Telecommunications Science ›› 2016, Vol. 32 ›› Issue (6): 143-152.doi: 10.11959/j.issn.1000-0801.2016152
• research and development • Previous Articles Next Articles
Zhen LIU1,Ruoyu WANG2
Online:
2016-06-20
Published:
2016-07-20
Supported by:
Zhen LIU,Ruoyu WANG. Internet traffic classification method based on behavior feature learning[J]. Telecommunications Science, 2016, 32(6): 143-152.
"
类别 | Day917_1 | Day917_2 | Day917_3 | |||||
#流/条 | #字节/MB | #流/条 | #字节/MB | #流/条 | #字节/MB | |||
HTTP | 6 421 | 64.080 | 9 072 | 199.051 | 8 678 | 133.504 | ||
DNS | 6 714 | 1.253 | 11 722 | 2.070 | 9 912 | 1.779 | ||
eDonkey | 14 474 | 31.439 | 12 945 | 83.960 | 18 064 | 43.705 | ||
SSL | 130 | 2.026 | 88 | 0.943 | 140 | 1.604 | ||
BT | 2 198 | 15.422 | 3 072 | 3.076 | 3 258 | 19.943 | ||
HTTPvideo | 24 | 13.948 | 22 | 48.096 | 18 | 32.256 | ||
Xunlei | 1 792 | 3.725 | 1 348 | 2.565 | 2 400 | 31.162 | ||
770 | 0.822 | 479 | 1.646 | 646 | 1.833 | |||
Kugou | 220 | 58.150 | 400 | 2.437 | 247 | 4.894 |
"
类别 | Day925_1 | Day925_2 | Day925_3 | |||||
#流/条 | #字节/MB | #流/条 | #字节/MB | #流/条 | #字节/MB | |||
HTTP | 10 786 | 87.707 | 8 687 | 123.760 | 9 109 | 82.783 | ||
DNS | 11 480 | 2.645 | 7 371 | 1.190 | 7 097 | 1.201 | ||
eDonkey | 589 | 16.937 | 360 | 16.912 | 329 | 7.526 | ||
SSL | 133 | 9.474 | 348 | 108.942 | 146 | 13.335 | ||
BT | 4 239 | 62.195 | 3 778 | 43.271 | 2 692 | 68.687 | ||
HTTPvideo | 654 | 77.414 | 332 | 76.714 | 280 | 60.574 | ||
Xunlei | 703 | 3.560 | 463 | 2.025 | 406 | 12.012 | ||
966 | 1.061 | 540 | 1.124 | 527 | 0.811 | |||
Kugou | 1 557 | 1.707 | 139 | 5.657 | 129 | 8.749 |
"
数据集 | 特征集合 | 流 g-mean | 字节 g-mean | 总体流分类准确率 | 总体字节分类准确率 |
Day917_1对比Day917_2 | Abacus | 0 | 0 | 87.8% | 21% |
HCBF | 41.2% | 31.8% | 90.4% | 87% | |
Day917_1对比Day917_3 | Abacus | 0 | 0 | 86.8% | 48.7% |
HCBF | 59.9% | 34.7% | 92% | 70.5% | |
Day925_1对比Day925_2 | Abacus | 23.3% | 4.3% | 80.4% | 32.4% |
HCBF | 46.8% | 20.2% | 88.3% | 49.2% | |
Day925_1对比Day925_3 | Abacus | 34.4% | 16.9% | 85% | 57.8% |
HCBF | 33.9% | 26% | 86.9% | 52% |
[1] | WANG Y , XIANG Y , ZHANG J ,et al. Internet traffic clustering with side information[J]. Journal of Computer and System Sciences, 2014,80(5): 1021-1036. |
[2] | ZHANG J , CHEN X , XIANG Y ,et al. Robust Network Traffic Classification[J]. IEEE/ACM Transactions on Networking, 2015,23(4): 1257-1270. |
[3] | DAINOTTI A , PESCAP A . Issues and future directions in traffic classification[J]. IEEE Network, 2012,26(1): 35-40. |
[4] | CALLADO A , KAMIENSKI C . A survey on Internet traffic identification[J]. IEEE Communications Surveys & Tutorials, 2009,11(3): 37-52. |
[5] | KARAGIANNIS T , PAPAGIANNAKI K , FALOUTSOS M . BLINC:multilevel traffic classification in the dark[J]. ACM SIGCOMM, 2005,35(4): 229-240. |
[6] | ILIOFOTOU M , KIM H , FALOUTSOS M ,et al. Graption:a graph-based P2P traffic classification framework for the internet backbone[J]. Computer Networks, 2011,55(8): 1909-1920. |
[7] | BERMOLEN P , MELLIA M , MEOB M ,et al. Abacus:accurate behavioral classification of P2P-TV traffic[J]. Computer Networks, 2011(55): 1394-1411. |
[8] | ASAI H , FUKUDA K , ESAKI H . Traffic causality graphs:profiling network applications through temporal and spatial causality of flows[C]// The 23rd International Teletraffic Congress,Sept 6-9,2011,San Francisco,CA,USA. New Jersey: IEEE Press, 2011: 95-102. |
[9] | MOORE A , ZUEV D , CROGAN M . Discriminators for use in flow-based classification[C]// In Passive & Measurement Workshop 2003(PAM2005),August1,2005,London,England.[S.1.:s.n.]. 2005. |
[10] | HAJJAR A , KHALIFE J,DAZ-VERDEJO J . Network traffic application identification based on message size analysis[J]. Journal of Network and Computer Applications, 2015(58): 130-143. |
[11] | LIU Z , WANG R Y , TAO M ,et al. A class-oriented feature selection approach for multi-class imbalanced traffic datasets based on local and global metrics fusion[J]. Neurocomputing, 2015(168): 365-381. |
[12] | FAHAD A , TARI Z , KHALIL I ,et al. Toward an efficient and scalable feature selection approach for internet traffic classification[J]. Computer Networks, 2013,57(9): 2040-2057. |
[13] | HONG Y , HUANG C C , NANDY B ,et al. Iterative-tuning support vector machine for network traffic classification[C]// The 2015 IFIP/IEEE International Symposium on Integrated Network Management,May 11-15,2015,Ottawa,ON,Canada. New Jersey: IEEE Press, 2015: 458-466. |
[14] | HJELMVIK E , JOHN W . Breaking and improving protocol obfuscation:No.2010-05,ISSN 1652-926X[R].[S.1.:s.n.], 2010: 1-34. |
[15] | LEE S , KIM H , BARMAN D ,et al. NeTraMark:a network traffic classification benchmark[J]. ACM SIGCOMM Computer Communication Review, 2011,41(1): 23-30. |
[16] | GRINGOLI F , SALGARELLI L , DUSI M ,et al. GT:picking up the truth from the ground for internet traffic[J]. ACM SIGCOMM Computer Communication Review, 2009,39(5): 13-18. |
[17] | ZHANG J , XIANG Y , WANG Y ,et al. Network traffic classification using correlation information[J]. IEEE Transactions on Parallel & Distributed Systems, 2013,24(1): 104-117. |
[18] | WILLIAMS N , ZANDER S , ARMITAGE G . A preliminary performance comparison of five machine learning algorithms for practical IP traffic flow classification[J]. SIGCOMM Computer Communication Review, 2006,30(5): 5-16. |
[19] | 徐鹏, 林森 . 基于C4.5决策树的流量分类方法[J]. 软件学报, 2009,20(10): 2692-2704. XU P , LIN S.Internet traffic classification using C4 . 5 decision tree[J]. Journal of Software, 2009,20(10): 2692-2704. |
[1] | Zehua GUO, Haowen ZHU, Tongwen XU. Network modal innovation for distributed machine learning [J]. Telecommunications Science, 2023, 39(6): 44-51. |
[2] | Yaqiong LIU, Zhe LYU, Yafei ZHAO, Guochu SHOU. A survey on AI techniques applied in the satellite communication/satellite Internet field [J]. Telecommunications Science, 2023, 39(2): 10-24. |
[3] | Jianwu ZHANG, Yanjun AN, Huangyan DENG. A survey on DNS attack detection and security protection [J]. Telecommunications Science, 2022, 38(9): 1-17. |
[4] | Zhichao ZHOU, Yi FENG, Xiaohan XIA, Yuyao FENG, Chao CAI, Jiahui QIU, Lihui YANG, Yunxiao WU. Outdoor location scheme with fingerprinting based on machine learning of mobile cellular network [J]. Telecommunications Science, 2021, 37(8): 85-95. |
[5] | Xiang LI,Yuan LI,Zifei ZHANG,Zhe YANG. A density clustering-based network performance failure big data analysis algorithm [J]. Telecommunications Science, 2020, 36(9): 51-58. |
[6] | Ziyu XIAO. A review of key technologies for the future of the 2030 network——Beyond 5G [J]. Telecommunications Science, 2020, 36(9): 114-121. |
[7] | Yaxing QIU,Xidong WANG,Sen BIAN,Lei YUE. Load balancing based on clustering analysis and deep learning for multi-frequency and multi-mode network [J]. Telecommunications Science, 2020, 36(7): 156-162. |
[8] | Ye OUYANG,Aidong YANG,Fanyu MENG. A game theory-assisted machine learning methodology for subscriber churn behaviors detection [J]. Telecommunications Science, 2020, 36(6): 79-89. |
[9] | Feng LIN,Liujing XU,Xiaohua CHEN,Weiqiang QI,Ke CHEN,Tiantian ZHU. Method of Webshell detection based on multi-view feature fusion [J]. Telecommunications Science, 2020, 36(6): 125-132. |
[10] | Jiantao SHENG,Maofei CHEN,Dongxin LIU,Laifu WANG,Guoshui SHI,Huamin JIN. Detection of malicious domain name based on a classifier combination [J]. Telecommunications Science, 2020, 36(5): 47-55. |
[11] | Tao PANG,Haihua QIU,Biying PAN. Research on artificial intelligence key technologies of mobile terminal [J]. Telecommunications Science, 2020, 36(5): 145-151. |
[12] | Qizhu ZHONG. Research and application of VoLTE video call quality based on machine learning [J]. Telecommunications Science, 2020, 36(3): 156-165. |
[13] | Zishan LIU,Qiang CHENG,Bo LV. A survey on key technologies of privacy protection for machine learning [J]. Telecommunications Science, 2020, 36(11): 18-27. |
[14] | Xiaolian CHEN,Yi QIN,Jie ZHANG,Yajie LI,Haokun SONG,Huibin ZHANG. Optical fiber eavesdropping detection method based on machine learning [J]. Telecommunications Science, 2020, 36(11): 61-67. |
[15] | Fei GUI,Yang CHENG,Dan LI,Sihong HONG. Internet intelligent routing architecture and algorithm [J]. Telecommunications Science, 2020, 36(10): 12-20. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|