Deep Learning Approaches For Network Traffic Classification in The Internet of Things (Iot) : A Survey
Deep Learning Approaches For Network Traffic Classification in The Internet of Things (Iot) : A Survey
(IoT): A Survey
Table 1: A Selection of Recent Deep Learning Models for IoT Network Traffic Classification
Application based
[17] 2020 Deep CNN Moore dataset
Classification
Binary & Multiclass Malicious
[2] 2020 Deep CNN NSL-KDD
Traffic Classification
D-PACK: CNN + Autoencoder for USTC-TFC2016, Mirai-RGU,
[20] 2020 Malicious Traffic Classification
auto-profiling Mirai-CCU
Custom (converted to
[10] 2020 ResNet-50 Malicious Traffic Classification
binvis)
Mini-Batch Gradient Descent with an
[57] 2020 Custom Anomaly Detection
Adaptive Learning Rate and Momentum
Application based
[47] 2021 Cost sensitive CNN ISCX VPN-nonVPN
Classification
ByteSGAN: A Semi-Supervised Generative Application based
[54] 2021 ISCX VPN-nonVPN + Custom
Adversarial Network Classification
[55] 2021 Logarithmic Neural Network (LOGNN) NSL-KDD and UNSW-NB15. Intrusion Detection
5G Network Traffic
[15] 2021 Based on Deep Transfer Learning USTC-TFC2016
Classification
UNSW-NB15, CICIDS2017,
[9] 2022 CNN With Deep Feature Extraction Real-Time Intrusion Detection
and KDDCup99
3 Models: VGG-DALNet Model, Res-DALNet
[19] 2022 USTC-TFC2016 Malicious Traffic Classification
Model, Alex-DALNet Model
Recurrent Kernel CNN-Modified Monarch
[37] 2022 N-BaIoT and CICIDS-2017 Intrusion Detection
Butterfly Optimization
2 Stage Distillation Aware Compressed Application based
[30] 2022 ISCX VPN-nonVPN
Deep CNN Models Classification
Knowledge-Transfer-ConvLaddernet and
[34] 2022 USTC-TFC2016 + Custom Malicious Traffic Classification
KT-Domain-Adaptive-ConvLaddernet
UNSW-NB15 and
[60] 2022 LSTM DNN Intrusion Detection
Bot-IoT
Simplified Time Convolutional Network Multi-Class Malicious Traffic
[56] 2022 CSE-CICIDS2018 + Custom
(S-TCN) Classification
Confidence Measure-Based Ensemble Deep Realtime Multiclass Traffic
[44] 2022 ISCX VPN-nonVPN
Learning Model Classification
[41] 2022 Transfer Learning with CNNs BoT-IoT and UNSW-NB15 Zero-Day Attack Detection
5.6 Intrusion Detection The proposed models for intrusion detection in network
traffic classification in IoT offer several strengths. The
Intrusion detection by network traffic classification in IoT
MEMBER framework in [25] captures comprehensive and
involves utilizing deep learning techniques to identify and
robust feature representations, leading to improved
detect potential security breaches or unauthorized
generalization ability. The HetIoT-CNN IDS in [31] is
activities within IoT networks. Deep learning models are
lightweight, efficient in terms of time, and less complex,
trained on large amounts of network traffic data to learn
making it suitable for resource-constrained IoT
patterns and behaviors associated with normal and
environments. The IoT intrusion detection system in [58]
malicious network activity. This approach is crucial for IoT
shows effectiveness in detecting intrusions and can be
security as it enables real-time monitoring and proactive
further enhanced by exploring different deep learning
identification of anomalies, helping to protect IoT devices,
models with varied architectures. The customized feed-
networks, and sensitive data from cyber threats.
