Journal on Communications ›› 2018, Vol. 39 ›› Issue (1): 14-23.doi: 10.11959/j.issn.1000-436x.2018018
• Papers • Previous Articles Next Articles
Yong WANG1,2,3,Huiyi ZHOU2,3,Hao FENG1(),Miao YE3,4,Wenlong KE2
Revised:
2017-12-19
Online:
2018-01-01
Published:
2018-02-07
Supported by:
CLC Number:
Yong WANG,Huiyi ZHOU,Hao FENG,Miao YE,Wenlong KE. Network traffic classification method basing on CNN[J]. Journal on Communications, 2018, 39(1): 14-23.
"
编号 | C1卷积层 | S2池化层 | C3卷积层 | S4池化层 | C5全连接层 | |||||||||
卷积核 | 输出 | 采样窗口 | 输出 | 卷积核 | 输出 | 采样窗口 | 输出 | 卷积核 | 输出 | |||||
1 | 32×(3×3) | 32×(16×16) | 2×2 | 32×(8×8) | 64×(5×5) | 64×(8×8) | 2×2 | 64×(4×4) | 256×(4×4) | 256×1 | ||||
2 | 32×(3×3) | 32×(16×16) | 2×2 | 32×(8×8) | 64×(5×5) | 64×(8×8) | 2×2 | 64×(4×4) | 128×(4×4) | 128×1 | ||||
3 | 16×(3×3) | 16×(16×16) | 2×2 | 16×(8×8) | 32×(5×5) | 32×(8×8) | 2×2 | 32×(4×4) | 256×(4×4) | 256×1 | ||||
4 | 16×(3×3) | 16×(16×16) | 2×2 | 16×(8×8) | 32×(5×5) | 32×(8×8) | 2×2 | 32×(4×4) | 128×(4×4) | 128×1 | ||||
5 | 8×(3×3) | 8×(16×16) | 2×2 | 8×(8×8) | 16×(5×5) | 16×(8×8) | 2×2 | 16×(4×4) | 256×(4×4) | 256×1 | ||||
6 | 8×(3×3) | 8×(16×16) | 2×2 | 8×(8×8) | 16×(5×5) | 16×(8×8) | 2×2 | 16×(4×4) | 128×(4×4) | 128×1 |
[1] | LENCUN Y , BENGIO Y , HINTON G . Deep learning[J]. Nature, 2015,512: 436-444. |
[2] | DING J , HUANG L , YUPNEG T ,et al. A flow nature classification method based on multi-features of n-gram[J]. Computer Applications& Software, 2017. |
[3] | GUANG L , RONGHUA G . Cascaded classifier for improving traffic classification accuracy[J]. IET Communications, 2017,11: 1751-1758. |
[4] | SCHMIDT B , AL-FUQAHA A , GUPTA A . Optimizing an artificial immune system algorithm in support of flow-based internet traffic classification[J]. Applied Soft Computing, 2017,54: 1-22. |
[5] | DONG Y N , ZHAO J J , JIM J . Novel feature selection and classification of Internet video traffic based on a hierarchical scheme[J]. Computer networks, 2017,119: 102-111. |
[6] | KORNCKY J , ABDUL-HAMEED O , KONDOZ A . Radio frequency traffic classification over WLAN[J]. IEEE-ACM Transactions on Networking, 2017,25: 56-68. |
[7] | TONG D , QU Y R , PRASANNA V K . Accelerating decision tree based traffic classification on FPGA and multicore platforms[J]. IEEE Transactions on Parallel & Distributed Systems, 2017:1. |
[8] | Shi H , Li H , Zhang D ,et al. Efficient and robust feature extraction and selection for traffic classification[J]. Computer Networks the International Journal of Computer & Telecommunications Networking, 2017,119(C): 1-16. |
[9] | CAO J , FANG Z Y , QU G N ,et al. An accurate traffic classification model based on support vector machines[J].,2017,27. Networks, 2017,27. |
[10] | HE K M , ZHANG X Y , REN S Q . Delving deep into rectifiers:surpassing human-level performance on imagenet classification[C]// IEEE International Conference on Computer Vision. 2015: 1026-1034. |
[11] | SUN S N , ZHANG B B , XIE L ,et al. An unsupervised deep domain adaptation approach for robust speech recognition[J]. Neurocomputing, 2017,257: 79-87. |
[12] | WILLIAMSON D S , WANG D L . Time-frequency masking in the complex domain for speech dereverberation and denoising[J]. IEEE/ACM Transactions on Audio Speech & Language Processing, 2017,25: 1492-1501. |
[13] | ZHANG Y , MARSHALL I , WALLACE B C . Rationale-augmented convolutional neural networks for text classification[C]// Conf Empir Methods Nat Lang Process. 2016:795. |
[14] | ERTAM F , AVCI E . A new approach for internet traffic classification:GA-WK-ELM[J]. Measurement, 2017,95: 135-142. |
[15] | 白雪 . 基于DBN 的网络流量分类的研究[D]. 呼和浩特:内蒙古大学, 2015. |
BAI X . Research on Internet traffic classification using DBN[D]. Hohehot:Inner Mongolia University, 2015. | |
[16] | MOORE A W , ZUEV D . Discriminators for use in flow-based classification[R]. Technical report,Intel Research,Cambridge, 2005. |
[17] | 周飞燕, 金林鹏, 董军 . 卷积神经网络研究综述[J]. 计算机学报, 2017,40(6): 1-23. |
ZHOU F Y , JIN L P , DONG J . Review of convolutional neural network[J]. Chinese Journal of Computers, 2017,40(6): 1-23. | |
[18] | LENCUN Y , BOTTOU L , BENGIO Y . Gradient-based learning applied to document recognition[J]. Proceedings of the IEEE, 1998,862: 2278-2324. |
[19] | 徐鹏, 林森 . 基于C4.5决策树的流量分类方法[J]. 软件学报, 2009,20(10): 2692-2704. |
XU P , LIN S.Internet traffic classification using C4 . 5 decision tree[J]. Journal of Software, 2009,20(10): 2692-2704. | |
[20] | 寇广, 汤光明, 王硕 ,等. 深度学习在僵尸云检测中的应用研究[J]. 通信学报, 2016,37(11): 114-128. |
KOU G , TANG G M , WANG S ,et al. Using deep learning for detecting BotCloud[J]. Journal on Communications, 2016,37(11): 114-128. |
[1] | Ping ZHANG, Kai NIU, Shengshi YAO, Jincheng DAI. Semantic communications for future: basic principle and implementation methodology [J]. Journal on Communications, 2023, 44(5): 1-14. |
[2] | Yifeng WANG, Yuanbo GUO, Qingli CHEN, Chen FANG, Renhao LIN, Yongliang ZHOU, Jiali MA. Method based on contrastive incremental learning for fine-grained malicious traffic classification [J]. Journal on Communications, 2023, 44(3): 1-11. |
[3] | Shuangyan YI, Yongsheng LIANG, Jingjing LU, Wei LIU, Tao HU, Zhenyu HE. Robust feature selection method via joint low-rank reconstruction and projection reconstruction [J]. Journal on Communications, 2023, 44(3): 209-219. |
[4] | Yurong LIAO, Haining WANG, Cunbao LIN, Yang LI, Yuqiang FANG, Shuyan NI. Research progress of deep learning-based object detection of optical remote sensing image [J]. Journal on Communications, 2022, 43(5): 190-203. |
[5] | Fan ZHANG, Yun HUANG, Zizhuo FANG, Wei GUO. Lost-minimum post-training parameter quantization method for convolutional neural network [J]. Journal on Communications, 2022, 43(4): 114-122. |
[6] | Zhengyu ZHU, Gengwang HOU, Chongwen HUANG, Gangcan SUN, Wanming HAO, Jing LIANG. Systems resource allocation algorithm for RIS-assisted D2D secure communication based on parallel CNN [J]. Journal on Communications, 2022, 43(3): 172-179. |
[7] | Hongyan WANG, Libin ZHANG, Guoqiang CHEN, Zumin WANG, Zhiyuan GUAN. Approach of target tracking combining particle filter and metric learning [J]. Journal on Communications, 2021, 42(5): 98-110. |
[8] | Nianwen SI, Wenlin ZHANG, Dan QU, Heyu CHANG, Shengxiang LI, Tong NIU. Generalized Grad-CAM attacking method based on adversarial patch [J]. Journal on Communications, 2021, 42(3): 23-35. |
[9] | Hongmin GAO, Xueying CAO, Zhonghao CHEN, Zaijun HUA, Chenming LI, Yue CHEN. Hyperspectral image classification method based on multi-scale proximal feature concatenate network [J]. Journal on Communications, 2021, 42(2): 92-102. |
[10] | Yongjin HU,Yuanbo GUO,Jun MA,Han ZHANG,Xiuqing MAO. Method to generate cyber deception traffic based on adversarial sample [J]. Journal on Communications, 2020, 41(9): 59-70. |
[11] | Jun YANG,Jisheng DANG. Semantic segmentation of 3D point cloud based on contextual attention CNN [J]. Journal on Communications, 2020, 41(7): 195-203. |
[12] | Yonghao LI, Liang HU, Ping ZHANG, Wanfu GAO. Multi-label feature selection based on dynamic graph Laplacian [J]. Journal on Communications, 2020, 41(12): 47-59. |
[13] | Hongmin GAO,Xueying CAO,Yao YANG,Zaijun HUA,Chenming LI. Application of bilateral fusion model based on CNN in hyperspectral image classification [J]. Journal on Communications, 2020, 41(11): 132-140. |
[14] | Meng ZHANG,Haoliang SUN,Peng YANG. Identification of DNS covert channel based on improved convolutional neural network [J]. Journal on Communications, 2020, 41(1): 169-179. |
[15] | Huadi ZHANG,Huaxun LOU. Automatic modulation recognition algorithm for MQAM signal [J]. Journal on Communications, 2019, 40(8): 200-211. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|