skip to main content
10.1145/3579895.3579921acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicnccConference Proceedingsconference-collections
research-article

Traffic Classification Using an Efficient Lightweight Convolutional Network

Published: 04 April 2023 Publication History

Abstract

Traffic classification is playing a key role in network security domain with rapid growth of current Internet network, since traffic characterization is an important step for network management and network anomaly detection. Numerous researches have been done on this topic which have led to many different methods. Most of them use predefined features extracted by an expert to classify network traffic, which is costly and time consuming. In contrast, in the work, we propose a deep learning (DL) based approach, and it can automatically extract and select features through training, which has made DL-based method a highly desirable approach for traffic classification. Especially, inspired by the ConvNeXt, we believe that, compared with other DL-based method, 2D ConvNet can achieve a better performance by training techniques, while maintaining the simplicity and efficiency of standard ConvNets. Experimental results have verified this. After an initial pre-processing phase on data, the data are fed into DL framework to classify network traffic. Experiments have demonstrated that the proposed method enhanced the initial DL architecture (99.24% accuracy), and achieved accuracy of 99.47% in traffic categorization on UNB ISCX VPN-nonVPN dataset.

References

[1]
S. Kumar, S. Dharmapurikar, F. Yu, P. Crowley, and J. Turner, Algorithms to accelerate multiple regular expressions matching for deep packet inspection, ACM SIGCOMM Comput. Commun. Rev., vol. 36, no. 4, pp. 339–350, 2006.
[2]
Qi Y, Xu L, Yang B, Xue Y, Li J .Packet classification algorithms: From theory to practice. In: INFOCOM 2009, IEEE, pp 648–656
[3]
Y. Dhote, S. Agrawal. A Survey on Feature Selection Techniques for Internet Traffic Classification. in Computational Intelligence and Communication Networks, Jabalpur, 2015, pp. 1375-1380.
[4]
B. G. Atli, Y. Miche, A. Kalliola, I. Oliver, S. Holtmanns, and A. Lendasse, Anomaly-based intrusion detection using extreme learning machine and aggregation of network traffic statistics in probability space,’ Cogn. Comput., vol. 10, no. 5, pp. 848–863, 2018.
[5]
Krizhevsky, A., Sutskever, I., Hinton, G. E. (2012) Imagenet classification with deep convolutional neural networks. In: advances in Neural Information Processing Systems. Nevada. pp. 1097-1105.
[6]
W. Wang, M. Zhu, J. Wang, X. Zeng, and Z. Yang, ‘‘End-to-end encrypted traffic classification with one-dimensional convolution neural networks,’’ in Proc. IEEE Int. Conf. Intell. Secur. Inform. (ISI), Jul. 2017, pp. 43–48.
[7]
P. Wang, F. Ye, X. Chen, and Y. Qian, ‘Datanet: Deep learning based encrypted network traffic classification in sdn home gateway, IEEE Access, vol. 6, pp. 55380–55391, 2018.
[8]
Zhang, Xu, DC-YOLOv3: A novel efficient object detection algorithm. Journal of Physics: Conference Series 2082.1(2021):012012
[9]
Lotfollahi M, Zade R S H, Siavoshani M J, Deep Packet: A Novel Approach For Encrypted Traffic Classification Using Deep Learning[J]. Soft Computing, 2017.
[10]
Casino F, Choo K K R, Patsakis C . HEDGE: Efficient Traffic Classification of Encrypted and Compressed Packets[J]. Information Forensics and Security, IEEE Transactions on, 2019, 14(11):2916-2926.
[11]
Karen Simonyan and Andrew Zisserman. Two-stream convolutional networks for action recognition in videos. In NeurIPS, 2014
[12]
Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. Deep residual learning for image recognition. In CVPR, 2016.
[13]
Andrew G Howard, Menglong Zhu, Bo Chen, Dmitry Kalenichenko, Weijun Wang, Tobias Weyand, Marco Andreetto, and Hartwig Adam. MobileNets: Efficient convolutional neural networks for mobile vision applications. arXiv:1704.04861, 2017
[14]
Mingxing Tan and Quoc Le. Efficientnet: Rethinking model scaling for convolutional neural networks. In ICML, 2019.
[15]
Zhuang Liu, Hanzi Mao,Chao-Yuan Wu A ConvNet for the 2020s, In CVPR, 2022.
[16]
Ze Liu, Yutong Lin, Yue Cao, Han Hu, Yixuan Wei, Zheng Zhang, Stephen Lin, and Baining Guo. Swin transformer: Hierarchical vision transformer using shifted windows. 2021.
[17]
Gil GD, Lashkari AH, Mamun M, Ghorbani AA (2016) Characterization of encrypted and vpn traffic using time-related features. In: Proceedings of the 2nd International Conference on Information Systems Security and Privacy (ICISSP 2016), pp 407–414
[18]
Prechelt L (1998) Early stopping-but when? In: Neural Networks: Tricks of the trade, Springer, pp 55–69
[19]
Gao Huang, Zhuang Liu, Laurens van der Maaten, and Kilian Q Weinberger. Densely connected convolutional networks. In CVPR, 2017.
[20]
Christian Szegedy, Vincent Vanhoucke, Sergey Ioffe, Jonathon Shlens, and Zbigniew Wojna. Rethinking the inception architecture for computer vision. In CVPR, 2016

Index Terms

  1. Traffic Classification Using an Efficient Lightweight Convolutional Network
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Information & Contributors

          Information

          Published In

          cover image ACM Other conferences
          ICNCC '22: Proceedings of the 2022 11th International Conference on Networks, Communication and Computing
          December 2022
          365 pages
          ISBN:9781450398039
          DOI:10.1145/3579895
          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          Published: 04 April 2023

          Permissions

          Request permissions for this article.

          Check for updates

          Author Tags

          1. 2D convolutional networks
          2. deep learning (DL) based method
          3. training techniques

          Qualifiers

          • Research-article
          • Research
          • Refereed limited

          Conference

          ICNCC 2022

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • 0
            Total Citations
          • 43
            Total Downloads
          • Downloads (Last 12 months)22
          • Downloads (Last 6 weeks)4
          Reflects downloads up to 08 Mar 2025

          Other Metrics

          Citations

          View Options

          Login options

          View options

          PDF

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          HTML Format

          View this article in HTML Format.

          HTML Format

          Figures

          Tables

          Media

          Share

          Share

          Share this Publication link

          Share on social media