Skip to main content

An Autoencoder-Based Learning Method for Wireless Communication Protocol Identification

  • Conference paper
  • First Online:
Communications and Networking (ChinaCom 2017)

Abstract

As protocols play respective roles to fulfill different communication services, it is important to identify protocols before analyzing and managing the system. In the past decade, there have been a lot of researches on protocol identification using machine learning methods, which achieve promising results. However, the features of protocol used for identification mainly rely on engineering skill and domain expertise, which may not be available for the complicated wireless communication systems, such as encryption-based systems. In this paper, we propose an unsupervised-based learning method to make the feature extraction more intelligently and automatically. We first review the limitation of the traditional identification methods, especially the part of feature extraction. After that, an unsupervised deep learning based method, autoencoder, is proposed for automatically extracting the features of the original protocol data. Then, we construct the identification model based on the extracted features and a Support Vector Machine based classifier. Finally, experimental results show the effectiveness of the proposed method.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Moore, A.W., Papagiannaki, K.: Toward the accurate identification of network applications. In: Dovrolis, C. (ed.) PAM 2005. LNCS, vol. 3431, pp. 41–54. Springer, Heidelberg (2005). https://doi.org/10.1007/978-3-540-31966-5_4

    Chapter  Google Scholar 

  2. Kang, H.-J., Kim, M.-S., Hong, J.W.-K.: A method on multimedia service traffic monitoring and analysis. In: Brunner, M., Keller, A. (eds.) DSOM 2003. LNCS, vol. 2867, pp. 93–105. Springer, Heidelberg (2003). https://doi.org/10.1007/978-3-540-39671-0_9

    Chapter  Google Scholar 

  3. Sen, S., Spatscheck, O., Wang, D.: Accurate, scalable in-network identification of P2P traffic using application signatures. In: WWW, pp. 512–521. ACM (2004)

    Google Scholar 

  4. Wright, C.V., Monrose, F., Masson, G.M.: On inferring application protocol behaviors in encrypted network traffic. J. Mach. Learn. Res. 6, 2745–2769 (2006)

    MathSciNet  MATH  Google Scholar 

  5. Williams, N., Zander, S., Armitage, G.J.: A preliminary performance comparison of five machine learning algorithms for practical IP traffic flow classification. Comput. Commun. Rev. 36(5), 5–16 (2006)

    Article  Google Scholar 

  6. Nguyen, T.T.T., Armitage, G.J.: A survey of techniques for internet traffic classification using machine learning. IEEE Commun. Surv. Tutor. 10(1–4), 56–76 (2008)

    Article  Google Scholar 

  7. Arndt, D.J., Zincir-Heywood, A.N.: A comparison of three machine learning techniques for encrypted network traffic analysis. In: CISDA, pp. 107–114. IEEE (2011)

    Google Scholar 

  8. Auld, T., Moore, A.W., Gull, S.F.: Bayesian neural networks for internet traffic classification. IEEE Trans. Neural Netw. 18(1), 223–239 (2007)

    Article  Google Scholar 

  9. Li, A., Dong, C., Tang, S., Wu, F., Tian, C., Tao, B., Wang, H.: Demodulation-free protocol identification in heterogeneous wireless networks. Comput. Commun. 55, 102–111 (2015)

    Article  Google Scholar 

  10. Dainotti, A., de Donato, W., Pescapè, A., Rossi, P.S.: Classification of network traffic via packet-level hidden Markov models. In: GLOBECOM, pp. 2138–2142. IEEE (2008)

    Google Scholar 

  11. Hu, S., Yao, Y., Yang, Z.: MAC protocol identification using support vector machines for cognitive radio networks. IEEE Wirel. Commun. 21(1), 52–60 (2014)

    Article  Google Scholar 

  12. LeCun, Y., Bengio, Y., Hinton, G.E.: Deep learning. Nature 521(7553), 436–444 (2015)

    Article  Google Scholar 

  13. O’Shea, T.J., Corgan, J., Clancy, T.C.: Unsupervised representation learning of structured radio communication signals. In: SPLINE, pp. 1–5. IEEE (2016)

    Google Scholar 

  14. Bengio, Y., Courville, A.C., Vincent, P.: Representation learning: a review and new perspectives. IEEE Trans. Pattern Anal. Mach. Intell. 35(8), 1798–1828 (2013)

    Article  Google Scholar 

  15. Vincent, P., Larochelle, H., Lajoie, I., Bengio, Y., Manzagol, P.: Stacked denoising autoencoders: learning useful representations in a deep network with a local denoising criterion. J. Mach. Learn. Res. 11, 3371–3408 (2010)

    MathSciNet  MATH  Google Scholar 

  16. Burges, C.J.C.: A tutorial on support vector machines for pattern recognition. Data Min. Knowl. Discov. 2(2), 121–167 (1998)

    Article  Google Scholar 

  17. Yuan, R., Li, Z., Guan, X., Xu, L.: An SVM-based machine learning method for accurate internet traffic classification. Inf. Syst. Front. 12(2), 149–156 (2010)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mai Xu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ren, J., Wang, Z., Xu, M. (2018). An Autoencoder-Based Learning Method for Wireless Communication Protocol Identification. In: Li, B., Shu, L., Zeng, D. (eds) Communications and Networking. ChinaCom 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 236. Springer, Cham. https://doi.org/10.1007/978-3-319-78130-3_55

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-78130-3_55

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-78129-7

  • Online ISBN: 978-3-319-78130-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics