Skip to main content

Literature Review of Network Traffic Classification Using Neural Networks

  • Conference paper
Book cover Recent Progress in Data Engineering and Internet Technology

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 157))

Abstract

The management and surveillance of the network operation are vital to the managers of the network. However the traditional network management software or tools can not archive this objective. Currently there are mainly three methods for network traffic classification and recognition, one is rely on ‘well known’ TCP or UDP port numbers, second is deeply packet inspection and the third is based on features of traffic flow. The first two methods both have some shortcomings. while the third method can be through selecting the different pattern recognition methods, Such as linear models for classification, kernel methods, clustering methods and neural networks methods to overcome this shortcoming by identifying network applications based on per-flow statistics, derived from payload-independent features such as packet length and inter-arrival time distributions and so on. In this literature review, with the articles we get from the Google scholar, analyze the features these article use to classify the traffic by using the neural networks, and the classification accuracy of these articles announced. Finally discuss the improvement of the algorithms these articles adopted.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Nguyen, Armitage, G.: A survey of techniques for internet traffic classification using machine learning. IEEE Communications Surveys & Tutorials 10, 56–76 (2008)

    Article  Google Scholar 

  2. Williams, Zander, S., Armitage, G.: Evaluating machine learning algorithms for automated network application identification. Center for Advanced Internet Architectures, CAIA, Technical Report 060410B (2006)

    Google Scholar 

  3. Auld, T., Moore, A., Gull, S.: Bayesian neural networks for internet traffic classification. IEEE Transactions on Neural Networks 18(1), 223–239 (2007)

    Article  Google Scholar 

  4. Kim, H., Claffy, K., Fomenkov, M., Barman, D., Faloutsos, M., Lee, K.: Internet traffic classification demystified: myths, caveats, and the best practices. In: Internet Traffic Classification Demystified: Myths, Caveats, and the Best Practices. Internet traffic classification demystified: myths, caveats, and the best practices, pp. 1–12. ACM, City (2008)

    Google Scholar 

  5. Brans, E., Brombach, B., Zeidler, T., Bimber, O.: Enabling mobile phones to support large-scale museum guidance. IEEE Multimedia 14(2), 16–25 (2007)

    Article  Google Scholar 

  6. Dietterich, T., Langley, P.: 1 Machine Learning for Cognitive Networks: Technology Assessment and Research Challenges (2008)

    Google Scholar 

  7. Chitaliya, N., Trivedi, A.: Feature Extraction Using Wavelet-PCA and Neural Network for Application of Object Classification & Face Recognition. In: Feature Extraction Using Wavelet-PCA and Neural Network for Application of Object Classification & Face Recognition. Feature Extraction Using Wavelet-PCA and Neural Network for Application of Object Classification & Face Recognition, pp. 510–514. IEEE, City (2010)

    Google Scholar 

  8. Lippmann, R.: Pattern classification using neural networks. IEEE Communications Magazine 27(11), 47–50 (1989)

    Article  Google Scholar 

  9. Jing, X., Yanghong, T.: Handwritten digital recognition method based on new feature extraction method and quantum neural network. Electronic Measurement Technology (2009)

    Google Scholar 

  10. Xu, J., Wang, G.: Cellular Neural Network in Gray-scale Video Traffic Image Processing (2009)

    Google Scholar 

  11. Yan-Ping, L., Zhen-Min, T., Hui, D., Yan, Z.: Speaker Identification Algorithm of Semi-Supervised Learning Mechanism. Computer Engineering 14 (2009)

    Google Scholar 

  12. Chitaliya, N., Trivedi, A.: Feature Extraction Using Wavelet-PCA and Neural Network for Application of Object Classification & Face Recognition. In: Feature Extraction Using Wavelet-PCA and Neural Network for Application of Object Classification & Face Recognition. Feature Extraction Using Wavelet-PCA and Neural Network for Application of Object Classification & Face Recognition, pp. 510–514. IEEE, City (2010)

    Google Scholar 

  13. Sporns, O., Honey, C., Kotter, R.: Identification and classification of hubs in brain networks. PLoS One 2(10) (2007)

    Google Scholar 

  14. Zhong, S., Khoshgoftaar, T., Seliya, N.: Clustering-based network intrusion detection. International Journal of Reliability Quality and Safety Engineering 14(2), 169 (2007)

    Article  Google Scholar 

  15. Shrivastav, A., Tiwari, A.: Network Traffic Classification Using Semi-Supervised Approach. In: Network Traffic Classification Using Semi-Supervised Approach. Network Traffic Classification Using Semi-Supervised Approach, pp. 345–349. IEEE, City (2010)

    Google Scholar 

  16. Locasto, M., Wang, K., Keromytis, A., Stolfo, S.: Flips: Hybrid adaptive intrusion prevention. In: Flips: Hybrid Adaptive Intrusion Prevention. Flips: Hybrid adaptive intrusion prevention, pp. 82–101. Springer, City

