Review
The rise of traffic classification in IoT networks: A survey

https://doi.org/10.1016/j.jnca.2020.102538Get rights and content

Abstract

With the proliferation of the Internet of Things (IoT), the integration and communication of various objects have become a prevalent practice. The huge growth of IoT devices and different characteristics in the IoT traffic patterns have brought attention to traffic classification methods to address various raised issues in IoT applications. While network traffic classification has been well discussed in a number of surveys and review papers, it is still immature in IoT due to the differences in traffic characteristics in IoT and Non-IoT devices. This survey looks at the emerging trends of network traffic classification in IoT and the utilization of traffic classification in its applications. It also compares the legacy of traffic classification methods and presents an overview of traditional models. This paper extends the discussion with a taxonomy of the current network traffic classification within the IoT context. We then expose commercial and real-world use cases of the IoT traffic classification and finally outline open research issues and challenges in this domain.

Introduction

The notion of the Internet-of-Things (IoT) is envisioned to improve the quality of modern life. IoT solutions have significantly changed various perspectives of today's life in many forms through different standards. It has engaged various fields including industry, healthcare, homes, automotive, sport, entertainment, and many others (Ammar et al., 2018). This is obtained via the large-scale deployment of Sensor Nodes (SN) or smart devices with the ability of sensing and reporting. However, this engagement raises serious issues since a lot of traffic needs to get through the network. As such, different classes of network traffic; for example, those generated from voice, financial transaction, driverless cars, SNs, and others are critical for their counterpart sectors and need to get through quickly or be filtered due to security concerns. As such, the requirements for various applications in IoT are rapidly being increased that result in the demand for more accurate classification of network traffic.

Network traffic classification has been a topic of interest from the early stage of the Internet (Finsterbusch et al., 2014). It began by presenting port-based approaches by which the network traffic is classified based on the used ports, to the sophisticated statistical and behavioral approaches where the network traffic is deeply analysed in a fine-grained manner by employing machine/deep learning approaches. Due to the strength of classification of network traffic as the first step to identify and classify unknown network classes, it has been the main interest of Internet Service Providers (ISP) in order to manage the overall performance of their network (Shafiq et al., 2016). However, one of the most primary aspects of the Internet that specifically benefits from the traffic classification of network, is security. This is because the security policies can be enforced after analysing the network traffic (i.e. filtering or blocking) (Al Khater and Overill, 2015). Due to the importance of security and privacy for different parties (i.e. providers and end-users), network traffic classification has received the most attentions in IoT. However, besides security aspects, classification of network traffic offers many solutions for other domains such as wireless communication, healthcare, and smart home.

Although the majority of efforts in network traffic classification have been published in IP networks, it has recently been discussed in a broader domain that provides solutions to address various angles of the Internet of Things (IoT). This broadness is due to the wide integration of various objects such as sensors and nodes that engage IoT to deal with numerous issues. Motivated by the fact that IoT traffic is different from other types of network traffic that follows a stable pattern and a predictable network behavior (Shahid et al., 2018), we present a comprehensive review of the existing issues and solutions in IoT that have been addressed by network traffic classification.

Over the last decade, there are plenty of survey papers that have been conducted for reviewing the existing solutions and applications for IoT. There are also a number of review papers that identify new challenges from different perspectives. For example (Atzori et al., 2010), presents a comprehensive survey of the Internet of Things paradigm and enabling technologies followed by an analysis of the major research issues on IoT (Al-Fuqaha et al., 2015). surveys relevant protocols and application issues in IoT. It also discusses recent technologies such as big data analytics and cloud and fog computing related to IoT. Security threats and vulnerabilities in IoT were reviewed by (Alaba et al., 2017). It was followed by proposing a taxonomy of the current security threats in the contexts of application, architecture, and communication in IoT. Besides IoT, several attempts were conducted to review network traffic classification issues and challenges. For instance (Gomes et al., 2013), provides a review of the literature on the classification and detection solutions in peer-to-peer traffic. It also provides a detailed analysis of network traffic monitoring techniques. Another traffic classification review with the focus on payload approach was published in (Velan et al., 2015) proposing a taxonomy by reviewing the literature on classification methods based on packet payload and feature from encrypted traffics (Pacheco et al., 2018). presents a systematic survey of machine learning solutions in network traffic classification at the IP level, followed by a discussion of a set of challenges, issues, and directions. The paper also presents an overview of the studies that aimed to improve the QoS at the operator network level.

However, despite the profound views in IoT and network traffic classification in the existing surveys, no published work has shown the importance of traffic classification in IoT. In this paper, the main focus is dedicated to the traffic features of IoT devices and different patterns such as machine type communication (MTC) and Human type Communication (HTC). This is because, IoT generates traffic different from traffic generated by other individual devices, such as smartphones, routers or tablets (Shafiq et al., 2013). Besides, traffic of the IoT network follows a stable pattern and the generated network traffic being very predictable which is different from the traffic in ISPs (Shahid et al., 2018). Although these facts have triggered most of the recent works to offer various solutions in IoT traffic classification, no survey paper has been conducted to review classification techniques for IoT network traffic. Thus, in this paper, we provide a generic view of the published works pertaining to different solutions that have been addressed by network traffic classification in IoT. This paper aims to shed light on the roadmap of the IoT network traffic classification. It also proposes possible future directions by providing a comprehensive review of the state-of-the-art network traffic classification in various fields of IoT in terms of application deployments, such as smart environment, and the healthcare system. We also investigate security aspects, in particular; authentication, device recognition/identification, and anomaly detection. The main goal of this paper is to expose different issues raised in IoT that have been addressed with traffic classification.

The main contributions of this paper are as follows:

  • We provide a comprehensive review of the network traffic classification methods in the IoT environment. To the best of our knowledge, this attempt is one of the first survey papers that focus solely on the classification of IoT network traffic.

  • We explain the differences between network traffic in ordinary networks and IoT followed by its driven traffic known as MTC.

  • We introduce the enabling technologies by classifying the existing literature and devising a taxonomy of current network traffic classification within the IoT context.

  • We outline applications of Traffic classification in IoT by reviewing real-world use cases and products.

  • Finally, we highlight several important research issues and challenges from both the theoretical and practical viewpoints.

The remainder of this paper is organized as follows. Section 2 justifies motivation for IoT traffic classification and its characteristics. Section 3 draws an overview of the traffic classification in ordinary networks and a roadmap to IoT-based traffic classification. The section is followed by providing IoT application features and the difference between IoT traffic features and traffic in the conventional network. Section 4 describes the threats and vulnerabilities identified by IoT traffic and the importance of IoT traffic classification in vulnerability identification. Section 5 provides a comprehensive taxonomy of existing issues and solutions in IoT traffic classification and patterns. Section 6 describes the real-world use cases and commercial products. Section 7 illustrates the available datasets being used for IoT studies. Section 8 offers open issues, challenges, and future directions. Finally, Section 9 concludes the study.

Section snippets

Motivation (IoT traffic pattern)

IoT consists of numerous connected devices. It offers benefits for various specific sectors; from people-centric solutions to healthcare systems where it addresses the needs of patients (Domingo, 2012) to safety-centric resolution for minimizing dangers using automatic emergency notification and disaster recovery situations (Coppola and Morisio, 2016; Neshenko et al., 2019). Also, the notion of the Internet of things can be inferred from the functionalities of Sensor Nodes (SN) to serve a

Overview of network traffic classification

Network traffic classification is an essential prerequisite for various network applications such as security, monitoring, accounting etc. It is also important for long-term provisioning of the resources in a network by predicting future demands based on analysing the network traffic. In addition, many network services such as firewalls, intrusion detection systems, status reports, and Quality of Service systems benefit from a successful classification of network traffic.

The concept of network

IoT traffic threats and vulnerabilities

Due to the several important metrics (i.e. scale, diversity of data flows, and attack's traffic), data traffic in IoT is reported to be more complex in comparison with other scenarios (Yao et al., 2019). (i) scale: due to the existence of a high number of users and devices in IoT, the scale of generated data traffic is much larger, (ii) data flows: there are a wide variety of available services that cause the scale of generated traffic flows grow much larger, (iii) attacks: more complicated

Taxonomy of existing solutions in IoT traffic classification and patterns

Due to the major differences between the traffic features of IoT devices and the traffic generated by other devices, various angles of IoT traffic classification along with different solutions have recently been proposed. In this section, we expose various perspectives of IoT that have been addressed by using traffic classification techniques. We reviewed studies in IoT that have applied a specific or a general IoT data sources (i.e. testbed, device, and dataset) on their methodologies. This

Real-world use cases and commercial/open-source products

This section aims to provide the applications of traffic classification for IoT. We refer to the applications of IoT traffic classification to the available real-world use cases and products. It outlines several commercial/open source and free cybersecurity solutions available today for IoT use. Despite the wide usage of traffic classification solutions, current products mainly address the security perspective of IoT. The current products are mostly developed for professional use and may not

Available datasets for IoT

The effectiveness and reliability of researches are evaluated based on their performance. For example, in the case of an IDS, the effectiveness is evaluated by the detection of attacks. This evaluation requires a comprehensive dataset that contains normal and abnormal behaviours. As such, the quality of the dataset plays a big role in the development phase as well as in the implementation phase. As the network behaviours and patterns change, a perfect dataset could provide an effective model to

Challenges and open issues

Recently, IoT traffic classification has been targeted by the academic community due to its capabilities to analyse and infer the network traffic. However, because this field of research is still in the early stage, it will encounter several challenges and open research issues. The concept of traffic classification is identical in IoT and Non-IoT domains by which network traffic is analysed for different purposes. To date, there are a number of published works such as (Al Khater and Overill,

Conclusion

This paper surveyed recent works in the field of traffic classification in the IoT domain. With the emergence of the IoT concept, various types of devices are being connected to each other. IoT devices compromise a wide range of diversities in types including portable, static, implantable, wearable devices etc. Motivated by the rise of new traffic patterns and the diversity in MTM/HTC characteristics, it is understood that IoT traffic nature is dissimilar to the conventional network traffic.

Acknowledgment

This work was supported by the University Malaya Faculty Research Grants (GPF006D-2018) and Fundamental Research Grant Scheme under the Ministry of Education Malaysia (FRGS/1/2018/ICT03/UM/02/3).

Hamid Tahaei received his Ph.D. in Computer Science with major specialization in Network Security from University of Malaya, Malaysia. He obtained an M.Sc. degree in Computer Science, from University of Technology Malaysia, Johor, Malaysia in 2013. He is currently a postdoctoral research fellow at the faculty of Computer Science and Information Technology, University of Malaya, Malaysia. His research interests include internet of things, network traffic classification, software-defined

References (159)

  • N. Al Khater et al.

    Network traffic classification techniques and challenges

  • A. Al-Fuqaha et al.

    Internet of things: a survey on enabling technologies, protocols, and applications

    IEEE communications surveys & tutorials

    (2015)
  • H. Alaiz-Moreton et al.

    Multiclass classification procedure for detecting attacks on MQTT-IoT protocol

    Complexity

    (2019)
  • H. Alaiz-Moreton et al.

    Multiclass Classification Procedure for Detecting Attacks on MQTT-IoT Protocol

    (2019)
  • S. Alexander et al.

    DHCP options and BOOTP vendor extensions

    (1997)
  • M.S. Ali et al.

    LTE/LTE-A random access for massive machine-type communications in smart cities

    IEEE Commun. Mag.

    (2017)
  • M.A. Alsheikh et al.

    Machine learning in wireless sensor networks: Algorithms, strategies, and applications

    IEEE Communications Surveys & Tutorials

    (2014)
  • M. Antonakakis et al.

    Understanding the mirai botnet

  • Y. Ashibani et al.

    A user authentication model for IoT networks based on app traffic patterns

  • Awid

    Awid dataset - wireless security datasets project

  • L. Bai et al.

    Automatic device classification from network traffic streams of internet of things

  • V. Balasubramanian et al.

    Conformal Prediction for Reliable Machine Learning: Theory, Adaptations and Applications

    (2014)
  • S. Behnke
    (2003)
  • X.J. Bellekens et al.

    A highly-efficient memory-compression scheme for GPU-accelerated intrusion detection systems

  • E. Bertino et al.

    Botnets and internet of things security

    Computer

    (2017)
  • T. Bhatia. (2011). OpenDPI. Available:...
  • M.H. Bhuyan et al.

    Network anomaly detection: methods, systems and tools

    IEEE Communications Surveys & Tutorials

    (2013)
  • M.H. Bhuyan et al.

    Towards generating real-life datasets for network intrusion detection

    IJ Network Security

    (2015)
  • Bitdefender. Bitdefender box hub. Available:...
  • A.L. Buczak et al.

    A survey of data mining and machine learning methods for cyber security intrusion detection

    IEEE Communications Surveys & Tutorials

    (2015)
  • The Stratosphere IPS Project Dataset

    (2016)
  • CAIDA

    The Cooperative Analysis for Internet Data Analysis

    (2011)
  • J.J.B.I. Camhi

    Former Cisco CEO John Chambers predicts 500 billion connected devices by 2025

    (2015)
  • O. Can et al.

    An intrusion detection system based on neural network

  • C. Cerrudo

    An emerging US (and world) threat: cities wide open to cyber attacks

    Securing Smart Cities

    (2015)
  • V. Cisco

    Cisco visual networking index: forecast and trends, 2017–2022

    White Paper

    (2018)
  • L. Columbus

    Roundup of Internet of Things Forecasts and Market Estimates, 2016

    (2016)
  • R. Coppola et al.

    Connected car: technologies, issues, future trends," ACM Computing Surveys (CSUR),

    (2016)
  • M. Corporation. Common vulnerabilities and exposures [Online]. Available:...
  • CUJO. CUJOAI. Available:...
  • I. Cvitić et al.

    Smart home IoT traffic characteristics as a basis for DDoS traffic detection

  • A. Dainotti et al.

    Issues and future directions in traffic classification

    IEEE network

    (2012)
  • G. De La Torre et al.

    Implementation of deep packet inspection in smart grids and industrial Internet of Things: challenges and opportunities

    J. Netw. Comput. Appl.

    (2019)
  • S. Di Domenico et al.

    Classification of heterogenous M2M/IoT traffic based on C-plane and U-plane data

  • DOJO. DOJO. Available:...
  • F-Secure. F-secure sense. Available:...
  • E. Fernandes et al.

    Security analysis of emerging smart home applications

  • M. Finsterbusch et al.

    A survey of payload-based traffic classification approaches

    IEEE Communications Surveys & Tutorials

    (2014)
  • G. Fortino et al.

    Agent-oriented cooperative smart objects: from IoT system design to implementation

    IEEE Transactions on Systems, Man, and Cybernetics: Systems

    (2017)
  • L. Franceschi-Bicchierai

    Internet of things teddy bear leaked 2 million parent and kids message recordings

    Motherboard

    (2017)
  • Cited by (177)

    View all citing articles on Scopus

    Hamid Tahaei received his Ph.D. in Computer Science with major specialization in Network Security from University of Malaya, Malaysia. He obtained an M.Sc. degree in Computer Science, from University of Technology Malaysia, Johor, Malaysia in 2013. He is currently a postdoctoral research fellow at the faculty of Computer Science and Information Technology, University of Malaya, Malaysia. His research interests include internet of things, network traffic classification, software-defined networking, and cloud computing.

    Firdaus Afifi received bachelor's and master's degree in computer science from the University of Malaya, Malaysia, in 2015 and 2017 respectively. He is currently a PhD student at the Security Research Group, Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur. He has published a number of journal papers internationally. His research interests include information security, data sciences and internet of things.

    Adeleh Asemi is currently working as a visiting Research Fellow at Department of Software Engineering, University of Malaya. She received her Ph.D. and MSc degree in Computer Science (Artificial Intelligence) in 2014 from Faculty of Computer Science & Information Technology at University of Malaya and 2008 from Department of Computer Science at University of Pune, respectively. Her research lies at the intersection of soft computing, operational research, and decision analysis.

    Faiz Zaki is currently a doctoral researcher at the Network Analytics Lab, University of Malaya. He received his MSc. Web Science and Big Data Analytics from the University College of London. He is also a member of ACM, IEEE Computer Society and IEEE Young Professionals. His research interests reside in the area of network traffic classification, network security and data science.

    Nor Badrul Anuar obtained his Ph.D. in Information Security from Centre for Security, Communications and Network Research (CSCAN), Plymouth University, UK in 2012 and Master of Computer Science from the University of Malaya, Malaysia in 2003. He is an Associate Professor at the Faculty of Computer Science and Information Technology in University of Malaya, Kuala Lumpur. He has published a number of conference and journal papers locally and internationally. His research interests include information security (i.e. intrusion detection systems), data sciences, artificial intelligence, and library information systems.

    View full text