skip to main content
10.1145/3573942.3573983acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaiprConference Proceedingsconference-collections
research-article

A Novel Classification Method Based on Particle Swarm Optimization

Published: 16 May 2023 Publication History

Abstract

Because of the huge amount of traffic generated today, classifying different applications through traffic classification has become a difficult task. However, categorization of network traffic using machine learning suffers from a shortage of tagged traffic data and difficulty in feature selection, as is the case in many applications in the real world. Aiming at solving this problem, this paper proposes a method based on particle swarm optimization (PSO) to do feature selection, combined with machine learning for classification, and the accuracy of classification is used as the fitness of PSO. This experiment uses the ISCXVPN2016 public dataset for experimental study. In addition to the experimental accuracy of 97.71% when the PSO algorithm is used in combination with decision trees, the accuracy of the traditional support vector machines (SVM) algorithm increases by 27.96% when combined with PSO.

References

[1]
Y. Dhote, S. Agrawal, and A. J. Deen, "A Survey on Feature Selection Techniques for Internet Traffic Classification." pp. 1375-1380.
[2]
M. Mazhar Rathore, A. Ahmad, A. Paul, and S. Rho, “Exploiting encrypted and tunneled multimedia calls in high-speed big data environment,” Multimedia Tools and Applications, vol. 77, no. 4, pp. 4959-4984, 2018/02/01, 2018.
[3]
P. Velan, M. Čermák, P. Čeleda, and M. Drašar, “A survey of methods for encrypted traffic classification and analysis,” International Journal of Network Management, vol. 25, no. 5, pp. 355-374, 2015/09/01, 2015.
[4]
Y. Zeng, H. Gu, W. Wei, and Y. Guo, “$Deep-Full-Range$ : A Deep Learning Based Network Encrypted Traffic Classification and Intrusion Detection Framework,” IEEE Access, vol. 7, pp. 45182-45190, 2019.
[5]
B. G. Atli, Y. Miche, A. Kalliola, I. Oliver, S. Holtmanns, and A. Lendasse, “Anomaly-Based Intrusion Detection Using Extreme Learning Machine and Aggregation of Network Traffic Statistics in Probability Space,” Cognitive Computation, vol. 10, no. 5, pp. 848-863, 2018/10/01, 2018.
[6]
R. Yuan, Z. Li, X. Guan, and L. Xu, “An SVM-based machine learning method for accurate internet traffic classification,” Information Systems Frontiers, vol. 12, no. 2, pp. 149-156, 2010/04/01, 2010.
[7]
S. Rezaei, and X. Liu, “Deep Learning for Encrypted Traffic Classification: An Overview,” IEEE Communications Magazine, vol. 57, no. 5, pp. 76-81, 2019.
[8]
Z. Liu, R. Wang, N. Japkowicz, Y. Cai, D. Tang, and X. Cai, “Mobile app traffic flow feature extraction and selection for improving classification robustness,” Journal of Network and Computer Applications, vol. 125, pp. 190-208, 2019/01/01/, 2019.
[9]
B. Liu, and H. Tu, "An Application Traffic Classification Method Based on Semi-Supervised Clustering." pp. 1-4.
[10]
M. Finsterbusch, C. Richter, E. Rocha, J. Muller, and K. Hanssgen, “A Survey of Payload-Based Traffic Classification Approaches,” IEEE Communications Surveys & Tutorials, vol. 16, no. 2, pp. 1135-1156, 2014.
[11]
P. Choudhury, K. R. P. Kumar, S. Nandi, and G. Athithan, “An empirical approach towards characterization of encrypted and unencrypted VoIP traffic,” Multimedia Tools and Applications, vol. 79, no. 1, pp. 603-631, 2020/01/01, 2020.
[12]
S.-H. Yoon and M.-S. Kim, “Behavior Based Signature Extraction Method for Internet Application Traffic Identification,” The Journal of Korea Information and Communications Society, vol. 38B, no. 5. Korea Information and Communications Society, pp. 368–376, 31-May-2013.
[13]
N. Williams, S. Zander, and G. Armitage, “A preliminary performance comparison of five machine learning algorithms for practical IP traffic flow classification,” SIGCOMM Comput. Commun. Rev., vol. 36, no. 5, pp. 5–16, 2006.
[14]
Y.-D. Lin, C.-N. Lu, Y.-C. Lai, W.-H. Peng, and P.-C. Lin, “Application classification using packet size distribution and port association,” Journal of Network and Computer Applications, vol. 32, no. 5, pp. 1023-1030, 2009/09/01/, 2009.
[15]
T. T. T. Nguyen, and G. Armitage, “A survey of techniques for internet traffic classification using machine learning,” IEEE Communications Surveys & Tutorials, vol. 10, no. 4, pp. 56-76, 2008.

Index Terms

  1. A Novel Classification Method Based on Particle Swarm Optimization

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    AIPR '22: Proceedings of the 2022 5th International Conference on Artificial Intelligence and Pattern Recognition
    September 2022
    1221 pages
    ISBN:9781450396899
    DOI:10.1145/3573942
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 16 May 2023

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Encryption network traffic classification
    2. Feature selection
    3. Machine learning (ML)
    4. Particle swarm optimization (PSO)

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    AIPR 2022

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 20
      Total Downloads
    • Downloads (Last 12 months)5
    • Downloads (Last 6 weeks)2
    Reflects downloads up to 01 Mar 2025

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media