 258:07061

    Google Scholar 

  2. Schneider P (1996) Tcp/ip traffic classification based on port numbers[J]. Division Of Applied Sciences, Cambridge, MA, 2138(5):1–6

  3. Yoon SH, Park JW, Park JS et al (2009) Internet application traffic classification using fixed IP-port[C]//Asia-Pacific Network Operations and Management Symposium. Springer, Berlin, Heidelberg, pp 21–30

    Google Scholar 

  4. Zander S (2006) Misclassification of game traffic based on port numbers: a case study using enemy territory[J]. Technical Report 060410D, CAIA. http://caia.swin.edu.au/reports/060410D/CAIA-TR-060410D.pdf

  5. El-Maghraby R T, Abd Elazim N M, Bahaa-Eldin A M (2017) A survey on deep packet inspection[C]//2017 12th International Conference on Computer Engineering and Systems (ICCES), IEEE, pp 188-197

  6. Sherry J, Lan C, Popa RA et al (2015) Blindbox: Deep packet inspection over encrypted traffic[C]//Proceedings of the. ACM Conference on Special Interest Group on Data Communication 2015:213–226

    Google Scholar 

  7. Bujlow T, Carela-Español V, Barlet-Ros P (2014) Extended Independent Comparison of Popular Deep Packet Inspection (DPI) Tools for Traffic Classification[J]. Universitat Politècnica de Catalunya. https://www.ac.upc.edu/app/research-reports/html/research_center_index-CBA-2014,en.html

  8. Bakker J, Ng B, Seah W K, Pekar A (2019) Traffic classification with machine learning in a live network[C]//2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), IEEE, pp 488-493

  9. Thupae R, Isong B, Gasela N, Abu-Mahfouz A M (2018) Machine learning techniques for traffic identification and classifiacation in SDWSN: A survey[C]//IECON 2018-44th Annual Conference of the IEEE Industrial Electronics Society, IEEE, pp 4645-4650

  10. Shafiq M, Yu X, Bashir AK et al (2018) A machine learning approach for feature selection traffic classification using security analysis[J]. J Supercomput 74(10):4867–4892

    Article  Google Scholar 

  11. Carlini N, Wagner D (2017) Towards evaluating the robustness of neural networks[C]//2017 ieee symposium on security and privacy (sp). IEEE, 39–57

  12. Doshi-Velez F, Kim B (2018) Considerations for evaluation and generalization in interpretable machine learning[M]//Explainable and interpretable models in computer vision and machine learning. Springer, Cham, pp 3–17

    Google Scholar 

  13. Aldweesh A, Derhab A, Emam A Z (2020)Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues[J]. Knowledge-Based Systems 189: 105-124

  14. Pouyanfar S, Sadiq S, Yan Y et al (2018) A survey on deep learning: algorithms, techniques, and applications[J]. ACM Computing Surveys (CSUR) 51(5):1–36

    Article  Google Scholar 

  15. Dong S, Wang P, Abbas K (2021) A survey on deep learning and its applications[J]. Computer Science Review 40: 100379

  16. Peng M, Zhang Q, Xing X, et al (2019) Trainable undersampling for class-imbalance learning[C]//Proceedings of the AAAI Conference on Artificial Intelligence, pp 4707-4714

  17. Sun B, Chen H, Wang J et al (2018) Evolutionary undersampling based bagging ensemble method for imbalanced data classification[J]. Front Comp Sci 12(2):331–350

    Article  Google Scholar 

  18. Chawla NV, Bowyer KW, Hall LO et al (2002) SMOTE: synthetic minority over-sampling technique[J]. Journal of artificial intelligence research 16:321–357

    Article  Google Scholar 

  19. Gu X, Angelov PP, Soares EA (2020) A self-adaptive synthetic over-sampling technique for imbalanced classification[J]. Int J Intell Syst 35(6):923–943

    Article  Google Scholar 

  20. Goodfellow I, Pouget-Abadie J, Mirza M, et al. (2014) Generative adversarial nets[J]. Advances in neural information processing systems 2014: 2672–2680

  21. Ring M, Schlör D, Landes D, et al (2019) Flow-based network traffic generation using generative adversarial networks[J]. Computers & Security 82: 156-172

  22. Mirza M, Osindero S (2014) Conditional generative adversarial nets[J]. arXiv preprint arXiv 1411:1784

  23. Radford A, Metz L, Chintala S (2015) Unsupervised representation learning with deep convolutional generative adversarial networks[J]. arXiv preprint arXiv 1511:06434

  24. Arjovsky M, Chintala S, Bottou L (2017) Wasserstein gan arXiv preprint arXiv 1701:07875

    Google Scholar 

  25. Heidari A A, Faris H, Mirjalili S et al (2020) Ant lion optimizer: theory, literature review, and application in multi-layer perceptron neural networks[J]. Nature-Inspired Optimizers 2020:23–46

  26. IDX File Format Specifications, Behaviour and Example, (2016) http://www.fon.hum.uva.nl/praat/manual/IDX_file_format.html

  27. Wang W, Zhu M, Zeng X, Ye X, Sheng Y (2017) Malware traffic classification using convolutional neural network for representation learning[C]//2017 International Conference on Information Networking (ICOIN), IEEE, pp 712-717

  28. El-Sawy A, Hazem E B, Loey M (2016) CNN for handwritten arabic digits recognition based on LeNet-5[C]//International conference on advanced intelligent systems and informatics, Springer, Cham, pp 566-575

  29. Geng Z, Chen GuoFei, Han Y, Gang Lu (2020) FangLi: Semantic relation extraction using sequential and tree-structured LSTM with attention. Inf Sci 509:183–192

    Article  Google Scholar 

  30. Htet Myet Lynn (2019) Sung Bum Pan, Pankoo Kim: A deep bidirectional GRU network model for biometric electrocardiogram classification based on recurrent neural networks. IEEE Access 7:145395–145405

    Article  Google Scholar 

  31. Liu Z, Li S, Zhang Y, Yun X, Cheng Z (2020) Efficient Malware Originated Traffic Classification by Using Generative Adversarial Networks[C]//2020 IEEE Symposium on Computers and Communications(ISCC), IEEE, pp 1-7

  32. Fernández A, Garcia S, Herrera F et al (2018) SMOTE for learning from imbalanced data: progress and challenges, marking the 15-year anniversary[J]. J Artific Intell Res 61:863–905

    Article  MathSciNet  Google Scholar 

  33. Zhang J, Chen L (2019) Clustering-based undersampling with random over sampling examples and support vector machine for imbalanced classification of breast cancer diagnosis[J]. Comput Assisted Surg 24(sup2):62–72

    Article  MathSciNet  Google Scholar 

  34. Chen Y, Li Z, Shi J, et al. (2020) Not Afraid of the Unseen: a Siamese Network based Scheme for Unknown Traffic Discovery[C]//2020 IEEE Symposium on Computers and Communications (ISCC), IEEE, pp 1-7 35

  35. Li T, Chen S, Yao Z, et al. (2018) Semi-supervised network traffic classification using deep generative models[C]//2018 14th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD). IEEE, 1282–1288.

  36. Wang B, Su Y, Zhang M, et al. (2020) A deep hierarchical network for packet-level malicious traffic detection[J]. IEEE Access

  37. Ran J, Chen Y, Li S (2018) Three-dimensional convolutional neural network based traffic classification for wireless communications[C]//2018 IEEE Global Conference on Signal and Information Processing (GlobalSIP). IEEE: 624–627

  38. Chen W, Li H, Zeng Y, et al. (2019) Model uncertainty for annotation error correction in deep learning based intrusion detection system[C]//2019 IEEE International Conference on Smart Cloud (SmartCloud). IEEE: 137–142

  39. Tang ZZ, Zeng X, Guo Z et al (2020) Malware traffic classification based on recurrence quantification analysis[J]. IJ Network Security 22(3):449–459

    Google Scholar 

  40. Hasibi, Ramin, Matin Shokri, and Mehdi Dehghan (2019) Augmentation scheme for dealing with imbalanced network traffic classification using deep learning. arXiv preprint arXiv:1901.00204

  41. Vu L, Bui C T, Nguyen Q U (2017) A deep learning based method for handling imbalanced problem in network traffic classification[C]//Proceedings of the Eighth International Symposium on Information and Communication Technology, pp 333-339.

  42. Vu L, Van Tra D, Nguyen Q U (2016) Learning from imbalanced data for encrypted traffic identification problem[C]//Proceedings of the Seventh Symposium on Information and Communication Technology, pp 147-152

  43. Tang Z, Zeng X, Chen J (2020) Multi-model coupling method for imbalanced network traffic classification based on clustering[J]. Int J High Perform Comput Networking 16(1):26–35

    Article  Google Scholar 

  44. Amina S I S M, Abdolkhalegh B, Khoa N K, Mohamed C (2018) Featuring Real-Time imbalanced network traffic classification[C]//2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), IEEE, pp 840-846

  45. Saber A, Fergani B, Abbas M (2018) Encrypted traffic classification: combining over-and under-sampling through a PCA-SVM[C]//2018 3rd International Conference on Pattern Analysis and Intelligent Systems (PAIS). IEEE: 1–5

  46. Chen Z, Yan Q, Han H, et al. B  (2018) Machine learning based mobile malware detection using highly imbalanced network traffic[J]. Information Sciences 433: 346–364

  47. Lee J H, Park K H. GAN-based imbalanced data intrusion detection system[J]. Personal and Ubiquitous Computing, 2019: 1–8.

  48. CTU University (2016) The Stratosphere IPS Project Dataset[DB/OL], https://stratosphereips.org/creategory/dataset.html (2016)

  49. Ixia Corporation (2016) Ixia Breakpoint Overview and Specifications[CP/OL], https://www.ixiacom.com/products/breakpoints (2016)

  50. Chicco D, Jurman G (2020) The advantages of the Matthews correlation coefficient (MCC) over F1 score and accuracy in binary classification evaluation[J]. BMC Genomics 21(1):1–13

    Article  Google Scholar 

Download references

Funding

This paper is supported by Project supported by Key Scientific and Technological Research Projects in Henan Province (Grand No. 192102210125), Open Foundation of State Key Laboratory of Networking and Switching Technology (Beijing University of Posts and Telecommunications) (KLNST-2020–2-01), Hubei Provincial Department of Education Youth Project (Q201316), and Hubei Provincial Department of Education Research Program Key Project (D20191708). In addition, the authors also will thank the anonymous reviewers for their comments and suggestions.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Shi Dong or Tao Peng.

Ethics declarations

Conflict of interest

The authors declare no competing interests.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Dong, S., Xia, Y. & Peng, T. Traffic identification model based on generative adversarial deep convolutional network. Ann. Telecommun. 77, 573–587 (2022). https://doi.org/10.1007/s12243-021-00876-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12243-021-00876-6

Keywords

Navigation