Flow Transformer: A Novel Anonymity Network Traffic Classifier with Attention Mechanism

被引:10
作者
Zhao, Ruijie [1 ]
Huang, Yiteng [1 ]
Deng, Xianwen [1 ]
Xue, Zhi [1 ]
Li, Jiabin [1 ]
Huang, Zijing [2 ]
Wang, Yijun [1 ]
机构
[1] Shanghai Jiao Tong Univ, Sch Elect Informat & Elect Engn, Shanghai, Peoples R China
[2] Fudan Univ, Sch Comp Sci, Shanghai, Peoples R China
来源
2021 17TH INTERNATIONAL CONFERENCE ON MOBILITY, SENSING AND NETWORKING (MSN 2021) | 2021年
关键词
Anonymity network; traffic classification; deep learning; transformer; attention mechanism;
D O I
10.1109/MSN53354.2021.00045
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Supervising anonymity network is a critical issue in the field of network security, and traditional traffic analysis methods cannot cope with complex anonymity traffic. In recent years, the traffic analysis method based on deep learning has achieved good performance. However, most of the existing studies do not consider the temporal-spatial correlation of the traffic, and only use a single flow for classification. A few works take continuous flows as flow sequence for traffic classification, but they do not distinguish the different importance of each flow. To tackle this issue, we propose a novel flow-based traffic classifier called FLOW TRANSFORMER to classify anonymity network traffic. FLOW TRANSFORMER uses multi-head attention mechanism to set higher weights for important flows, and extracts flow sequence features according to the importance weights. Besides, the RF-based feature selection method is designed to select the optimal feature combination, which can effectively avoid the insignificant features from reducing the performance and efficiency of the classifier. Experimental results on two real-world traffic datasets demonstrate that the proposed method outperforms state-of-the-art methods with a large margin.
引用
收藏
页码:223 / 230
页数:8
相关论文
共 22 条
[1]   Independent comparison of popular DPI tools for traffic classification [J].
Bujlow, Tomasz ;
Carela-Espanol, Valentin ;
Barlet-Ros, Pere .
COMPUTER NETWORKS, 2015, 76 :75-89
[2]   Length Matters: Fast Internet Encrypted Traffic Service Classification based on Multi-PDU Lengths [J].
Chen, Zihan ;
Cheng, Guang ;
Jiang, Bomiao ;
Tang, Shuye ;
Guo, Shuyi ;
Zhou, Yuyang .
2020 16TH INTERNATIONAL CONFERENCE ON MOBILITY, SENSING AND NETWORKING (MSN 2020), 2020, :531-538
[3]  
Cuzzocrea A, 2017, IEEE INT CONF BIG DA, P4474, DOI 10.1109/BigData.2017.8258487
[4]  
Devlin J, 2019, 2019 CONFERENCE OF THE NORTH AMERICAN CHAPTER OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS: HUMAN LANGUAGE TECHNOLOGIES (NAACL HLT 2019), VOL. 1, P4171
[5]  
Dosovitskiy Alexey, 2021, 9 INT C LEARN REPR I
[6]  
Hodo E., 2017, 12 INT C AV REL SEC, P1
[7]   Characterization of Tor Traffic using Time based Features [J].
Lashkari, Arash Habibi ;
Gil, Gerard Draper ;
Mamun, Mohammad Saiful Islam ;
Ghorbani, Ali A. .
ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, :253-262
[8]  
Likun Liu, 2019, Smart Computing and Communication. 4th International Conference, SmartCom 2019. Proceedings. Lecture Notes in Computer Science (LNCS 11910), P105, DOI 10.1007/978-3-030-34139-8_11
[9]   Time-related Network Intrusion Detection Model: A Deep Learning Method [J].
Lin, Yun ;
Wang, Jie ;
Tu, Ya ;
Chen, Lei ;
Dou, Zheng .
2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
[10]   Deep packet: a novel approach for encrypted traffic classification using deep learning [J].
Lotfollahi, Mohammad ;
Siavoshani, Mahdi Jafari ;
Zade, Ramin Shirali Hossein ;
Saberian, Mohammdsadegh .
SOFT COMPUTING, 2020, 24 (03) :1999-2012