Data Transformation Schemes for CNN-Based Network Traffic Analysis: A Survey

被引:27
作者
Krupski, Jacek [1 ]
Graniszewski, Waldemar [1 ]
Iwanowski, Marcin [1 ]
机构
[1] Warsaw Univ Technol, Inst Control & Ind Elect, Ul Koszykowa 75, PL-00662 Warsaw, Poland
关键词
network traffic analysis; convolutional neural networks; machine learning; network traffic images; visualization of traffic; DEEP NEURAL-NETWORKS; CLASSIFICATION; INTERNET; FRAMEWORK; ATTACKS;
D O I
10.3390/electronics10162042
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The enormous growth of services and data transmitted over the internet, the bloodstream of modern civilization, has caused a remarkable increase in cyber attack threats. This fact has forced the development of methods of preventing attacks. Among them, an important and constantly growing role is that of machine learning (ML) approaches. Convolutional neural networks (CNN) belong to the hottest ML techniques that have gained popularity, thanks to the rapid growth of computing power available. Thus, it is no wonder that these techniques have started to also be applied in the network traffic classification domain. This has resulted in a constant increase in the number of scientific papers describing various approaches to CNN-based traffic analysis. This paper is a survey of them, prepared with particular emphasis on a crucial but often disregarded aspect of this topic-the data transformation schemes. Their importance is a consequence of the fact that network traffic data and machine learning data have totally different structures. The former is a time series of values-consecutive bytes of the datastream. The latter, in turn, are one-, two- or even three-dimensional data samples of fixed lengths/sizes. In this paper, we introduce a taxonomy of data transformation schemes. Next, we use this categorization to describe various CNN-based analytical approaches found in the literature.
引用
收藏
页数:35
相关论文
共 138 条
  • [1] Mobile Encrypted Traffic Classification Using Deep Learning: Experimental Evaluation, Lessons Learned, and Challenges
    Aceto, Giuseppe
    Ciuonzo, Domenico
    Montieri, Antonio
    Pescape, Antonio
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2019, 16 (02): : 445 - 458
  • [2] Aceto G, 2018, 2018 NETWORK TRAFFIC MEASUREMENT AND ANALYSIS CONFERENCE (TMA)
  • [3] Akbari I., 2019, PRIVPKT PRIVACY PRES
  • [4] Android Malware Family Classification and Analysis: Current Status and Future Directions
    Alswaina, Fahad
    Elleithy, Khaled
    [J]. ELECTRONICS, 2020, 9 (06) : 1 - 20
  • [5] [Anonymous], P 3 INT C LEARNING R
  • [6] [Anonymous], 2017, COMMUN ACM, DOI DOI 10.1145/3065386
  • [7] Malware traffic classification using principal component analysis and artificial neural network for extreme surveillance
    Arivudainambi, D.
    Kumar, Varun K. A.
    Chakkaravarthy, Sibi S.
    Visu, P.
    [J]. COMPUTER COMMUNICATIONS, 2019, 147 : 50 - 57
  • [8] A Review of Intrusion Detection Systems Using Machine and Deep Learning in Internet of Things: Challenges, Solutions and Future Directions
    Asharf, Javedz
    Moustafa, Nour
    Khurshid, Hasnat
    Debie, Essam
    Haider, Waqas
    Wahab, Abdul
    [J]. ELECTRONICS, 2020, 9 (07)
  • [9] Monitoring Real Time Security Attacks for IoT Systems Using DevSecOps: A Systematic Literature Review
    Bahaa, Ahmed
    Abdelaziz, Ahmed
    Sayed, Abdalla
    Elfangary, Laila
    Fahmy, Hanan
    [J]. INFORMATION, 2021, 12 (04)
  • [10] The beginnings of packet switching: Some underlying concepts
    Baran, P
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2002, 40 (07) : 42 - 48