A Research of Network Applications Classification Based on Deep Learning

  • Hong Shao
  • Liujun Tang
  • Ligang DongEmail author
  • Long Chen
  • Xian Jiang
  • Weiming Wang
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 251)


Nowadays, the huge traffic generated by a growing number of network applications occupies enormous network bandwidth and increases the burden of network management. The ability to identify and categorize network applications accurately is crucial for learning network traffic conditions, finding people’s online behavior and accelerating the development of the Internet. The prior traffic classification methods often have unstable recognition rate and high computational complexity, which affects the network traffic management and application categories monitoring. Therefore, this paper proposes a method of using the deep learning technology to classify network applications. First, we propose a network application classification model based on Deep Belief Network (DBN). Then we construct a DBN-based model suitable for network applications classification with the Tensorflow framework. Finally, the classification performances of this DBN-based model and the BP-based model are compared on the real data sets. The experimental results show that the applications classification model based on DBN has higher classification accuracy for P2P applications.


Deep learning Deep belief network Network applications classification 



This work was supported by a grant from the Key Research and Development Program of Zhejiang (No. 2017C03058), Zhejiang Provincial Key Laboratory of New Network Standards and Technologies (NNST) (No. 2013E10012).


  1. 1.
    Xu, P., Lin, S.: A method to classify network traffic with the C4.5 decision tree. Chin. J. Comput. 20(10), 2692–2704 (2009)zbMATHGoogle Scholar
  2. 2.
    Yu, K., Jia, L., Chen, Y., et al.: The yesterday, today and tomorrow of deep learning. J. Comput. Res. Dev. 50(9), 1799–1804 (2013)Google Scholar
  3. 3.
    Hinton, G., Salakhutdinov, R.: Reducing the dimensionality of data with neural networks. Science 313(5786), 504–507 (2006)MathSciNetCrossRefGoogle Scholar
  4. 4.
  5. 5.
    Internet assigned numbers authority [EB/OL] (2008).
  6. 6.
    Lu, G., Zhang, H.L., Ye, L.: P2P traffic identification. J. Softw. 22(6), 1281–1298 (2011)CrossRefGoogle Scholar
  7. 7.
    Ruijuan, Z., Jing, C., Mingchuan, Z., et al.: User abnormal behavior analysis based on neural network clustering. J. China Univ. Posts Telecommun. 23(3), 29–44 (2016)CrossRefGoogle Scholar
  8. 8.
    Wang, D., Zhang, L., Yuan, Z., et al.: Characterizing application behaviors for classifying P2P traffic. In: International Conference on Computing, Networking and Communications, pp. 21–25. IEEE (2014)Google Scholar
  9. 9.
    Zuev, D., Moore, A.W.: Traffic classification using a statistical approach. In: Dovrolis, C. (ed.) PAM 2005. LNCS, vol. 3431, pp. 321–324. Springer, Heidelberg (2005). Scholar
  10. 10.
    Wang, X., Li, Y.: The Introduction and Improvement of EDA, p. 225. Xidian University Press, Xi’an (2005)Google Scholar
  11. 11.
    Le, Q.V.: Building high-level features using large scale unsupervised learning. IEEE (2013)Google Scholar
  12. 12.
    Oravec, M., Podhradsky, P.: Medical image compression by backpropagation neural network and discrete orthogonal transforms. WIT Trans. Biomed. Health 4 (1970)Google Scholar

Copyright information

© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2018

Authors and Affiliations

  • Hong Shao
    • 1
  • Liujun Tang
    • 1
  • Ligang Dong
    • 1
    Email author
  • Long Chen
    • 1
  • Xian Jiang
    • 1
  • Weiming Wang
    • 1
  1. 1.School of Information and Electronic EngineeringZhejiang Gongshang UniversityHangzhouChina

Personalised recommendations