Multi-Task Hierarchical Learning Based Network Traffic Analytics

被引:18
作者
Barut, Onur [1 ]
Luo, Yan [1 ]
Zhang, Tong [2 ]
Li, Weigang [2 ]
Li, Peilong [3 ]
机构
[1] Univ Massachusetts Lowell, Dept Elect & Comp Engn, Lowell, MA 01854 USA
[2] Intel Corp, Network Platforms Grp, Santa Clara, CA USA
[3] Elizabethtown Coll, Dept Comp Sci, Elizabethtown, PA 17022 USA
来源
IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2021) | 2021年
关键词
Network Traffic Analytics; Malware Detection; Multi-Task Learning; Hierarchical Labeling; Network Flow Features;
D O I
10.1109/ICC42927.2021.9500546
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Classifying network traffic is the basis for important network applications. Prior research in this area has faced challenges on the availability of representative datasets, and many of the results cannot be readily reproduced. Such a problem is exacerbated by emerging data-driven machine learning based approaches. To address this issue, we present (Net)(2) database with three open datasets containing nearly 1.3M labeled flows in total, with a comprehensive list of flow features, for the research community(1). We focus on broad aspects in network traffic analysis, including both malware detection and application classification. As we continue to grow them, we expect the datasets to serve as a common ground for AI driven, reproducible research on network flow analytics. We release the datasets publicly and also introduce a Multi-Task Hierarchical Learning (MTHL) model to perform all tasks in a single model. Our results show that MTHL is capable of accurately performing multiple tasks with hierarchical labeling with a dramatic reduction in training time.
引用
收藏
页数:6
相关论文
共 21 条
[1]   Performance Comparison of Support Vector Machine, Random Forest, and Extreme Learning Machine for Intrusion Detection [J].
Ahmad, Iftikhar ;
Basheri, Mohammad ;
Iqbal, Muhammad Javed ;
Rahim, Aneel .
IEEE ACCESS, 2018, 6 :33789-33795
[2]  
[Anonymous], 2001, SENSEVAL 01 P 2 INT
[3]  
[Anonymous], 2017, CHARACTERIZATION TOR, DOI DOI 10.5220/0006105602530262
[4]  
[Anonymous], 1999, KDD Cup 1999 Data
[5]  
[Anonymous], 2016, J ECONOMETRICS
[6]   Multitask LSTM Model for Human Activity Recognition and Intensity Estimation Using Wearable Sensor Data [J].
Barut, Onur ;
Zhou, Li ;
Luo, Yan .
IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (09) :8760-8768
[7]   Geospatial Object Detection Using Deep Networks [J].
Barut, Onur ;
Alatan, A. Aydin .
EARTH OBSERVING SYSTEMS XXIV, 2019, 11127
[8]   Analyzing Android Encrypted Network Traffic to Identify User Actions [J].
Conti, Mauro ;
Mancini, Luigi Vincenzo ;
Spolaor, Riccardo ;
Verde, Nino Vincenzo .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (01) :114-125
[9]  
Deng J, 2009, PROC CVPR IEEE, P248, DOI 10.1109/CVPRW.2009.5206848
[10]   Malicious Network Traffic Detection Based on Deep Neural Networks and Association Analysis [J].
Gao, Minghui ;
Ma, Li ;
Liu, Heng ;
Zhang, Zhijun ;
Ning, Zhiyan ;
Xu, Jian .
SENSORS, 2020, 20 (05)