Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3628797.3628804acmotherconferencesArticle/Chapter ViewAbstractPublication PagessoictConference Proceedingsconference-collections
research-article

A New Transfer Learning-Based Traffic Classification Algorithm for a Multi-Domain SDN Network

Published: 07 December 2023 Publication History

Abstract

To enhance the efficiency and resource utilization of a computer network, it is imperative to classify network traffic and implement distinct priority policies. Network traffic classification plays a pivotal role across various domains, including network administration, cybersecurity, and network resource optimization. As encrypted network data undergoes diverse evolution, as evident in datasets from tech giants like Google, Facebook, and YouTube, traditional traffic classification methods have given way to machine learning-based approaches. Given that computer networks are primarily deployed as distributed multi-domain systems, employing machine learning for traffic classification becomes challenging when a new network domain appears with a limited dataset. One potential remedy is to employ transfer learning, allowing knowledge transfer from a pre-trained model in an established domain to a new one. In this paper, we present two contributions. First, a novel algorithm called Multi-class TrAdaBoost-CNN is introduced to tackle the challenge of cross-domain classification in encrypted network services. This algorithm extends the Multi-class TrAdaBoost approach by incorporating a Convolutional Neural Network (CNN) as a weak learner. Secondly, extensive experiments are conducted on two distinct domains characterized by imbalanced data distributions to assess the efficacy of our proposed method. The experimental results clearly demonstrate that our algorithm outperforms the traditional CNN model, achieving remarkable accuracy improvements of up to 16%, even when dealing with extremely limited data.

References

[1]
Sudad Abdulazzaq and Mehmet Demirci. 2020. A Deep Learning Based System for Traffic Engineering in Software Defined Networks. International Journal of Intelligent Systems and Applications in Engineering 8, 4 (Dec. 2020), 206–213. https://doi.org/10.18201/ijisae.2020466314
[2]
Daniel J. Arndt and A. Nur Zincir-Heywood. 2011. A Comparison of three machine learning techniques for encrypted network traffic analysis. In 2011 IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA). 107–114. https://doi.org/10.1109/CISDA.2011.5945941
[3]
Ahmad Azab, Mahmoud Khasawneh, Saed Alrabaee, Kim-Kwang Raymond Choo, and Maysa Sarsour. 2022. Network traffic classification: Techniques, datasets, and challenges. Digital Communications and Networks (2022).
[4]
Roni Bar-Yanai, Michael Langberg, David Peleg, and Liam Roditty. 2010. Realtime Classification for Encrypted Traffic. In The Sea. https://api.semanticscholar.org/CorpusID:39614129
[5]
Laurent Bernaille and Renata Teixeira. 2007. Early Recognition of Encrypted Applications. In Proceedings of the 8th International Conference on Passive and Active Network Measurement (Louvain-la-Neuve, Belgium) (PAM’07). Springer-Verlag, Berlin, Heidelberg, 165–175.
[6]
Wenyuan Dai, Qiang Yang, Gui-Rong Xue, and Yong Yu. 2007. Boosting for Transfer Learning. In Proceedings of the 24th International Conference on Machine Learning (Corvalis, Oregon, USA) (ICML ’07). Association for Computing Machinery, New York, NY, USA, 193–200. https://doi.org/10.1145/1273496.1273521
[7]
Yoav Freund and Robert E Schapire. 1997. A Decision-Theoretic Generalization of On-Line Learning and an Application to Boosting. J. Comput. System Sci. 55, 1 (1997), 119–139. https://doi.org/10.1006/jcss.1997.1504
[8]
Trevor Hastie, Saharon Rosset, Ji Zhu, and Hui Zou. 2009. Multi-class adaboost. Statistics and its Interface 2, 3 (2009), 349–360.
[9]
Hanxian He, Kourosh Khoshelham, and Clive S. Fraser. 2020. A multiclass TrAdaBoost transfer learning algorithm for the classification of mobile lidar data. Isprs Journal of Photogrammetry and Remote Sensing 166 (2020), 118–127. https://api.semanticscholar.org/CorpusID:225346316
[10]
Nam-Thang Hoang, Hai-Nam Nguyen, Hai-Anh Tran, and Sami Souihi. 2022. A Novel Adaptive East–West Interface for a Heterogeneous and Distributed SDN Network. Electronics 11, 7 (2022). https://doi.org/10.3390/electronics11070975
[11]
Yuichi Kumano, Shingo Ata, Nobuyuki Nakamura, Yoshihiro Nakahira, and Ikuo Oka. 2014. Towards real-time processing for application identification of encrypted traffic. In 2014 International Conference on Computing, Networking and Communications (ICNC). 136–140. https://doi.org/10.1109/ICCNC.2014.6785319
[12]
Xinjie Lin, Gang Xiong, Gaopeng Gou, Zhen Li, Junzheng Shi, and Jing Yu. 2022. ET-BERT: A Contextualized Datagram Representation with Pre-training Transformers for Encrypted Traffic Classification. In Proceedings of the ACM Web Conference 2022. ACM. https://doi.org/10.1145/3485447.3512217
[13]
Manuel Lopez-Martin, Belen Carro, Antonio Sanchez-Esguevillas, and Jaime Lloret. 2017. Network Traffic Classifier With Convolutional and Recurrent Neural Networks for Internet of Things. IEEE Access 5 (2017), 18042–18050. https://doi.org/10.1109/ACCESS.2017.2747560
[14]
Thuy T.T. Nguyen and Grenville Armitage. 2008. A survey of techniques for internet traffic classification using machine learning. IEEE Communications Surveys & Tutorials 10, 4 (2008), 56–76. https://doi.org/10.1109/SURV.2008.080406
[15]
Yohei Okada, Shingo Ata, Nobuyuki Nakamura, Yoshihiro Nakahira, and Ikuo Oka. 2011. Application identification from encrypted traffic based on characteristic changes by encryption. In 2011 IEEE International Workshop Technical Committee on Communications Quality and Reliability (CQR). 1–6. https://doi.org/10.1109/CQR.2011.5996087
[16]
Arpita Prajapati, Achyut Sakadasariya, and Jitisha Patel. 2018. Software defined network: Future of networking. In 2018 2nd International Conference on Inventive Systems and Control (ICISC). 1351–1354. https://doi.org/10.1109/ICISC.2018.8399028
[17]
Shahbaz Rezaei and Xin Liu. 2019. Deep Learning for Encrypted Traffic Classification: An Overview. IEEE Communications Magazine 57, 5 (2019), 76–81. https://doi.org/10.1109/MCOM.2019.1800819
[18]
Shahbaz Rezaei and Xin Liu. 2020. How to Achieve High Classification Accuracy with Just a Few Labels: A Semi-supervised Approach Using Sampled Packets. arxiv:1812.09761 [cs.NI]
[19]
Fengjun Shang, Saisai Li, and Jinlong He. 2020. Improved application of transfer learning in network traffic classification. Journal of Physics: Conference Series 1682, 1 (nov 2020), 012011. https://doi.org/10.1088/1742-6596/1682/1/012011
[20]
Guanglu Sun, Lili Liang, Teng Chen, Feng Xiao, and Fei Lang. 2018. Network traffic classification based on transfer learning. Computers & Electrical Engineering 69 (2018), 920–927. https://doi.org/10.1016/j.compeleceng.2018.03.005
[21]
Guang-Lu Sun, Yibo Xue, Yingfei Dong, Dongsheng Wang, and Chenglong Li. 2010. An Novel Hybrid Method for Effectively Classifying Encrypted Traffic. In 2010 IEEE Global Telecommunications Conference GLOBECOM 2010. 1–5. https://doi.org/10.1109/GLOCOM.2010.5683649
[22]
Van Tong, Hai Anh Tran, Sami Souihi, and Abdelhamid Mellouk. 2018. A Novel QUIC Traffic Classifier Based on Convolutional Neural Networks. In 2018 IEEE Global Communications Conference (GLOBECOM). 1–6. https://doi.org/10.1109/GLOCOM.2018.8647128
[23]
Pan Wang, Xuejiao Chen, Feng Ye, and Zhixin Sun. 2019. A Survey of Techniques for Mobile Service Encrypted Traffic Classification Using Deep Learning. IEEE Access 7 (2019), 54024–54033. https://doi.org/10.1109/ACCESS.2019.2912896
[24]
Wei Wang, Ming Zhu, Jinlin Wang, Xuewen Zeng, and Zhongzhen Yang. 2017. End-to-end encrypted traffic classification with one-dimensional convolution neural networks. In 2017 IEEE International Conference on Intelligence and Security Informatics (ISI). 43–48. https://doi.org/10.1109/ISI.2017.8004872

Cited By

View all

Index Terms

  1. A New Transfer Learning-Based Traffic Classification Algorithm for a Multi-Domain SDN Network

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    SOICT '23: Proceedings of the 12th International Symposium on Information and Communication Technology
    December 2023
    1058 pages
    ISBN:9798400708916
    DOI:10.1145/3628797
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 07 December 2023

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Distributed Software-defined Network
    2. Encrypted Network Traffic Classification
    3. Imbalanced Data
    4. TrAdaBoost
    5. Transfer Learning

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    SOICT 2023

    Acceptance Rates

    Overall Acceptance Rate 147 of 318 submissions, 46%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 77
      Total Downloads
    • Downloads (Last 12 months)77
    • Downloads (Last 6 weeks)5
    Reflects downloads up to 28 Sep 2024

    Other Metrics

    Citations

    Cited By

    View all

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media