Bidirectional Flow-Based Image Representation Method for Detecting Network Traffic Service Categories

Authors

  • Ziyu Jiang

DOI:

https://doi.org/10.54097/mwyge502

Keywords:

Bidirectional Flow; Image Representation; Network Traffic; Detection

Abstract

Network traffic identification is crucial for network resource management and improving service quality. Traditional methods, such as port-based and deep packet inspection approaches, face challenges due to the increasing complexity of network environments, privacy concerns, and the emergence of encrypted traffic. This paper aims to address the issues of low accuracy and slow operation speed in encrypted traffic classification while ensuring the protection of user privacy. We propose a data processing method that transforms network traffic into images representing bidirectional flow packet arrival timestamps and packet sizes. By employing this data processing approach and utilizing deep recognition algorithms, the study conducts service analysis on network traffic. Experimental results demonstrate that the bidirectional flow-based image representation method achieves a 90.9% accuracy rate for the traffic analysis task on a TOR-encrypted imbalanced dataset, surpassing the accuracy of the unidirectional flow image method. Furthermore, the method also shows improvements in operation speed, enabling online network traffic detection.

Downloads

Download data is not yet available.

References

Chen, Zhitang, et al. "Seq2Img: A sequence-to-image based approach towards IP traffic classification using convolutional neural networks." 2017 IEEE International Conference on Big Data (Big Data) 2017.

Shapira, Tal, and Y. Shavitt. "FlowPic: A Generic Representation for Encrypted Traffic Classification and Applications Identification." IEEE Transactions on Network and Service Management. 99, (2021):1-10.

Le Cun, Yann, et al. "Handwritten zip code recognition with multilayer networks." 10th International Conference on Pattern Recognition. 2, (1990).

Lashkari, Arash Habibi, et al. "Characterization of Tor Traffic using Time based Features." International Conference on Information Systems Security & Privacy 3, (2017).

Qin, Tao , et al. "Robust application identification methods for P2P and VoIP traffic classification in backbone networks." Knowledge-Based Systems 82.C, (2015):152-162.

Szegedy, C. , A. Toshev , and D. Erhan . "Deep Neural Networks for object detection." Advances in Neural Information Processing Systems 26, (2013).

Aouini, Zied, and Adrian Pekar. "NFStream: A flexible network data analysis framework." Computer Networks, vol. 204, Elsevier, (2022), 108719.

Lecun, Yann , et al. "Gradient-Based Learning Applied to Document Recognition." Proceedings of the IEEE 86(11), (1998): 2278-2324

Hinton, Geoffrey E. , et al. "Improving neural networks by preventing co-adaptation of feature detectors.", http://dx.doi.org/10.9774/GLEAF.978-1-909493-38-4_2. 2012.

Kingma, Diederik , and J. Ba . "Adam: A Method for Stochastic Optimization." Computer Science (2014).

Downloads

Published

13-03-2024

How to Cite

Jiang, Z. (2024). Bidirectional Flow-Based Image Representation Method for Detecting Network Traffic Service Categories. Highlights in Science, Engineering and Technology, 85, 89-95. https://doi.org/10.54097/mwyge502