Skip to main content
Log in

Deep transfer learning-based network traffic classification for scarce dataset in 5G IoT systems

  • Original Article
  • Published:
International Journal of Machine Learning and Cybernetics Aims and scope Submit manuscript

Abstract

Internet of Things (IoT) can provide the interconnection and data sharing among devices, vehicles, buildings via various sensors with the development of 5G, and it has been widely used in different services such as e-commerce, heath-care, smart buildings. In the meantime, various cyber-attacks for IoT have increased and caused huge losses. Lots of security mechanisms are rapidly being proposed to prevent the potentially malicious attackers for IoT, in which machine learning especially deep learning (DL) as increasingly popular solution for security has been implemented in intrusion detection system (IDS) and others. However, the lack of enough datasets prevents the application of IDS in 5G IoT system. As one of fundamental components of IDS, network traffic classification shows a discretization, individualization and fine-grained trend which derives the different personalized classification methods for different requirements and scenarios. In this case, the data-driven DL faces the following challenges. First, there are only a few labeled datasets in the various personalized application scenarios, which undoubtedly limits the deployment of DL classification. Second, not all scenarios have rich computing capability for that training a neural network requires lots of computing resources. Therefore, this paper proposes a traffic classification method based on deep transfer learning for 5G IoT scenarios with scarce labeled data and limited computing capability, and trains the classification model by weight transferring and neural network fine-tuning. Different from the previous work that extract artificially designed features, the proposed method retains the end-to-end learning performance of DL and reduces the risk of suffering concept drift to reduce human intervention. Experimental results show that when only 10% of dataset are used to label the data samples, the classification accuracy is close to the results of full training dataset.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Scully P (2020) Top 10 IoT applications in 2020. https://iot-analytics.com/top-10-iot-applications-in-2020/. Accessed 5 June 2020

  2. Hellaoui H, Koudil M, Bouabdallah A (2020) Energy efficiency in security of 5G-based IoT: an end-to-end adaptive approach. IEEE Internet Things J 7(7):6589–6602

    Article  Google Scholar 

  3. Manjia TS, Hadis K, Petros S (2020) Machine learning based solutions for security of internet of things (IoT): a survey. J Netw Comput Appl 161:102630

    Article  Google Scholar 

  4. Insider Business (2015) Report on how the internet of things will explode by 2020. http://www.businessinsider.com/. Accessed 5 June 2020

  5. Monika R, Yun TG, Chambers Jonathon A (2020) Multi-objective-based feature selection for DDoS attack detection in IoT networks. IET Netw 9(3):120–127

    Article  Google Scholar 

  6. Zarpelão BB, Miani RS, Kawakani CT, de Alvarenga SC (2017) A survey of intrusion detection in internet of things. J Netw Comput Appl 84:25–37

    Article  Google Scholar 

  7. Chaabouni N, Mosbah M, Zemmari A, Sauvignac C, Faruki P (2019) Network intrusion detection for IoT security based on learning techniques. IEEE Commun Surv Tutor 21(3):2671–2701

    Article  Google Scholar 

  8. Al-Garadi MA, Mohamed A, Al-Ali AK, Du X, Ali I, Guizani M (2020) A survey of machine and deep learning methods for internet of things (IoT) security. IEEE Commun Surv Tutor 22(3):1646–1685

    Article  Google Scholar 

  9. Hussain F, Hussain R, Hassan SA, Hossain E (2020) Machine learning in IoT security: current solutions and future challenges. IEEE Commun Surv Tutor 22(3):1686–1721

    Article  Google Scholar 

  10. Shailendra R, Jong HP (2018) Semi-supervised learning based distributed attack detection framework for IoT. Appl Soft Comput 72:79–89

    Article  Google Scholar 

  11. Hodo E, Bellekens XJA, Hamilton AW, Dubouilh P-L, Iorkyase E, Tachtatzis C, Atkinson RC (2016) Threat analysis of IoT networks using artificial neural network intrusion detection system. In: 2016 international symposium on networks, computers and communications, ISNCC 2016, Yasmine Hammamet, Tunisia, May 11–13, 2016. IEEE, pp 1–6

  12. Hosseinpour Farhoud, Amoli Payam, Plosila Juha, Hämäläinen Timo, Tenhunen Hannu (2016) An intrusion detection system for fog computing and IoT based logistic systems using a smart data approach. Int J Dig Content Technol Appl 10:12

    Google Scholar 

  13. Moustafa N, Turnbull B, Choo K-KR (2019) An ensemble intrusion detection technique based on proposed statistical flow features for protecting network traffic of internet of things. IEEE Internet Things J 6(3):4815–4830

    Article  Google Scholar 

  14. Roopak M, Tian GY, Chambers JA (2019) Deep learning models for cyber security in IoT networks. In: IEEE 9th annual computing and communication workshop and conference, CCWC 2019, Las Vegas, NV, USA, January 7–9, 2019. IEEE, pp 452–457

  15. Rezaei Shahbaz, Liu Xin (2019) Deep learning for encrypted traffic classification: an overview. IEEE Commun Mag 57(5):76–81

