Deep transfer learning-based network traffic classification for scarce dataset in 5G IoT systems

被引:31
作者
Guan, Jianfeng [1 ]
Cai, Junxian [1 ]
Bai, Haozhe [1 ]
You, Ilsun [2 ]
机构
[1] Beijing Univ Posts & Telecommun, Natl Pilot Software Engn Sch, Sch Comp Sci, Beijing 100876, Peoples R China
[2] Soonchunhyang Univ, Dept Informat Secur Engn, Asan, South Korea
关键词
Traffic classification; Deep learning; Transfer learning; Scarce dataset; INTRUSION DETECTION; SECURITY;
D O I
10.1007/s13042-021-01415-4
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Internet of Things (IoT) can provide the interconnection and data sharing among devices, vehicles, buildings via various sensors with the development of 5G, and it has been widely used in different services such as e-commerce, heath-care, smart buildings. In the meantime, various cyber-attacks for IoT have increased and caused huge losses. Lots of security mechanisms are rapidly being proposed to prevent the potentially malicious attackers for IoT, in which machine learning especially deep learning (DL) as increasingly popular solution for security has been implemented in intrusion detection system (IDS) and others. However, the lack of enough datasets prevents the application of IDS in 5G IoT system. As one of fundamental components of IDS, network traffic classification shows a discretization, individualization and fine-grained trend which derives the different personalized classification methods for different requirements and scenarios. In this case, the data-driven DL faces the following challenges. First, there are only a few labeled datasets in the various personalized application scenarios, which undoubtedly limits the deployment of DL classification. Second, not all scenarios have rich computing capability for that training a neural network requires lots of computing resources. Therefore, this paper proposes a traffic classification method based on deep transfer learning for 5G IoT scenarios with scarce labeled data and limited computing capability, and trains the classification model by weight transferring and neural network fine-tuning. Different from the previous work that extract artificially designed features, the proposed method retains the end-to-end learning performance of DL and reduces the risk of suffering conceptdrift to reduce human intervention. Experimental results show that when only 10% of dataset are used to label the data samples, the classification accuracy is close to the results of full training dataset.
引用
收藏
页码:3351 / 3365
页数:15
相关论文
共 51 条
[1]   Mobile Encrypted Traffic Classification Using Deep Learning: Experimental Evaluation, Lessons Learned, and Challenges [J].
Aceto, Giuseppe ;
Ciuonzo, Domenico ;
Montieri, Antonio ;
Pescape, Antonio .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2019, 16 (02) :445-458
[2]   A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security [J].
Al-Garadi, Mohammed Ali ;
Mohamed, Amr ;
Al-Ali, Abdulla Khalid ;
Du, Xiaojiang ;
Ali, Ihsan ;
Guizani, Mohsen .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (03) :1646-1685
[3]   Handling imbalanced data with concept drift by applying dynamic sampling and ensemble classification model [J].
Ancy, S. ;
Paulraj, D. .
COMPUTER COMMUNICATIONS, 2020, 153 :553-560
[4]  
[Anonymous], 2015, INSIDER BUSINESS
[5]  
Cai L, 2013, 2013 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING (GRC), P22, DOI 10.1109/GrC.2013.6740374
[6]  
Casino F, 2021, TRAFFIC ANAL
[7]   HEDGE: Efficient Traffic Classification of Encrypted and Compressed Packets [J].
Casino, Fran ;
Choo, Kim-Kwang Raymond ;
Patsakis, Constantinos .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (11) :2916-2926
[8]   Network Intrusion Detection for IoT Security Based on Learning Techniques [J].
Chaabouni, Nadia ;
Mosbah, Mohamed ;
Zemmari, Akka ;
Sauvignac, Cyrille ;
Faruki, Parvez .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (03) :2671-2701
[9]   A survey on feature selection methods [J].
Chandrashekar, Girish ;
Sahin, Ferat .
COMPUTERS & ELECTRICAL ENGINEERING, 2014, 40 (01) :16-28
[10]  
Chang Liu, 2019, IEEE INFOCOM 2019 - IEEE Conference on Computer Communications, P1171, DOI 10.1109/INFOCOM.2019.8737507