Real-Time Multi-Application Network Traffic Identification Based on Machine Learning

  • Meihua Qiao
  • Yanqing Ma
  • Yijie Bian
  • Ju Liu
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9377)


In this paper, kinds of network applications are first analyzed, and some simple and effective features from the package headers of network flows are then generated by using the method of time window. What is more, three kinds of machine learning algorithms, which are support vector machine (SVM), back propagation (BP) neural network and BP neural network optimized by particle swarm optimization (PSO), are developed respectively for training and identification of network traffic. The experimental results show that traffic identification based on SVM can not only quickly generate classifier model, but also reach the accuracy of more than 98% under the condition of small sample. Moreover, the method proposed by this paper can measure and identify Internet traffic at any time and meet the needs of identifying real-time multi-application.


network traffic identification machine learning SVM BP neural network PSO 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Zhao, G., Ji, Z., Xu, C.: Survey of Techniques for Internet Traffic Identification. Journal of Chinese Computer Systems 31(8), 1514–1520 (2010) (in Chinese)Google Scholar
  2. 2.
    Schulzrinne, H., Casner, S., Frederick, R., et al.: RTP: A Transport Protocol for Real-Time Applications. RFC 1889, IETF (1996)Google Scholar
  3. 3.
    Madhukar, A., Williamson, C.: A longitudinal study of P2P traffic classification. In: Proc. of the 14th IEEE Int. Symp. on Modeling, Analysis and Simulation, pp. 179–188. IEEE Computer Society, Washington, DC (2006)CrossRefGoogle Scholar
  4. 4.
    Sen, S., Spatscheck, O., Wang, D.: Accurate, scalable in network identification of P2P traffic using application signatures. In: Proc. of 13th International Conference on World Wide Web (WWW), New York, NY, USA (May 2004)Google Scholar
  5. 5.
    Moore, A.W., Papagiannaki, K.: Toward the accurate identification of network applications. In: Dovrolis, C. (ed.) PAM 2005. LNCS, vol. 3431, pp. 41–54. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  6. 6.
    Karagiannis, T., Broido, A., Faloutsos, M., et al.: Transport layer identification of P2P traffic. In: Proc. of the 4th ACM SIGCOMM Conference on Internet Measurement, pp. 121–134. ACM, New York (2004)CrossRefGoogle Scholar
  7. 7.
    Karagiannis, T., Papagiannaki, K., Faloutsos, M.: BLINC: multilevel traffic classification in the dark. In: ACM SIGCOMM, Philadelphia, PA (2005)Google Scholar
  8. 8.
    Auld, T., Moore, A.W., Gull, S.F.: Bayesian neural networks for internet traffic classification. IEEE Transactions on Neural Network 18(1), 223–239 (2007)CrossRefGoogle Scholar
  9. 9.
    Moore, A.W., Zuev, D.: Discriminators for use in Flow-based classification. Technical Report IRC-TR-04-028, Intel Research, Cambridge (2004)Google Scholar
  10. 10.
    Ma, Y.: Methods and Implementations of Network Traffic Identification Based on Machine Learning. Master thesis, Shandong University (2014) (in Chinese)Google Scholar
  11. 11.
    Cristianini, N., Shawe-Taylor, J.: An Introduction to Support Vector Machine An Introduction to Support Vector Machines and Other Kernel-based Learning Methods. Publishing House of Electronics Industry, Beijing (2004) (Chinese Version, Translated by G. Li, M. Wang, H. Ceng)Google Scholar
  12. 12.
    Hornik, K.M., Stinchcombe, M., White, H.: Multilayer feed forward networks are universal approximators. Neural Networks 2(2), 359–366 (1989)CrossRefGoogle Scholar
  13. 13.
    Kennedy, J., Eberhart, R.C.: Particle Swarm Optimization. In: Proceedings of IEEE International Conference on Neural Networks, pp. 1942–1948 (1995)Google Scholar
  14. 14.
    Zhang, G., Li, Y.M.: Cooperative particle swarm optimizer with elimination mechanism for global optimization of multimodal problems. In: Proceedingds of IEEE Congress on Evolutionary Computation (CEC), Beijinag, China, pp. 210–217 (2014)Google Scholar
  15. 15.
    Nguyen, T., Armitage, G.: A Survey of Techniques for Internet Traffic Classification using Machine Learning. IEEE Communications Surveys & Tutorials 10(4), 56–76 (2008)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2015

<SimplePara><Emphasis Type="Bold">Open Access</Emphasis> This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 2.5 International License (, which permits any noncommercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made. </SimplePara> <SimplePara>The images or other third party material in this chapter are included in the chapter's Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the chapter's Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder.</SimplePara>

Authors and Affiliations

  • Meihua Qiao
    • 1
    • 2
  • Yanqing Ma
    • 2
  • Yijie Bian
    • 1
  • Ju Liu
    • 2
  1. 1.Business SchoolHohai UniversityNanjingChina
  2. 2.Suzhou Research InstituteShandong UniversitySuzhouChina

Personalised recommendations