Application and Optimization of Convolutional Neural Networks Based on Deep Learning in Network Traffic Classification and Anomaly Detection
Abstract
With the rapid development of Internet technology, the complexity and diversity of network traffic have increased significantly, and traditional network traffic classification and anomaly detection methods are unable to deal with current network threats. To solve this problem, this paper proposes a network traffic classification and anomaly detection technology based on deep learning. Through the analysis and experiment of a large number of network traffic data, this paper constructs a convolutional neural network model to accurately identify and classify normal traffic and abnormal traffic. The experimental results show that the accuracy of the proposed model on the test dataset reaches 98.7%, excellent performance was achieved on the CIC-IDS2017 and ISCX VPN NOVPN datasets, with accuracies of 98.5% and 99.2%, respectively, significantly improving recall and F1 score, and effectively reducing error rates, outperforming traditional methods. In addition, this paper further optimizes the model by comparing and analyzing the performance of different network structures, and finally reduces the false alarm rate to 1.5%. This research provides effective technical support for improving network security, deeply analyzes the influence of different network structures and parameters on the performance of the model, and finally optimizes the best model, which shows strong robustness and adaptability in multiple real network environmentsReferences
References
Afuwape, A. A., Xu, Y., Anajemba, J. H., & Srivastava, G. Performance evaluation of secured network traffic classification using a machine learning approach. Computer Standards & Interfaces, vol. 78, pp. 103545, 2021.
Bozkır, R., Ci̇ci̇oğlu, M., Çalhan, A., & Toğay, C. A new platform for machine-learning-based network traffic classification. Computer Communications, vol. 208, pp. 1-14, 2023.
Cai, W., Hou, C., Cui, M., Wang, B., Xiong, G., & Gou, G. Incremental encrypted traffic classification via contrastive prototype networks. Computer Networks, vol. 250, pp. 110591, 2024.
Hu, G., Xiao, X., Shen, M., Zhang, B., Yan, X., & Liu, Y. TCGNN: Packet-grained network traffic classification via Graph Neural Networks. Engineering Applications of Artificial Intelligence, vol. 123, pp. 106531, 2023.
Hu, Y., Zeng, Z., Song, J., Xu, L., & Zhou, X. Online network traffic classification based on external attention and convolution by IP packet header. Computer Networks, vol. 252, pp. 110656, 2024.
Huang, H., Lu, Y., Zhou, S., Zhang, X., & Li, Z. CoTNeT: Contextual transformer network for encrypted traffic classification. Egyptian Informatics Journal, vol. 26, pp. 100475, 2024.
Izadi, S., Ahmadi, M., & Nikbazm, R. Network traffic classification using convolutional neural network and ant-lion optimization. Computers and Electrical Engineering, vol. 101, pp. 108024, 2022.
Le, S., Lai, Y., Wang, Y., & He, H. An adaptive classification and updating method for unknown network traffic in open environments. Computer Networks, vol. 238, pp. 110114, 2024.
Liu, W., Zhu, C., Ding, Z., Zhang, H., & Liu, Q. Multiclass imbalanced and concept drift network traffic classification framework based on online active learning. Engineering Applications of Artificial Intelligence, vol. 117, pp. 105607, 2023.
Ma, Y., Li, Z., Xue, H., & Chang, J. A balanced supervised contrastive learning-based method for encrypted network traffic classification. Computers & Security, vol. 145, pp. 104023, 2024.
Moreira, R., Moreira, L. F. R., & Silva, F. de O. An intelligent network monitoring approach for online classification of Darknet traffic. Computers and Electrical Engineering, vol. 110, pp. 108852, 2023.
Obasi, T., & Shafiq, M. O. CARD-B: A stacked ensemble learning technique for classification of encrypted network traffic. Computer Communications, vol. 190, pp. 110-125, 2022.
Wang, L., Ma, X., Li, N., Lv, Q., Wang, Y., Huang, W., & Chen, H. TGPrint: Attack fingerprint classification on encrypted network traffic based graph convolution attention networks. Computers & Security, vol. 135, pp. 103466, 2023.
Wang, Z., Li, Z., Fu, M., Ye, Y., & Wang, P. Network traffic classification based on federated semi-supervised learning. Journal of Systems Architecture, vol. 149, pp. 103091, 2024.
Zhang, H., & Qiu, J. A novel navigation and charging strategy for electric vehicles based on customer classification in power-traffic network. International Journal of Electrical Power & Energy Systems, vol. 158, pp. 109931, 2024.
Zhao, J., Jing, X., Yan, Z., & Pedrycz, W. Network traffic classification for data fusion: A survey. Information Fusion, vol. 72, pp. 22-47, 2021.
Chen, J., Chen, Y., Cai, S., Yin, S., Zhao, L., & Zhang, Z. An optimized feature extraction algorithm for abnormal network traffic detection. Future Generation Computer Systems, vol. 149, pp. 330-342, 2023.
Chen, J., Lv, T., Cai, S., Song, L., & Yin, S. A novel detection model for abnormal network traffic based on bidirectional temporal convolutional network. Information and Software Technology, vol. 157, pp. 107166, 2023.
Dong, S., Su, H., & Liu, Y. A-CAVE: Network abnormal traffic detection algorithm based on variational autoencoder. ICT Express, vol. 9(5), pp. 896-902, 2023.
Guo, H., Mao, Y., He, X., Zhang, B., Pang, T., & Ping, P. Improving federated learning through abnormal client detection and incentive. CMES - Computer Modeling in Engineering and Sciences, vol. 139(1), pp. 383-403, 2023.
Hong, H. G., Jang, S. H., Yun, H. Y., & Cho, Y. J. Development of abnormal facial temperature detection technology using thermal imaging to prevent the spread of infectious diseases. Journal of King Saud University - Computer and Information Sciences, vol. 35(9), pp. 101754, 2023.
Su, T., Wang, J., Hu, W., Dong, G., & Gwanggil, J. Abnormal traffic detection for internet of things based on an improved residual network. Computers, Materials and Continua, vol. 79(3), pp. 4433-4448, 2024.
Wang, K., Fu, Y., Duan, X., Liu, T., & Xu, J. Abnormal traffic detection system in SDN based on deep learning hybrid models. Computer Communications, vol. 216, pp. 183-194, 2024.
Wang, W. (2024). Abnormal traffic detection for Internet of Things based on an improved Residual Network. Physical Communication, vol. 66, pp. 102406, 2024.
Wang, Z., Ni, A., Tian, Z., Wang, Z., & Gong, Y. Research on blockchain abnormal transaction detection technology combining CNN and transformer structure. Computers and Electrical Engineering, vol. 116, pp. 109194, 2024.
Zheng, L., Zhang, J., Wang, X., Lin, F., & Meng, Z. Multimodal-based abnormal behavior detection method in virtualization environment. Computers & Security, vol. 143, pp. 103908, 2024.
DOI:
https://doi.org/10.31449/inf.v49i14.7602Downloads
Published
How to Cite
Issue
Section
License
I assign to Informatica, An International Journal of Computing and Informatics ("Journal") the copyright in the manuscript identified above and any additional material (figures, tables, illustrations, software or other information intended for publication) submitted as part of or as a supplement to the manuscript ("Paper") in all forms and media throughout the world, in all languages, for the full term of copyright, effective when and if the article is accepted for publication. This transfer includes the right to reproduce and/or to distribute the Paper to other journals or digital libraries in electronic and online forms and systems.
I understand that I retain the rights to use the pre-prints, off-prints, accepted manuscript and published journal Paper for personal use, scholarly purposes and internal institutional use.
In certain cases, I can ask for retaining the publishing rights of the Paper. The Journal can permit or deny the request for publishing rights, to which I fully agree.
I declare that the submitted Paper is original, has been written by the stated authors and has not been published elsewhere nor is currently being considered for publication by any other journal and will not be submitted for such review while under review by this Journal. The Paper contains no material that violates proprietary rights of any other person or entity. I have obtained written permission from copyright owners for any excerpts from copyrighted works that are included and have credited the sources in my article. I have informed the co-author(s) of the terms of this publishing agreement.
Copyright © Slovenian Society Informatika