forward neural network in [14] leverages network
Several models have been proposed to detect and classify embedding and transfer learning techniques, which
intrusions in IoT networks based on network traffic. The enhance its ability to capture relevant features and improve
MEMBER framework proposed in [25] leverages multi-task classification accuracy. The RKCNN-MMBO model in [37]
learning for intrusion detection in imbalanced network combines kernel and DL-classifiers, enabling effective
scenarios. By combining statistical and packet content classification after preprocessing. The PB-DID approach in
features, the model captures rich representations and [60] addresses imbalance and overfitting issues in public
exhibits improved generalization ability. The inclusion of a datasets, reducing the number of features required for
memory module and attention mechanisms further identifying malicious traffic. The DFE method in [9]
enhances its performance. In the HetIoT (Heterogeneous enhances classification accuracy by extracting more
Internet of Things) environment, the HetIoT-CNN IDS, a information from input data while minimizing the
deep learning-based CNN, is proposed in [31]. This IDS computational requirements, making it suitable for real-
demonstrates high accuracy in detecting benign and DDoS time intrusion detection in IoT devices with limited
processing capabilities.
While the proposed models demonstrate strengths, they Multiple models have been proposed for zero-day attack
also have certain limitations. The MEMBER framework in detection in IoT networks through network traffic
[25] requires further research to detect multi-stage attacks classification. The intrusion detection framework
with long time spans and address the impact of highly introduced in [41] utilizes transfer learning and model
stealthy stealing attacks and adversarial attacks on model refinement techniques to improve detection accuracy in
performance and robustness. The HetIoT-CNN IDS in [31] limited and imbalanced datasets. The ADRIoT framework
focuses on a specific environment and should explore presented in [26]adopts an edge-assisted architecture and
additional models, such as Recurrent Neural Networks incorporates a multiedge collaborative mechanism to
(RNN), for detecting and predicting DDoS attacks. The IoT enable prompt detection of IoT-based attacks.
intrusion detection system in [58] would benefit from
expanding the dataset to include other IoT protocols, such The proposed models offer several strengths in the context
as the MQTT protocol, for comprehensive intrusion of zero-day attack detection in network traffic classification
detection coverage. The customized feed-forward neural in IoT. The intrusion detection framework in [41]
network in [14] demonstrates subpar performance in demonstrates excellent accuracy and low false positive
classifying specific attack subcategories, highlighting the rates, even for novel zero-day attack families. The
need for further improvement. The IDM utilizing the utilization of transfer learning and network fine-tuning
RKCNN-MMBO model in [37] requires reliability testing improves detection rates and outperforms previous deep
against severe attacks to ensure robust intrusion detection learning-based intrusion detection systems. The ADRIoT
capabilities. The PB-DID approach in [60], although framework in [26] leverages an edge-assisted architecture,
effective in addressing imbalance and overfitting, should enabling the anomaly detection module to run closer to the
explore the generalization of its methodology to diverse IoT data source for real-time detection. The incorporation of a
environments and datasets. The DFE method in [9] could multiedge collaborative mechanism enhances the resource
benefit from additional research to enhance the utilization on the edge, supporting efficient and effective
classification of minority classes by optimizing the detection of a wide range of IoT-based attacks.
permutation process.
Despite their strengths, the proposed models also face
To advance intrusion detection in IoT networks through certain limitations. The intrusion detection framework in
network traffic classification, several areas warrant further [41] primarily focuses on IoT network traffic from the
exploration. The proposed models can be enhanced by UNSW-NB15 dataset, necessitating further evaluation on
incorporating long-short term memory networks to real data from diverse IoT networks. Future research
leverage timestamp information and header fields for should extend the framework to detect other types of zero-
differentiating attack subcategories [14]. Reliability day attacks and assess its performance on lightweight IoT
measurement against severe attacks and accuracy devices with real IoT network traffic. The ADRIoT
evaluation of DL techniques can be conducted to strengthen framework in [26] relies on unsupervised anomaly
the IDM utilizing the RKCNN-MMBO model [37]. Future detection, which may limit its ability to detect novel zero-
work should also focus on extending the applicability of the day attacks with high accuracy. Additional research is
PB-DID approach to a wider range of IoT environments and needed to enhance the framework's capability to handle
expanding the dataset coverage to include additional IoT emerging and sophisticated zero-day attack patterns.
protocols [60]. For the DFE method [9], future research can
To advance zero-day attack detection in IoT networks
concentrate on optimizing the permutation process as an
through network traffic classification, several areas warrant
optimization problem, enabling improved classification of
further exploration. The intrusion detection framework
minority classes.
