Skip to main content

Content Recognition of Network Traffic Using Wavelet Transform and CNN

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11806))

Abstract

With the development of the Internet, the content types of the network traffic become more and more diverse, including video, news, music, image and so on. Traffic identification plays an important role in network management, security defense and performance optimization. Traditionally, the network traffic analysis focuses on the protocol identification and application classification, which has been well studied in the past two decades. However, as a large number of existing general protocols and legal applications can be abused to hide and transmit the data of different content types, illegal content may penetrate the traffic analysis system, and lead to inefficient network management and cause potential risks for internal networks. Different from the traditional work on the identification of the protocols or applications, in this paper, we propose a new method for recognizing the content types for the network traffic. The proposed method is based on two technologies including the wavelet transform and CNN. The wavelet transform is exploited to process the time-frequency signals of the observed network traffic that is further classified by the CNN. Experiment results are presented to validate the performance of the proposed scheme.

Supported by the Natural Science Foundation of Guangdong Province, China (No. 2018A030313303).

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Wang, Y., Xiang, Y., Zhang, J., Zhou, W., Xie, B.: Internet traffic clustering with side information. J. Comput. Syst. Sci. 80(5), 1021–1036 (2014)

    Article  MathSciNet  Google Scholar 

  2. Ertam, F., Avci, E.: Classification with intelligent systems for internet traffic in enterprise networks. Int. J. Comput. Commun. Instrum. Engg. (IJCCIE) 3 (2016). ISSN 2349-1469

    Google Scholar 

  3. Nguyen, T.T.T., Armitage, G., Branch, P., Zander, S.: Timely and continuous machine-learning-based classification for interactive IP traffic. IEEE/ACM Trans. Network. 20(6), 1880–1894 (2012)

    Article  Google Scholar 

  4. Daubechies, I.: The wavelet transform, time-frequency localization and signal analysis. IEEE Trans. Inf. Theory 36(5), 961–1005 (1990)

    Article  MathSciNet  Google Scholar 

  5. Qian, K., Ren, Z., Pandit, V., Yang, Z., Zhang, Z., Schuller, B.: Wavelets revisited for the classification of acoustic scenes. In: Proceedings of the DCASE Workshop, Munich, Germany, pp. 108–112 (2017)

    Google Scholar 

  6. Khushaba, R.N., Kodagoda, S., Lal, S., Dissanayake, G.: Driver drowsiness classification using fuzzy wavelet-packet-based feature-extraction algorithm. IEEE Trans. Biomed. Eng. 58(1), 121–131 (2011)

    Article  Google Scholar 

  7. Sun, G., Liang, L., Chen, T., Xiao, F., Lang, F.: Network traffic classification based on transfer learning. Comput. Electr. Eng. 69, 920–927 (2018)

    Article  Google Scholar 

  8. Moore, A.W., Zuev, D.: Internet traffic classification using Bayesian analysis techniques. In: ACM SIGMETRICS Performance Evaluation Review, Vol. 33, pp. 50–60. ACM (2005)

    Google Scholar 

  9. Bujlow, T., Carela-Español, V., Barlet-Ros, P.: Independent comparison of popular DPI tools for traffic classification. Comput. Netw. 76, 75–89 (2015)

    Article  Google Scholar 

  10. Bujlow, T., Riaz, T., Pedersen, J.M.: Classification of HTTP traffic based on C5.0 machine learning algorithm. In: 2012 IEEE Symposium on Computers and Communications (ISCC), pp. 000882–000887. IEEE (2012)

    Google Scholar 

  11. Wang, Y., Zhang, Z., Guo, L.: Traffic classification beyond application level: identifying content types from network traces. In: Proceedings of the 2011 ACM Symposium on Applied Computing, pp. 540–541. ACM (2011)

    Google Scholar 

  12. Wang, Y., An, J., Huang, W.: Using CNN-based representation learning method for malicious traffic identification. In: 2018 IEEE/ACIS 17th International Conference on Computer and Information Science (ICIS), pp. 400–404. IEEE (2018)

    Google Scholar 

  13. Yu, L., Liu, H.: Feature selection for high-dimensional data: a fast correlation-based filter solution. In: Proceedings of the 20th International Conference on Machine Learning (ICML 2003), pp. 856–863 (2003)

    Google Scholar 

  14. Zhang, J., Chen, X., Xiang, Y., Zhou, W., Jie, W.: Robust network traffic classification. IEEE/ACM Trans. Netw. (TON) 23(4), 1257–1270 (2015)

    Article  Google Scholar 

  15. Li, D., Guyu, H., Wang, Y., Pan, Z.: Network traffic classification via non-convex multi-task feature learning. Neurocomputing 152, 322–332 (2015)

    Article  Google Scholar 

  16. Zhang, J., Xiang, Y., Zhou, W., Wang, Y.: Unsupervised traffic classification using flow statistical properties and IP packet payload. J. Comput. Syst. Sci. 79(5), 573–585 (2013)

    Article  MathSciNet  Google Scholar 

  17. Wang, Y., Xiang, Y., Zhang, J., Zhou, W., Wei, G., Yang, L.T.: Internet traffic classification using constrained clustering. IEEE Trans. Parallel Distrib. Syst. 25(11), 2932–2943 (2014)

    Article  Google Scholar 

  18. Kumar, A., Kim, J., Suh, S.C., Choi, G.: Incorporating multiple cluster models for network traffic classification. In: 2015 IEEE 40th Conference on Local Computer Networks (LCN), pp. 185–188. IEEE (2015)

    Google Scholar 

  19. Zhang, J., Xiang, Y., Wang, Yu., Zhou, W., Xiang, Y., Guan, Y.: Network traffic classification using correlation information. IEEE Trans. Parallel Distrib. Syst. 24(1), 104–117 (2013)

    Google Scholar 

  20. Shi, H., Li, H., Zhang, D., Cheng, C., Cao, X.: An efficient feature generation approach based on deep learning and feature selection techniques for traffic classification. Comput. Netw. 132, 81–98 (2018)

    Article  Google Scholar 

  21. Lotfollahi, M., Zade, R.S.H., Siavoshani, M.J., Saberian, M.: Deep packet: a novel approach for encrypted traffic classification using deep learning. arXiv preprint arXiv:1709.02656 (2017)

  22. Lopez-Martin, M., Carro, B., Sanchez-Esguevillas, A., Lloret, J.: Network traffic classifier with convolutional and recurrent neural networks for internet of things. IEEE Access 5, 18042–18050 (2017)

    Article  Google Scholar 

  23. Aceto, G., Ciuonzo, D., Montieri, A., Pescapé, A.: Mobile encrypted traffic classification using deep learning. In: 2018 Network Traffic Measurement and Analysis Conference (TMA), pp. 1–8. IEEE (2018)

    Google Scholar 

  24. Landis, J.R., Koch, G.G.: The measurement of observer agreement for categorical data. Biometrics 33(1), 159–174 (1977)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yi Xie .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Liang, Y., Xie, Y., Fei, X., Tan, X., Ma, H. (2019). Content Recognition of Network Traffic Using Wavelet Transform and CNN. In: Chen, X., Huang, X., Zhang, J. (eds) Machine Learning for Cyber Security. ML4CS 2019. Lecture Notes in Computer Science(), vol 11806. Springer, Cham. https://doi.org/10.1007/978-3-030-30619-9_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-30619-9_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-30618-2

  • Online ISBN: 978-3-030-30619-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics