Network traffic classification: Techniques, datasets, and challenges

被引:46
作者
Azab, Ahmad [1 ]
Khasawneh, Mahmoud [2 ]
Alrabaee, Saed [3 ]
Choo, Kim-Kwang Raymond [4 ]
Sarsour, Maysa [5 ]
机构
[1] Victorian Inst Technol, Coll Informat Technol & Syst, Attwood, Australia
[2] Al Ain Univ, Coll Engn, Abu Dhabi, U Arab Emirates
[3] United Arab Emirates Univ, Coll IT, Informat Syst & Secur, Al Ain 15551, U Arab Emirates
[4] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78285 USA
[5] Univ New South Wales, Sch Photovolta & Renewable Energy Engn, Sydney, NSW 2052, Australia
关键词
Network classification; Machine learning; Deep learning; Deep packet inspection; Traffic monitoring; FEATURE-SELECTION; INTERNET; DEEP; IDENTIFICATION;
D O I
10.1016/j.dcan.2022.09.009
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In network traffic classification, it is important to understand the correlation between network traffic and its causal application, protocol, or service group, for example, in facilitating lawful interception, ensuring the quality of service, preventing application choke points, and facilitating malicious behavior identification. In this paper, we review existing network classification techniques, such as port-based identification and those based on deep packet inspection, statistical features in conjunction with machine learning, and deep learning algorithms. We also explain the implementations, advantages, and limitations associated with these techniques. Our review also extends to publicly available datasets used in the literature. Finally, we discuss existing and emerging challenges, as well as future research directions.
引用
收藏
页码:676 / 692
页数:17
相关论文
共 128 条
[31]  
Branch P, 2012, C LOCAL COMPUT NETW, P85, DOI 10.1109/LCN.2012.6423690
[32]   Random forests [J].
Breiman, L .
MACHINE LEARNING, 2001, 45 (01) :5-32
[33]   Encrypted Network Traffic Classification Using Deep and Parallel Network-in-Network Models [J].
Bu, Zhiyong ;
Zhou, Bin ;
Cheng, Pengyu ;
Zhang, Kecheng ;
Ling, Zhen-Hua .
IEEE ACCESS, 2020, 8 :132950-132959
[34]  
Bujlow T., 2012, 2012 International Conference on Computing, Networking and Communications (ICNC), P237, DOI 10.1109/ICCNC.2012.6167418
[35]  
Burschka S, 2016, PROCEEDINGS OF 2016 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (SSCI)
[36]   An Improved Network Traffic Classification Model Based on a Support Vector Machine [J].
Cao, Jie ;
Wang, Da ;
Qu, Zhaoyang ;
Sun, Hongyu ;
Li, Bin ;
Chen, Chin-Ling .
SYMMETRY-BASEL, 2020, 12 (02)
[37]   Towards Evaluating the Robustness of Neural Networks [J].
Carlini, Nicholas ;
Wagner, David .
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, :39-57
[38]   Applied Comparative Evaluation of the Metasploit Evasion Module [J].
Casey, Peter ;
Topor, Mateusz ;
Hennessy, Emily ;
Alrabaee, Saed ;
Aloqaily, Moayad ;
Boukerche, Azzedine .
2019 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2019, :946-951
[39]  
Chen ZT, 2017, IEEE INT CONF BIG DA, P1271, DOI 10.1109/BigData.2017.8258054
[40]  
Chengjie Gu, 2011, Journal of Software, V6, P1009, DOI 10.4304/jsw.6.6.1009-1016