Abstract
The management and surveillance of the network operation are vital to the managers of the network. However the traditional network management software or tools can not archive this objective. Currently there are mainly three methods for network traffic classification and recognition, one is rely on ‘well known’ TCP or UDP port numbers, second is deeply packet inspection and the third is based on features of traffic flow. The first two methods both have some shortcomings. while the third method can be through selecting the different pattern recognition methods, Such as linear models for classification, kernel methods, clustering methods and neural networks methods to overcome this shortcoming by identifying network applications based on per-flow statistics, derived from payload-independent features such as packet length and inter-arrival time distributions and so on. In this literature review, with the articles we get from the Google scholar, analyze the features these article use to classify the traffic by using the neural networks, and the classification accuracy of these articles announced. Finally discuss the improvement of the algorithms these articles adopted.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Nguyen, Armitage, G.: A survey of techniques for internet traffic classification using machine learning. IEEE Communications Surveys & Tutorials 10, 56–76 (2008)
Williams, Zander, S., Armitage, G.: Evaluating machine learning algorithms for automated network application identification. Center for Advanced Internet Architectures, CAIA, Technical Report 060410B (2006)
Auld, T., Moore, A., Gull, S.: Bayesian neural networks for internet traffic classification. IEEE Transactions on Neural Networks 18(1), 223–239 (2007)
Kim, H., Claffy, K., Fomenkov, M., Barman, D., Faloutsos, M., Lee, K.: Internet traffic classification demystified: myths, caveats, and the best practices. In: Internet Traffic Classification Demystified: Myths, Caveats, and the Best Practices. Internet traffic classification demystified: myths, caveats, and the best practices, pp. 1–12. ACM, City (2008)
Brans, E., Brombach, B., Zeidler, T., Bimber, O.: Enabling mobile phones to support large-scale museum guidance. IEEE Multimedia 14(2), 16–25 (2007)
Dietterich, T., Langley, P.: 1 Machine Learning for Cognitive Networks: Technology Assessment and Research Challenges (2008)
Chitaliya, N., Trivedi, A.: Feature Extraction Using Wavelet-PCA and Neural Network for Application of Object Classification & Face Recognition. In: Feature Extraction Using Wavelet-PCA and Neural Network for Application of Object Classification & Face Recognition. Feature Extraction Using Wavelet-PCA and Neural Network for Application of Object Classification & Face Recognition, pp. 510–514. IEEE, City (2010)
Lippmann, R.: Pattern classification using neural networks. IEEE Communications Magazine 27(11), 47–50 (1989)
Jing, X., Yanghong, T.: Handwritten digital recognition method based on new feature extraction method and quantum neural network. Electronic Measurement Technology (2009)
Xu, J., Wang, G.: Cellular Neural Network in Gray-scale Video Traffic Image Processing (2009)
Yan-Ping, L., Zhen-Min, T., Hui, D., Yan, Z.: Speaker Identification Algorithm of Semi-Supervised Learning Mechanism. Computer Engineering 14 (2009)
Chitaliya, N., Trivedi, A.: Feature Extraction Using Wavelet-PCA and Neural Network for Application of Object Classification & Face Recognition. In: Feature Extraction Using Wavelet-PCA and Neural Network for Application of Object Classification & Face Recognition. Feature Extraction Using Wavelet-PCA and Neural Network for Application of Object Classification & Face Recognition, pp. 510–514. IEEE, City (2010)
Sporns, O., Honey, C., Kotter, R.: Identification and classification of hubs in brain networks. PLoS One 2(10) (2007)
Zhong, S., Khoshgoftaar, T., Seliya, N.: Clustering-based network intrusion detection. International Journal of Reliability Quality and Safety Engineering 14(2), 169 (2007)
Shrivastav, A., Tiwari, A.: Network Traffic Classification Using Semi-Supervised Approach. In: Network Traffic Classification Using Semi-Supervised Approach. Network Traffic Classification Using Semi-Supervised Approach, pp. 345–349. IEEE, City (2010)
