Title: Sruthi
Title: Sruthi
SRUTHI
ABSTRACT
• Network traffic classification aims to recognize different application or traffic types by
analyzing received data packets. This paper presents a neural network model with deep and parallel
• Comparing with standard convolutional neural networks (CNN), NIN adopts a micro network
• Besides, NIN utilizes a global average pooling instead of traditional fully connected layers
before final classification, which reduces the number of model parameters significantly.
• In our proposed method, deep NIN models with multiple MLP convolutional layers are built to
• Furthermore, a parallel decision strategy of building two subnetworks to process packet header
and packet body separately is designed considering that they may carry different kinds of clues
for classification.
• The results of our experiments on the “ISCX VPN-nonVPN” encrypted traffic dataset show
that NIN models can achieve a better balance between classification accuracy and model
• Deep learning models, uch as deep neural networks (DNNs), convolutional neural
networks (CNNs) and recurrent neural networks (RNNs), have be applied to various research
• Comparing with conventional statistical classifiers, deep learning models are better at
describing the complex and nonlinear mapping relationship from input features towards
class labels.
• Besides, deep learning models are able to learn feature representations automatically from raw
data, which alleviates the dependency on manually designed features and simplifies the
pipeline of building classifiers. Therefore, such deep learning models have been introduced
•
Hardware Requirements:
• This project has presented a method of building deep and parallel network-in-network (NIN)
models for encrypted network traffic classification. This method aims at mapping fixed-length
data packets towards the labels of application or traffic categories. Based on deep NIN networks
with multiple MLP convolutional modules, a parallel decision strategy is designed which builds
two sub-networks for processing packet header and packet body separately. Experimental results
on the “ISCX VPN-nonVPN” encrypted traffic dataset show that NIN models achieved better
performance than CNNs. Besides, the parallel decision strategy further improved the accuracy of
using single NIN model for traffic classification. To boost the performance of encrypted traffic
classification using only Application Layer data will be a task of our future work.
REFERENCES
• [1] A. Dainotti, A. Pescape, and K. C. Claffy, “Issues and future directions in traffic classification,” IEEE network, vol. 26, no.
• [2] A. W. Moore and K. Papagiannaki, “Toward the accurate identification of network applications,” in International
Workshop on Passive and Active Network Measurement. Springer, 2005, pp. 41–54.
• [3] M. Finsterbusch, C. Richter, E. Rocha, J.-A. Muller, and K. Hanssgen, “A survey of payload-based traffic classification
approaches,” IEEE Communications Surveys & Tutorials, vol. 16, no. 2, pp. 1135–1156, 2013.
• [4] B. Yamansavascilar, M. A. Guvensan, A. G. Yavuz, and M. E. Karsligil, “Application identification via network traffic
classification,” in 2017 International Conference on Computing, Networking and Communications (ICNC). IEEE, 2017, pp.
843–848.
• [5] G. Draper-Gil, A. H. Lashkari, M. S. I. Mamun, and A. A. Ghorbani, “Characterization of encrypted and VPN traffic
using time-related,” in Proceedings of the 2nd international conference on information systems security and privacy
• [6] R. Yuan, Z. Li, X. Guan, and L. Xu, “An svm-based machine learning method for accurate internet traffic classification,”
• [7] G. Hinton, S. Osindero, and Y.-W. Teh, “A fast learning algorithm for deep belief nets,” Neural Computation, vol. 18, no.