proposed in [41] can be extended to incorporate real data
5.7 Zero-Day Attack Detection from IoT networks, allowing for a more comprehensive
evaluation of its effectiveness and robustness. Future work
Zero-day attack detection by network traffic classification should also focus on enhancing the framework's ability to
in IoT involves identifying and mitigating previously detect diverse zero-day attack types, addressing the
unknown or undisclosed vulnerabilities and attack challenges posed by lightweight IoT devices, and exploring
techniques that exploit these vulnerabilities. Unlike techniques for handling real-time IoT network traffic. In the
traditional intrusion detection systems that rely on known case of the ADRIoT framework [26], future research should
attack patterns, zero-day attack detection employs consider incorporating supervised learning methods to
advanced machine learning algorithms to analyze network improve the accuracy of zero-day attack detection and
traffic data and identify anomalous behavior that may further refine the collaborative mechanism to optimize
indicate a new or unknown attack. This approach is crucial resource utilization on the edge.
for IoT security as it provides an additional layer of defense
against emerging threats, ensuring the timely detection and
prevention of attacks that could exploit vulnerabilities that 6 CONCLUSIONS AND FUTURE DIRECTIONS
have not yet been patched or addressed by security Advancements in network traffic classification for IoT using
updates. By proactively identifying and mitigating zero-day deep learning techniques have shown promising results in
attacks, organizations can significantly reduce the potential various areas, including application awareness, accuracy
damage caused by these advanced threats and safeguard improvement, malicious traffic detection, anomaly
their IoT infrastructure and sensitive data. detection, botnet detection, intrusion detection, and zero-
day attack detection. These advancements have brought To overcome these limitations and further enhance
several strengths to the field. For instance, models such as network traffic classification in IoT environments, future
CSCNN, ByteSGAN, deep transfer learning, TSCRNN, GLADS, research efforts should focus on exploring additional
DF model, and others demonstrate superior performance, techniques. Recurrent neural networks, reinforcement
versatility, and fast detection speed. They exhibit strengths learning, transfer learning, federated learning, parallel
like effective feature extraction, robustness in handling processing, real-time anomaly detection, high-performance
encrypted traffic, enhanced trustworthiness, and improved computing, and supervised learning for labeling anomalies
representation learning. are some of the directions that should be pursued.
Additionally, refinement of models, exploration of new
However, these models also face certain limitations that architectures and techniques, expansion of datasets,
need to be addressed. Computation complexity, addressing privacy and explainability concerns,
convergence speed, GAN training challenges, unbalanced differentiation of attack subcategories, reliability testing,
traffic types, limited labeled data, unbalanced traffic generalization to diverse environments, optimization of
datasets, real-world validation, handling zero-day classification for minority classes, and evaluation on real
applications, inference time, optimization requirements, IoT network data are key areas for future research. By
and computational complexities are some of the addressing these limitations and pursuing these avenues of
weaknesses associated with these models. Furthermore, research, advancements in network traffic classification in
vulnerabilities to adversarial machine learning techniques, IoT using deep learning techniques can lead to improved
limited detection scope, longer training and response times, security, privacy, trustworthiness, and defense against
and challenges in handling multi-stage attacks and various threats and vulnerabilities.
adversarial attacks are additional limitations.
[31] Shalaka Mahadik, Pranav M. Pawar, and Raja [41] Eva Rodríguez, Pol Valls, Beatriz Otero, Juan Jose
Muthalagu. 2023. Efficient Intelligent Intrusion Costa, Javier Verdu, Manuel Alejandro Pajuelo, and
Detection System for Heterogeneous Internet of Ramon Canal. 2022. Transfer-Learning-Based
Things (HetIoT). Journal of Network and Systems Intrusion Detection Framework in IoT Networks.
Management 31, 1 (March 2023). Sensors 22, 15 (August 2022).
DOI:https://doi.org/10.1007/s10922-022-09697- DOI:https://doi.org/10.3390/s22155621
x
[42] Miraqa Safi, Sajjad Dadkhah, Farzaneh Shoeleh,
[32] Matthew Dicks, Jonathan Tooke, and Shane Weisz. Hassan Mahdikhani, Heather Molyneaux, and Ali
2020. Review of Deep Learning Approaches to A. Ghorbani. 2022. A Survey on IoT Profiling,
Network Traffic Classification for Community Fingerprinting, and Identification. ACM
Networks. Retrieved June 3, 2023 from Transactions on Internet of Things 3, 4 (September
https://projects.cs.uct.ac.za/honsproj/2020/ 2022). DOI:https://doi.org/10.1145/3539736
[33] Nour Moustafa and Jill Slay. UNSW-NB15: A [43] Afef Saidi, Slim Ben Othman, Meriam Dhouibi, and
Comprehensive Data set for Network Intrusion Slim Ben Saoud. 2021. FPGA-based
Detection systems (UNSW-NB15 Network Data Set). implementation of classification techniques: A
Retrieved from https://cve.mitre.org/ survey. Integration 81, 280–299.
DOI:https://doi.org/10.1016/j.vlsi.2021.08.004
[34] Jinhui Ning, Guan Gui, Yu Wang, Jie Yang, Bamidele
Adebisi, Song Ci, Haris Gacanin, and Fumiyuki [44] Ola Salman, Imad H. Elhajj, Ali Chehab, and Ayman
Adachi. 2022. Malware Traffic Classification Using Kayssi. 2022. Towards efficient real-time traffic
Domain Adaptation and Ladder Network for classifier: A confidence measure with ensemble
Secure Industrial Internet of Things. IEEE Internet Deep Learning. Computer Networks 204,
Things J 9, 18 (September 2022), 17058–17069. (February 2022).
DOI:https://doi.org/10.1109/JIOT.2021.3131981 DOI:https://doi.org/10.1016/j.comnet.2021.1086
84
[35] Mehrnoosh Nobakht, Reza Javidan, and Alireza
Pourebrahimi. 2022. DEMD-IoT: a deep ensemble [45] Iqbal H. Sarker, Asif Irshad Khan, Yoosef B.
model for IoT malware detection using CNNs and Abushark, and Fawaz Alsolami. 2022. Internet of
network traffic. Evolving Systems (June 2022). Things (IoT) Security Intelligence: A
DOI:https://doi.org/10.1007/s12530-022-09471- Comprehensive Overview, Machine Learning
z Solutions and Research Directions. Mobile
Networks and Applications (2022).
[36] Nour Moustafa. 2019. The Bot-IoT dataset. IEEE DOI:https://doi.org/10.1007/s11036-022-01937-
Dataport. 3
[37] C. U. Om Kumar, Suguna Marappan, Bhavadharini [46] Hannes Schulz and Sven Behnke. 2012. Deep
Murugeshan, and V. Mercy Rajaselvi Beaulah. Learning. KI - Künstliche Intelligenz 26, 4 (2012),
357–363. DOI:https://doi.org/10.1007/s13218- Y) 617, (December 2022), 133–149.
012-0198-z DOI:https://doi.org/10.1016/j.ins.2022.10.060
[47] Mhd Saeed Sharif and Mina Moein. 2021. An [54] Pan Wang, Zixuan Wang, Feng Ye, and Xuejiao
Effective Cost-Sensitive Convolutional Neural Chen. 2021. ByteSGAN: A semi-supervised
Network for Network Traffic Classification. In Generative Adversarial Network for encrypted
2021 International Conference on Innovation and traffic classification in SDN Edge Gateway.
Intelligence for Informatics, Computing, and Computer Networks 200, (December 2021).
Technologies, 3ICT 2021, Institute of Electrical and DOI:https://doi.org/10.1016/j.comnet.2021.1085
Electronics Engineers Inc., 40–45. 35
DOI:https://doi.org/10.1109/3ICT53449.2021.95
81789 [55] Zhendong Wang, Zhenyu Xu, Daojing He, and
Sammy Chan. 2021. Deep logarithmic neural
[48] Manish Snehi and Abhinav Bhandari. 2022. A network for Internet intrusion detection. Soft
Novel Distributed Stack Ensembled Meta- comput 25, 15 (August 2021), 10129–10152.
Learning-Based Optimized Classification DOI:https://doi.org/10.1007/s00500-021-05987-
Framework for Real-time Prolific IoT Traffic 9
Streams. Arab J Sci Eng 47, 8 (August 2022), 9907–
9930. DOI:https://doi.org/10.1007/s13369-021- [56] Liu Xin, Liu Ziang, Zhang Yingli, Zhang Wenqiang,
06472-z Lv Dong, and Zhou Qingguo. 2022. TCN enhanced
novel malicious traffic detection for IoT devices.
[49] Fanhua Song, Donghong Qin, and Chen Xu. 2022. A Conn Sci 34, 1 (2022), 1322–1341.
Survey of Application of Artificial Intelligence DOI:https://doi.org/10.1080/09540091.2022.20
Methods in SDN. In 2022 2nd IEEE International 67124
Conference on Software Engineering and Artificial
Intelligence, SEAI 2022, Institute of Electrical and [57] Xiaodan Yan, Yang Xu, Xiaofei Xing, Baojiang Cui,
Electronics Engineers Inc., 237–242. Zihao Guo, and Taibiao Guo. 2020. Trustworthy
DOI:https://doi.org/10.1109/SEAI55746.2022.98 Network Anomaly Detection Based on an Adaptive
32340 Learning Rate and Momentum in IIoT. IEEE Trans
Industr Inform 16, 9 (September 2020), 6182–
[50] Naeem Firdous Syed, Mengmeng Ge, and Zubair 6192.
Baig. 2023. Fog-cloud based intrusion detection DOI:https://doi.org/10.1109/TII.2020.2975227
system using Recurrent Neural Networks and
feature selection for IoT networks. Computer [58] Jianbin Ye and Bo Liu. 2022. A deep learning-
Networks 225, (April 2023). based system for IoT intrusion detection. SPIE-Intl
DOI:https://doi.org/10.1016/j.comnet.2023.1096 Soc Optical Eng, 72.
62 DOI:https://doi.org/10.1117/12.2639322
[51] Ankit Thakkar and Ritika Lohiya. 2021. A Review [59] Tao Yi, Xingshu Chen, Yi Zhu, Weijing Ge, and
on Machine Learning and Deep Learning Zhenhui Han. 2023. Review on the application of
Perspectives of IDS for IoT: Recent Updates, deep learning in network attack detection. Journal
Security Issues, and Challenges. Archives of of Network and Computer Applications 212.
Computational Methods in Engineering 28, 4 (June DOI:https://doi.org/10.1016/j.jnca.2022.103580
2021), 3211–3243.
[60] Muhammad Zeeshan, Qaiser Riaz, Muhammad
DOI:https://doi.org/10.1007/s11831-020-09496-
Ahmad Bilal, Muhammad K. Shahzad, Hajira
0
Jabeen, Syed Ali Haider, and Azizur Rahim. 2022.
[52] Daravichet Tin, Maryam Shahpasand, Hassan Protocol-Based Deep Intrusion Detection for DoS
Habibi Gharakheili, and Gustavo Batista. 2022. and DDoS Attacks Using UNSW-NB15 and Bot-IoT
Classifying Time-Series of IoT Flow Activity using Data-Sets. IEEE Access 10, (2022), 2269–2283.
Deep Learning and Intransitive Features. In DOI:https://doi.org/10.1109/ACCESS.2021.3137
International Conference on Software, Knowledge 201
Information, Industrial Management and
[61] Shizhou Zhu, Xiaolong Xu, Honghao Gao, and Fu
Applications, SKIMA, Institute of Electrical and
Xiao. 2023. CMTSNN: A deep learning model for
Electronics Engineers Inc., 192–197.
multi-classification of abnormal and encrypted
DOI:https://doi.org/10.1109/SKIMA57145.2022.
traffic of Internet of Things. IEEE Internet Things J
10029420
(2023).
[53] Jun Wang, Hanlei Jin, Junxiao Chen, Jinghua Tan, DOI:https://doi.org/10.1109/JIOT.2023.3244544
and Kaiyang Zhong. 2022. Anomaly detection in
[62] 2023. OT/IoT Security Report A Deep Look Into the
Internet of medical Things with Blockchain from
ICS Threat Landscape - 2022 2H Review.
the perspective of deep neural network. Inf Sci (N