Data Transformation Schemes for CNN-Based Network Traffic Analysis: A Survey

被引:30
作者
Krupski, Jacek [1 ]
Graniszewski, Waldemar [1 ]
Iwanowski, Marcin [1 ]
机构
[1] Warsaw Univ Technol, Inst Control & Ind Elect, Ul Koszykowa 75, PL-00662 Warsaw, Poland
关键词
network traffic analysis; convolutional neural networks; machine learning; network traffic images; visualization of traffic; DEEP NEURAL-NETWORKS; CLASSIFICATION; INTERNET; FRAMEWORK; ATTACKS;
D O I
10.3390/electronics10162042
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The enormous growth of services and data transmitted over the internet, the bloodstream of modern civilization, has caused a remarkable increase in cyber attack threats. This fact has forced the development of methods of preventing attacks. Among them, an important and constantly growing role is that of machine learning (ML) approaches. Convolutional neural networks (CNN) belong to the hottest ML techniques that have gained popularity, thanks to the rapid growth of computing power available. Thus, it is no wonder that these techniques have started to also be applied in the network traffic classification domain. This has resulted in a constant increase in the number of scientific papers describing various approaches to CNN-based traffic analysis. This paper is a survey of them, prepared with particular emphasis on a crucial but often disregarded aspect of this topic-the data transformation schemes. Their importance is a consequence of the fact that network traffic data and machine learning data have totally different structures. The former is a time series of values-consecutive bytes of the datastream. The latter, in turn, are one-, two- or even three-dimensional data samples of fixed lengths/sizes. In this paper, we introduce a taxonomy of data transformation schemes. Next, we use this categorization to describe various CNN-based analytical approaches found in the literature.
引用
收藏
页数:35
相关论文
共 138 条
[1]   Mobile Encrypted Traffic Classification Using Deep Learning: Experimental Evaluation, Lessons Learned, and Challenges [J].
Aceto, Giuseppe ;
Ciuonzo, Domenico ;
Montieri, Antonio ;
Pescape, Antonio .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2019, 16 (02) :445-458
[2]  
Aceto G, 2018, 2018 NETWORK TRAFFIC MEASUREMENT AND ANALYSIS CONFERENCE (TMA)
[3]  
Akbari I., 2019, PRIVPKT PRIVACY PRES
[4]   Android Malware Family Classification and Analysis: Current Status and Future Directions [J].
Alswaina, Fahad ;
Elleithy, Khaled .
ELECTRONICS, 2020, 9 (06) :1-20
[5]  
[Anonymous], 2017, ACM, DOI DOI 10.1145/3065386
[6]   Malware traffic classification using principal component analysis and artificial neural network for extreme surveillance [J].
Arivudainambi, D. ;
Kumar, Varun K. A. ;
Chakkaravarthy, Sibi S. ;
Visu, P. .
COMPUTER COMMUNICATIONS, 2019, 147 :50-57
[7]   A Review of Intrusion Detection Systems Using Machine and Deep Learning in Internet of Things: Challenges, Solutions and Future Directions [J].
Asharf, Javedz ;
Moustafa, Nour ;
Khurshid, Hasnat ;
Debie, Essam ;
Haider, Waqas ;
Wahab, Abdul .
ELECTRONICS, 2020, 9 (07)
[8]   Monitoring Real Time Security Attacks for IoT Systems Using DevSecOps: A Systematic Literature Review [J].
Bahaa, Ahmed ;
Abdelaziz, Ahmed ;
Sayed, Abdalla ;
Elfangary, Laila ;
Fahmy, Hanan .
INFORMATION, 2021, 12 (04)
[9]   The beginnings of packet switching: Some underlying concepts [J].
Baran, P .
IEEE COMMUNICATIONS MAGAZINE, 2002, 40 (07) :42-48
[10]   A comprehensive survey on machine learning for networking: evolution, applications and research opportunities [J].
Boutaba, Raouf ;
Salahuddin, Mohammad A. ;
Limam, Noura ;
Ayoubi, Sara ;
Shahriar, Nashid ;
Estrada-Solano, Felipe ;
Caicedo, Oscar M. .
JOURNAL OF INTERNET SERVICES AND APPLICATIONS, 2018, 9 (09)