    Google Scholar 

  17. Moradi, M., Zulkernine, M.: A neural network based system for intrusion detection and classification of attacks. In: A Neural Network based System for Intrusion Detection and Classification of Attacks. A neural network based system for intrusion detection and classification of attacks, City

    Google Scholar 

  18. Balagani, K., Phoha, V., Kuchimanchi, G.: A Divergence-measure Based Classification Method for Detecting Anomalies in Network Traffic. In: A Divergence-measure Based Classification Method for Detecting Anomalies in Network Traffic. A Divergence-measure Based Classification Method for Detecting Anomalies in Network Traffic, City, pp. 374–379 (2007)

    Google Scholar 

  19. Cordella, L., Sansone, C.: A multi-stage classification system for detecting intrusions in computer networks. Pattern Analysis & Applications 10(2), 83–100 (2007)

    Article  MathSciNet  Google Scholar 

  20. Golovko, V., Vaitsekhovich, L., Kochurko, P., Rubanau, U.: Dimensionality reduction and attack recognition using neural network approaches. In: Dimensionality Reduction and Attack Recognition using Neural Network Approaches. Dimensionality reduction and attack recognition using neural network approaches, City, pp. 2734–2739 (2007)

    Google Scholar 

  21. Jin, S., Yeung, D., Wang, X.: Network intrusion detection in covariance feature space. Pattern Recognition 40(8), 2185–2197 (2007)

    Article  MATH  Google Scholar 

  22. Li, Y., Guo, L.: An active learning based TCM-KNN algorithm for supervised network intrusion detection. Computers & Security 26(7-8), 459–467 (2007)

    Article  Google Scholar 

  23. Oke, G., Loukas, G.: A denial of service detector based on maximum likelihood detection and the random neural network. The Computer Journal 50(6), 717 (2007)

    Article  Google Scholar 

  24. Shon, T., Moon, J.: A hybrid machine learning approach to network anomaly detection. Information Sciences 177(18), 3799–3821 (2007)

    Article  Google Scholar 

  25. Beghdad, R.: Critical study of neural networks in detecting intrusions. Computers & Security 27(5-6), 168–175 (2008)

    Article  Google Scholar 

  26. Chen, Z., Wang, H., Abraham, A., Grosan, C., Yang, B., Chen, Y., Wang, L.: Improving Neural Network Classification Using Further Division of Recognition Space. International Journal of Innovative, Computing, Information and Control 5(2) (2009)

    Google Scholar 

  27. Herrero, Corchado, E., Gastaldo, P., Zunino, R.: Neural projection techniques for the visual inspection of network traffic. Neurocomputing (2009)

    Google Scholar 

  28. Raahemi, B., Kouznetsov, A., Hayajneh, A., Rabinovitch, P.: Classification of Peer-to-Peer traffic using incremental neural networks (Fuzzy ARTMAP). In: Classification of Peer-to-Peer traffic using incremental neural networks (Fuzzy ARTMAP). Classification of Peer-to-Peer traffic using incremental neural networks (Fuzzy ARTMAP), City, pp. 000719–000724 (2008)

    Google Scholar 

  29. Raahemi, B., Zhong, W., Liu, J.: Exploiting unlabeled data to improve peer-to-peer traffic classification using incremental tri-training method. Peer-to-Peer Networking and Applications 2(2), 87–97 (2009)

    Article  Google Scholar 

  30. Zhong, W., Raahemi, B., Liu, J.: Learning on class imbalanced data to classify peer-to-peer applications in IP traffic using resampling techniques. In: Learning on Class Imbalanced Data to Classify Peer-to-Peer Applications in IP Traffic using Resampling Techniques. Learning on class imbalanced data to classify peer-to-peer applications in IP traffic using resampling techniques, pp. 1573–1579. Institute of Electrical and Electronics Engineers Inc., City (2009)

    Google Scholar 

  31. Kothari, A., Keskar, A.: Rough Set Approaches to Unsupervised Neural Network Based Pattern Classifier. In: Advances in Machine Learning and Data Analysis, p. 151 (2010)

    Google Scholar 

  32. Ridley, D.: The literature review: a step-by-step guide for students. Sage (2008)

    Google Scholar 

  33. Moore, A., Zuev, D., Crogan, M.: Discriminators for use in flow-based classification. RR-05.13 Department of Computer Science, University of London (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Pang Bin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bin, P., Ru, L. (2012). Literature Review of Network Traffic Classification Using Neural Networks. In: Gaol, F. (eds) Recent Progress in Data Engineering and Internet Technology. Lecture Notes in Electrical Engineering, vol 157. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28798-5_31

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-28798-5_31

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-28797-8

  • Online ISBN: 978-3-642-28798-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics