Skip to main content

Research on Network Traffic Classification Method Based on CNN–RNN

  • Conference paper
  • First Online:
3D Imaging—Multidimensional Signal Processing and Deep Learning

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 348))

Abstract

With the continued development of the information society, the scale of the Internet grows ever larger, and the enormous amount of traffic data throughput in the Internet is so diverse that the difficulty of the network traffic classification problem is constantly challenged, and the speed and accuracy of the classifier are put forward to higher standards. It is critical to understand how to continuously optimize network traffic classification techniques using existing technologies for implementing network security censorship, strengthening network security management, detecting and defending against network intrusion, and so on. The traditional port-based classification method is no longer reliable in today's increasingly complex network environment, and the deep packet inspection technique is inapplicable to the classification of encrypted network traffic. The machine learning-based classification method has good classification performance and solves the problem that deep packet inspection cannot identify encrypted network traffic, which has been a hot research topic in network traffic classification in the recent years. To address the shortcomings of existing methods, this paper proposes a classification method combining recurrent neural network and convolutional neural network within the framework of machine learning.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Free shipping worldwide - see info
Hardcover Book
USD 249.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Dainotti, A., Pescape, A., Claffy, K.C.: Issues and future directions in traffic classification. IEEE Network 26(1), 35–40 (2012)

    Article  Google Scholar 

  2. Kawano, S., Okugawa, T., Yamamoto, T., Motono, T., Takagi, Y.: High-speed DPI method using multi-stage packet flow analyses. In 2012 9th Asia-Pacific Symposium on Information and Telecommunication Technologies (APSITT) (pp. 1–6). IEEE (2012).

    Google Scholar 

  3. Wang, W., Zhu, M., Wang, J., Zeng, X., Yang, Z.: End-to-end encrypted traffic classification with one-dimensional convolution neural networks. In 2017 IEEE international conference on intelligence and security informatics (ISI) (pp. 43–48). IEEE (2017)

    Google Scholar 

  4. Auld, T., Moore, A.W., Gull, S.F.: Bayesian neural networks for internet traffic classification. IEEE Trans. Neural Networks 18(1), 223–239 (2007)

    Article  Google Scholar 

  5. Moore, A. W., Zuev, D.: Internet traffic classification using bayesian analysis techniques. In Proceedings of the 2005 ACM SIGMETRICS international conference on Measurement and modeling of computer systems (pp. 50–60) (2005)

    Google Scholar 

  6. Draper-Gil, G., Lashkari, A. H., Mamun, M. S. I., Ghorbani, A. A.: Characterization of encrypted and vpn traffic using time-related. In Proceedings of the 2nd international conference on information systems security and privacy (ICISSP) (pp. 407–414) (2016)

    Google Scholar 

  7. Shen, M., Zhang, J., Zhu, L., Xu, K., Du, X., Liu, Y.: Encrypted traffic classification of decentralized applications on ethereum using feature fusion. In 2019 IEEE/ACM 27th International Symposium on Quality of Service (IWQoS) (pp. 1–10). IEEE (2019)

    Google Scholar 

  8. Taylor, V. F., Spolaor, R., Conti, M., Martinovic, I.: Appscanner: Automatic fingerprinting of smartphone apps from encrypted network traffic. In 2016 IEEE European Symposium on Security and Privacy (EuroS&P) (pp. 439–454). IEEE (2016)

    Google Scholar 

  9. Moreira, R., Rodrigues, L. F., Rosa, P. F., Aguiar, R. L., de Oliveira Silva, F.: Packet vision: a convolutional neural network approach for network traffic classification. In 2020 33rd SIBGRAPI Conference on Graphics, Patterns and Images (SIBGRAPI) (pp. 256–263). IEEE (2020)

    Google Scholar 

  10. Li, R., Xiao, X., Ni, S., Zheng, H., Xia, S.: Byte segment neural network for network traffic classification. In 2018 IEEE/ACM 26th International Symposium on Quality of Service (IWQoS) (pp. 1–10). IEEE (2018)

    Google Scholar 

  11. Wu, H., Zhang, X., Yang, J.: Deep learning-based encrypted network traffic classification and resource allocation in SDN. J. Web Eng. 2319–2334 (2021)

    Google Scholar 

  12. Adhao, R. B., Pachghare, V. K.: Network Traffic Classification Using Feature Selections and two-tier stacked classifier. Int. J. Next-Gener. Comput. 12(5) (2021)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhaotao Wu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wu, Z., Long, Z. (2023). Research on Network Traffic Classification Method Based on CNN–RNN. In: Patnaik, S., Kountchev, R., Tai, Y., Kountcheva, R. (eds) 3D Imaging—Multidimensional Signal Processing and Deep Learning. Smart Innovation, Systems and Technologies, vol 348. Springer, Singapore. https://doi.org/10.1007/978-981-99-1145-5_24

Download citation

Publish with us

Policies and ethics