A New Network Traffic Identification Base on Deep Factorization Machine
Effective network traffic identification has important significance for network monitoring and management, network planning and user behavior analysis. In order to select and extract the most effective attribute as well as explore the inherent correlation between the attributes of network traffic. We proposed a new network traffic identification method based on deep factorization machine (DeepFM) which can classify and do correlation analysis simultaneously. Specifically, we first embed the feature vector into a joint space using a low-rank matrix, then followed by a factorization machine (FM) which handle the low-order feature crosses and a neural network which can learn the high- order feature crosses, finally the low-order feature crosses and high-order feature crosses are fused and give the classified result. We validate our method on Moore dataset which is widely used in network traffic research. Our results demonstrate that DeepFM model not only have a strong ability of network traffic identification but also can reveal some inherent correlation between the attributes.
KeywordsTraffic identification Neural networks Factorization machine
- 2.Madhukar, A., Williamson, C.: A longitudinal study of P2P traffic classification. In: 14th IEEE International Symposium on Modeling, Analysis, and Simulation, pp. 179–188. IEEE, Monterey (2006)Google Scholar
- 3.Ma, J., Levchenko, K., Kreibich, C., et al.: Unexpected means of protocol inference. In: 6th ACM SIGCOMM Conference on Internet Measurement, pp. 313–326. ACM, Rio de Janeiro (2006)Google Scholar
- 9.Rendle, S.: Factorization machines. In: 10th IEEE International Conference on Data Mining, pp. 995–1000. IEEE, Sydney (2010)Google Scholar
- 11.Guo, H., Tang, R., Ye, Y., et al.: DeepFM: a factorization-machine based neural network for CTR prediction (2017)Google Scholar
- 12.Zhu, W., Zeng, N., Wang, N.: Sensitivity, specificity, accuracy, associated confidence interval and ROC analysis with practical SAS implementations. In: NESUG Proceedings: Health Care and Life Sciences, vol. 19, p. 67 (2010)Google Scholar