    Article  Google Scholar 

  16. Sun Guanglu, Liang Lili, Chen Teng, Xiao Feng, Lang Fei (2018) Network traffic classification based on transfer learning. Comput Electr Eng 69:920–927

    Article  Google Scholar 

  17. Gomes JVP, Inácio PRM, Pereira M, Freire MM, Monteiro PP (2013) Detection and classification of peer-to-peer traffic: a survey. ACM Comput Surv 45(3):30:1–30:40

    Article  Google Scholar 

  18. Buyun Q, Zhang Z, Zhu X, Meng D (2015) An empirical study of morphing on behavior-based network traffic classification. Secur Commun Netw 8(1):68–79

    Article  Google Scholar 

  19. Hu Y, Zou F, Li L, Yi P (2020) Traffic classification of user behaviors in tor, i2p, zeronet, freenet. In: Guojun W, Ryan KLK, Bhuiyan MZA, Yi P (eds) 19th IEEE international conference on trust, security and privacy in computing and communications, TrustCom 2020, Guangzhou, China, December 29, 2020–January 1, 2021. IEEE, pp 418–424

  20. Wang W, Zhu M, Wang J, Zeng X, Yang Z (2017) End-to-end encrypted traffic classification with one-dimensional convolution neural networks. In: 2017 IEEE international conference on intelligence and security informatics, ISI 2017, Beijing, China, July 22–24, 2017, pp 43–48

  21. Wang W, Zhu M, Zeng X, Ye X, Sheng Y (2017) Malware traffic classification using convolutional neural network for representation learning. In: 2017 international conference on information networking, ICOIN 2017, Da Nang, Vietnam, January 11–13, 2017, pp 712–717

  22. Chen Z, He K, Li J, Geng Y (2017) Seq2img: a sequence-to-image based approach towards IP traffic classification using convolutional neural networks. In: 2017 IEEE international conference on big data, BigData 2017, Boston, MA, USA, December 11–14, 2017, pp 1271–1276

  23. Zhou H, Wang Y, Ye M (2018) A method of CNN traffic classification based on sppnet. In: 14th international conference on computational intelligence and security, CIS 2018, Hangzhou, China, November 16–19, 2018. IEEE Computer Society, pp 390–394

  24. Zou Z, Ge J, Zheng H, Wu Y, Han C, Yao Z (2018) Encrypted traffic classification with a convolutional long short-term memory neural network. In: 20th IEEE international conference on high performance computing and communications; 16th IEEE international conference on smart city; 4th IEEE international conference on data science and systems, HPCC/SmartCity/DSS 2018, Exeter, United Kingdom, June 28–30, 2018. IEEE, pp 329–334

  25. Lotfollahi M, Siavoshani MJ, Zade RSH, Saberian M (2020) Deep packet: a novel approach for encrypted traffic classification using deep learning. Soft Comput 24(3):1999–2012

    Article  Google Scholar 

  26. Cui S, Jiang B, Cai Z, Lu Z, Liu S, Liu J (2019) A session-packets-based encrypted traffic classification using capsule neural networks. In: Zheng X, Laurence TY, Pavan B, Tao L, Keqin L, Albert YZ (eds) 21st IEEE international conference on high performance computing and communications; 17th IEEE international conference on smart city; 5th IEEE international conference on data science and systems, HPCC/SmartCity/DSS 2019, Zhangjiajie, China, August 10–12, 2019. IEEE, pp 429–436

  27. Casino F, Choo K-KR, Patsakis C (2019) HEDGE: efficient traffic classification of encrypted and compressed packets. IEEE Trans Inf Forensics Secur 14(11):2916–2926

    Article  Google Scholar 

  28. Liu C, He L, Xiong G, Cao Z, Li Z (2019) Fs-net: a flow sequence network for encrypted traffic classification. In: 2019 IEEE conference on computer communications, INFOCOM 2019, Paris, France, April 29–May 2, 2019, pp 1171–1179

  29. Ancy S, Paulraj D (2020) Handling imbalanced data with concept drift by applying dynamic sampling and ensemble classification model. Comput Commun 153:553–560

    Article  Google Scholar 

  30. Sheikhpour R, Sarram MA, Gharaghani S, Chahooki MAZ (2017) A survey on semi-supervised feature selection methods. Pattern Recognit 64:141–158

    Article  Google Scholar 

  31. Chandrashekar Girish, Sahin Ferat (2014) A survey on feature selection methods. Comput Electr Eng 40(1):16–28

    Article  Google Scholar 

  32. Xue B, Cervante L, Shang L, Browne WN, Zhang M (2013) Multi-objective evolutionary algorithms for filter based feature selection in classification. Int J Artif Intell Tools 22(4):1350024

  33. Sinno JP, Qiang Y (2010) A survey on transfer learning. IEEE Trans Knowl Data Eng 22(10):1345–1359

    Article  Google Scholar 

  34. Cai L, Jing X, Sun S, Huang H, Chen N, Lu Y (2013) P2P traffic identification based on transfer learning. In: 2013 IEEE international conference on granular computing, GrC 2013, Beijing, China, December 13–15, 2013, pp 22–26

