Network traffic classification: Techniques, datasets, and challenges

被引:46
作者
Azab, Ahmad [1 ]
Khasawneh, Mahmoud [2 ]
Alrabaee, Saed [3 ]
Choo, Kim-Kwang Raymond [4 ]
Sarsour, Maysa [5 ]
机构
[1] Victorian Inst Technol, Coll Informat Technol & Syst, Attwood, Australia
[2] Al Ain Univ, Coll Engn, Abu Dhabi, U Arab Emirates
[3] United Arab Emirates Univ, Coll IT, Informat Syst & Secur, Al Ain 15551, U Arab Emirates
[4] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78285 USA
[5] Univ New South Wales, Sch Photovolta & Renewable Energy Engn, Sydney, NSW 2052, Australia
关键词
Network classification; Machine learning; Deep learning; Deep packet inspection; Traffic monitoring; FEATURE-SELECTION; INTERNET; DEEP; IDENTIFICATION;
D O I
10.1016/j.dcan.2022.09.009
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In network traffic classification, it is important to understand the correlation between network traffic and its causal application, protocol, or service group, for example, in facilitating lawful interception, ensuring the quality of service, preventing application choke points, and facilitating malicious behavior identification. In this paper, we review existing network classification techniques, such as port-based identification and those based on deep packet inspection, statistical features in conjunction with machine learning, and deep learning algorithms. We also explain the implementations, advantages, and limitations associated with these techniques. Our review also extends to publicly available datasets used in the literature. Finally, we discuss existing and emerging challenges, as well as future research directions.
引用
收藏
页码:676 / 692
页数:17
相关论文
共 128 条
[111]   Datanet: Deep learning Based Encrypted Network Traffic Classification in SDN Home Gateway [J].
Wang, Pan ;
Ye, Feng ;
Chen, Xuejiao ;
Qian, Yi .
IEEE ACCESS, 2018, 6 :55380-55391
[112]   Benchmark Data for Mobile App Traffic Research [J].
Wang, Ruoyu ;
Liu, Zhen ;
Cai, Yongming ;
Tang, Deyu ;
Yang, Jin ;
Yang, Zhao .
PROCEEDINGS OF THE 15TH EAI INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING AND SERVICES (MOBIQUITOUS 2018), 2018, :402-411
[113]  
Wang W, 2017, 2017 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), P43, DOI 10.1109/ISI.2017.8004872
[114]  
Wang W, 2017, 2017 31ST INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), P712, DOI 10.1109/ICOIN.2017.7899588
[115]  
Wang X., 2011, 2011 IEEE INT C COMM, P1
[116]  
Wang Z., 2015, BlackHat USA, V24, P1
[117]  
Wangwei Ustc-tfc, 2016, About us
[118]  
Williams Nigel., 2006, EVALUATING MACHINE L
[119]  
Wiradinata Trianggoro, 2016, Journal of Advances in Computer Networks, V4, P24, DOI 10.18178/jacn.2016.4.1.198
[120]  
Witten Ian H, 2002, Data Mining: Practical Machine Learning Tools and Techniques, V31, P76, DOI [DOI 10.1145/507338.507355, DOI 10.1016/C2009-0-19715-5]