Network traffic classification: Techniques, datasets, and challenges

被引:46
作者
Azab, Ahmad [1 ]
Khasawneh, Mahmoud [2 ]
Alrabaee, Saed [3 ]
Choo, Kim-Kwang Raymond [4 ]
Sarsour, Maysa [5 ]
机构
[1] Victorian Inst Technol, Coll Informat Technol & Syst, Attwood, Australia
[2] Al Ain Univ, Coll Engn, Abu Dhabi, U Arab Emirates
[3] United Arab Emirates Univ, Coll IT, Informat Syst & Secur, Al Ain 15551, U Arab Emirates
[4] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78285 USA
[5] Univ New South Wales, Sch Photovolta & Renewable Energy Engn, Sydney, NSW 2052, Australia
关键词
Network classification; Machine learning; Deep learning; Deep packet inspection; Traffic monitoring; FEATURE-SELECTION; INTERNET; DEEP; IDENTIFICATION;
D O I
10.1016/j.dcan.2022.09.009
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In network traffic classification, it is important to understand the correlation between network traffic and its causal application, protocol, or service group, for example, in facilitating lawful interception, ensuring the quality of service, preventing application choke points, and facilitating malicious behavior identification. In this paper, we review existing network classification techniques, such as port-based identification and those based on deep packet inspection, statistical features in conjunction with machine learning, and deep learning algorithms. We also explain the implementations, advantages, and limitations associated with these techniques. Our review also extends to publicly available datasets used in the literature. Finally, we discuss existing and emerging challenges, as well as future research directions.
引用
收藏
页码:676 / 692
页数:17
相关论文
共 128 条
[101]  
Szegedy Christian, 2014, 2 INT C LEARN REPR
[102]   The rise of traffic classification in IoT networks: A survey [J].
Tahaei, Hamid ;
Afifi, Firdaus ;
Asemi, Adeleh ;
Zaki, Faiz ;
Anuar, Nor Badrul .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 154 (154)
[103]  
The Canadian Institute for Cybersecurity, Vpn-nonvpn dataset (ISCXVPN2016).
[104]  
tools, Silk (system for internet-level knowledge)
[105]  
Unibs Unibs, Data sharing.
[106]   Black-box Adversarial Machine Learning Attack on Network Traffic Classification [J].
Usama, Muhammad ;
Qayyum, Adnan ;
Qadir, Junaid ;
Al-Fuqaha, Ala .
2019 15TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2019, :84-89
[107]  
Valenti Silvio, 2013, Data Traffic Monitoring and Analysis. From Measurement, Classification, and Anomaly Detection to Quality of Experience, P123, DOI 10.1007/978-3-642-36784-7_6
[108]  
Tong V, 2018, IEEE GLOB COMM CONF
[109]  
W.R. Group, Auckland ii.
[110]   A Survey of Techniques for Mobile Service Encrypted Traffic Classification Using Deep Learning [J].
Wang, Pan ;
Chen, Xuejiao ;
Ye, Feng ;
Sun, Zhixin .
IEEE ACCESS, 2019, 7 :54024-54033