  35. Yosinski J, Clune J, Bengio Y, Lipson H (2014) How transferable are features in deep neural networks? In: Advances in neural information processing systems 27: annual conference on neural information processing systems 2014, December 8–13 2014, Montreal, Quebec, Canada, pp 3320–3328

  36. Wang Z (2015) The applications of deep learning on traffic identification. In: 2015 Blackhat US, pp 1–10

  37. Sun Guanglu, Liang Lili, Chen Teng, Xiao Feng, Lang Fei (2018) Network traffic classification based on transfer learning. Comput Electr Eng 69:920–927

    Article  Google Scholar 

  38. Rezaei S, Liu X (2019) How to achieve high classification accuracy with just a few labels: a semisupervised approach using sampled packets. In: Advances in data mining—applications and theoretical aspects, 19th industrial conference, ICDM 2019, New York, USA, July 17–July 21, 2019, pp 28–42

  39. Tan M, Le Q (2019) EfficientNet: rethinking model scaling for convolutional neural networks. In: Kamalika C, Ruslan S (eds) Proceedings of the 36th international conference on machine learning, volume 97 of Proceedings of machine learning research, Long Beach, California, USA, 09–15 June. PMLR, pp 6105–6114

  40. Kolesnikov A, Beyer L, Zhai X, Puigcerver J, Yung J, Gelly S, Houlsby N (2020) Big Transfer (BiT): general visual representation learning. In: Andrea V, Horst B, Thomas B, Jan-Michael F (eds) Computer vision—ECCV 2020. Springer International Publishing, Cham, pp 491–507

  41. Wang W, Lu D (2019) USTC-TFC2016. https://github.com/yungshenglu/USTC-TFC2016/. Accessed 5 June 2020

  42. He Kaiming, Zhang Xiangyu, Ren Shaoqing, Sun Jian (2015) Spatial pyramid pooling in deep convolutional networks for visual recognition. IEEE Trans Pattern Anal Mach Intell 37(9):1904–1916

    Article  Google Scholar 

  43. Draper-Gil G, Lashkari AH, Mamun MSI, Ghorbani AA (2019) UNB VPN-nonVPN dataset (ISCXVPN2016). https://www.unb.ca/cic/datasets/vpn.html/. Accessed 5 June 2020

  44. Casino F (2021) traffic analysis. https://github.com/francasino/traffic_analysis/. Accessed 5 June 2020

  45. Liu C, Cao Z, Xiong G, Gou G, Yiu S-M, He L (2018) Mampf: encrypted traffic classification based on multi-attribute Markov probability fingerprints. In: 26th IEEE/ACM international symposium on quality of service, IWQoS 2018, Banff, AB, Canada, June 4–6, 2018. IEEE, pp 1–10

  46. Aceto Giuseppe, Ciuonzo Domenico, Montieri Antonio, Pescapè Antonio (2019) Mobile encrypted traffic classification using deep learning: experimental evaluation, lessons learned, and challenges. IEEE Trans Netw Serv Manag 16(2):445–458

    Article  Google Scholar 

  47. Moore AW, Zuev D (2005) Internet traffic classification using Bayesian analysis techniques. In: Derek LE, Carey LW, Sem CB, John CSL (eds) Proceedings of the international conference on measurements and modeling of computer systems, SIGMETRICS 2005, June 6–10, 2005, Banff, Alberta, Canada. ACM, pp 50–60

  48. Draper-Gil G, Lashkari AH, Mamun MSI, Ghorbani AA (2016) Characterization of encrypted and VPN traffic using time-related features. In: Olivier C, Steven F, Paolo M (eds) Proceedings of the 2nd international conference on information systems security and privacy, ICISSP 2016, Rome, Italy, February 19–21, 2016. SciTePress, pp 407–414

  49. Xiong P, Cui B, Cheng Z (2020) Anomaly network traffic detection based on deep transfer learning. In: Leonard B, Aneta P-M, Hyunhee P (eds) Innovative mobile and internet services in ubiquitous computing—Proceedings of the 14th international conference on innovative mobile and internet services in ubiquitous computing (IMIS-2020), Lodz, Poland, 1–3 July, 2020, volume 1195 of Advances in intelligent systems and computing. Springer, pp 384–393

  50. He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: 2016 IEEE conference on computer vision and pattern recognition, CVPR 2016, Las Vegas, NV, USA, June 27–30, 2016. IEEE Computer Society, pp 770–778

Download references

Acknowledgements

The authors would like to thank the anonymous reviewers for their valuable comments which helped them to improve the content, organization, and presentation of this paper.

Funding

This research was supported by National Key Research and Development Program (2018YFE0206800) and the Soonchunyhang University Research Fund.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ilsun You.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Guan, J., Cai, J., Bai, H. et al. Deep transfer learning-based network traffic classification for scarce dataset in 5G IoT systems. Int. J. Mach. Learn. & Cyber. 12, 3351–3365 (2021). https://doi.org/10.1007/s13042-021-01415-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s13042-021-01415-4

Keywords

Navigation