Locasto, M., Wang, K., Keromytis, A., Stolfo, S.: Flips: Hybrid adaptive intrusion prevention. In: Flips: Hybrid Adaptive Intrusion Prevention. Flips: Hybrid adaptive intrusion prevention, pp. 82–101. Springer, City
Moradi, M., Zulkernine, M.: A neural network based system for intrusion detection and classification of attacks. In: A Neural Network based System for Intrusion Detection and Classification of Attacks. A neural network based system for intrusion detection and classification of attacks, City
Balagani, K., Phoha, V., Kuchimanchi, G.: A Divergence-measure Based Classification Method for Detecting Anomalies in Network Traffic. In: A Divergence-measure Based Classification Method for Detecting Anomalies in Network Traffic. A Divergence-measure Based Classification Method for Detecting Anomalies in Network Traffic, City, pp. 374–379 (2007)
Cordella, L., Sansone, C.: A multi-stage classification system for detecting intrusions in computer networks. Pattern Analysis & Applications 10(2), 83–100 (2007)
Golovko, V., Vaitsekhovich, L., Kochurko, P., Rubanau, U.: Dimensionality reduction and attack recognition using neural network approaches. In: Dimensionality Reduction and Attack Recognition using Neural Network Approaches. Dimensionality reduction and attack recognition using neural network approaches, City, pp. 2734–2739 (2007)
Jin, S., Yeung, D., Wang, X.: Network intrusion detection in covariance feature space. Pattern Recognition 40(8), 2185–2197 (2007)
Li, Y., Guo, L.: An active learning based TCM-KNN algorithm for supervised network intrusion detection. Computers & Security 26(7-8), 459–467 (2007)
Oke, G., Loukas, G.: A denial of service detector based on maximum likelihood detection and the random neural network. The Computer Journal 50(6), 717 (2007)
Shon, T., Moon, J.: A hybrid machine learning approach to network anomaly detection. Information Sciences 177(18), 3799–3821 (2007)
Beghdad, R.: Critical study of neural networks in detecting intrusions. Computers & Security 27(5-6), 168–175 (2008)
Chen, Z., Wang, H., Abraham, A., Grosan, C., Yang, B., Chen, Y., Wang, L.: Improving Neural Network Classification Using Further Division of Recognition Space. International Journal of Innovative, Computing, Information and Control 5(2) (2009)
Herrero, Corchado, E., Gastaldo, P., Zunino, R.: Neural projection techniques for the visual inspection of network traffic. Neurocomputing (2009)
Raahemi, B., Kouznetsov, A., Hayajneh, A., Rabinovitch, P.: Classification of Peer-to-Peer traffic using incremental neural networks (Fuzzy ARTMAP). In: Classification of Peer-to-Peer traffic using incremental neural networks (Fuzzy ARTMAP). Classification of Peer-to-Peer traffic using incremental neural networks (Fuzzy ARTMAP), City, pp. 000719–000724 (2008)
Raahemi, B., Zhong, W., Liu, J.: Exploiting unlabeled data to improve peer-to-peer traffic classification using incremental tri-training method. Peer-to-Peer Networking and Applications 2(2), 87–97 (2009)
Zhong, W., Raahemi, B., Liu, J.: Learning on class imbalanced data to classify peer-to-peer applications in IP traffic using resampling techniques. In: Learning on Class Imbalanced Data to Classify Peer-to-Peer Applications in IP Traffic using Resampling Techniques. Learning on class imbalanced data to classify peer-to-peer applications in IP traffic using resampling techniques, pp. 1573–1579. Institute of Electrical and Electronics Engineers Inc., City (2009)
Kothari, A., Keskar, A.: Rough Set Approaches to Unsupervised Neural Network Based Pattern Classifier. In: Advances in Machine Learning and Data Analysis, p. 151 (2010)
Ridley, D.: The literature review: a step-by-step guide for students. Sage (2008)
Moore, A., Zuev, D., Crogan, M.: Discriminators for use in flow-based classification. RR-05.13 Department of Computer Science, University of London (2005)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bin, P., Ru, L. (2012). Literature Review of Network Traffic Classification Using Neural Networks. In: Gaol, F. (eds) Recent Progress in Data Engineering and Internet Technology. Lecture Notes in Electrical Engineering, vol 157. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28798-5_31
Download citation
DOI: https://doi.org/10.1007/978-3-642-28798-5_31
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-28797-8
Online ISBN: 978-3-642-28798-5
eBook Packages: EngineeringEngineering (R0)