Encrypted Internet traffic classification using a supervised Spiking Neural Network
Internet traffic recognition is an essential tool for access providers since recognizing traffic categories related to different data packets transmitted on a network help them define adapted priorities. That means, for instance, high priority requirements for an audio conference and low ones for a...
Gespeichert in:
Veröffentlicht in: | arXiv.org 2022-07 |
---|---|
Hauptverfasser: | , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | arXiv.org |
container_volume | |
creator | Rasteh, Ali Delpech, Florian Aguilar-Melchor, Carlos Zimmer, Romain Saeed Bagheri Shouraki Masquelier, Timothée |
description | Internet traffic recognition is an essential tool for access providers since recognizing traffic categories related to different data packets transmitted on a network help them define adapted priorities. That means, for instance, high priority requirements for an audio conference and low ones for a file transfer, to enhance user experience. As internet traffic becomes increasingly encrypted, the mainstream classic traffic recognition technique, payload inspection, is rendered ineffective. This paper uses machine learning techniques for encrypted traffic classification, looking only at packet size and time of arrival. Spiking neural networks (SNN), largely inspired by how biological neurons operate, were used for two reasons. Firstly, they are able to recognize time-related data packet features. Secondly, they can be implemented efficiently on neuromorphic hardware with a low energy footprint. Here we used a very simple feedforward SNN, with only one fully-connected hidden layer, and trained in a supervised manner using the newly introduced method known as Surrogate Gradient Learning. Surprisingly, such a simple SNN reached an accuracy of 95.9% on ISCX datasets, outperforming previous approaches. Besides better accuracy, there is also a very significant improvement on simplicity: input size, number of neurons, trainable parameters are all reduced by one to four orders of magnitude. Next, we analyzed the reasons for this good accuracy. It turns out that, beyond spatial (i.e. packet size) features, the SNN also exploits temporal ones, mostly the nearly synchronous (within a 200ms range) arrival times of packets with certain sizes. Taken together, these results show that SNNs are an excellent fit for encrypted internet traffic classification: they can be more accurate than conventional artificial neural networks (ANN), and they could be implemented efficiently on low power embedded systems. |
doi_str_mv | 10.48550/arxiv.2101.09818 |
format | Article |
fullrecord | <record><control><sourceid>proquest_arxiv</sourceid><recordid>TN_cdi_arxiv_primary_2101_09818</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2480954089</sourcerecordid><originalsourceid>FETCH-LOGICAL-a529-57779bc6f5322500a6a8ce39b22e5119964fa689691bbd767f3f87b1f2478cff3</originalsourceid><addsrcrecordid>eNotj8tOwzAURC0kJKrSD2BFJNYJ9nX8WqKqQKUKFu0-clIbuQ1OsJ1C_570sZrR1czoHoQeCC5KyRh-1uHPHQogmBRYSSJv0AQoJbksAe7QLMYdxhi4AMboBK0XvgnHPplttvTJBG9SloK21jVZ0-oY3eh0cp3Phuj8V6azOPQmHFwcK-ve7U_HDzME3Y6Sfruwv0e3VrfRzK46RZvXxWb-nq8-35bzl1WuGaicCSFU3XDLKADDWHMtG0NVDWAYIUrx0mouFVekrreCC0utFDWxUArZWEun6PEyeyau-uC-dThWJ_LqTD4mni6JPnQ_g4mp2nVD8ONPFZQSK1Ziqeg_FV1cFA</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2480954089</pqid></control><display><type>article</type><title>Encrypted Internet traffic classification using a supervised Spiking Neural Network</title><source>arXiv.org</source><source>Free E- Journals</source><creator>Rasteh, Ali ; Delpech, Florian ; Aguilar-Melchor, Carlos ; Zimmer, Romain ; Saeed Bagheri Shouraki ; Masquelier, Timothée</creator><creatorcontrib>Rasteh, Ali ; Delpech, Florian ; Aguilar-Melchor, Carlos ; Zimmer, Romain ; Saeed Bagheri Shouraki ; Masquelier, Timothée</creatorcontrib><description>Internet traffic recognition is an essential tool for access providers since recognizing traffic categories related to different data packets transmitted on a network help them define adapted priorities. That means, for instance, high priority requirements for an audio conference and low ones for a file transfer, to enhance user experience. As internet traffic becomes increasingly encrypted, the mainstream classic traffic recognition technique, payload inspection, is rendered ineffective. This paper uses machine learning techniques for encrypted traffic classification, looking only at packet size and time of arrival. Spiking neural networks (SNN), largely inspired by how biological neurons operate, were used for two reasons. Firstly, they are able to recognize time-related data packet features. Secondly, they can be implemented efficiently on neuromorphic hardware with a low energy footprint. Here we used a very simple feedforward SNN, with only one fully-connected hidden layer, and trained in a supervised manner using the newly introduced method known as Surrogate Gradient Learning. Surprisingly, such a simple SNN reached an accuracy of 95.9% on ISCX datasets, outperforming previous approaches. Besides better accuracy, there is also a very significant improvement on simplicity: input size, number of neurons, trainable parameters are all reduced by one to four orders of magnitude. Next, we analyzed the reasons for this good accuracy. It turns out that, beyond spatial (i.e. packet size) features, the SNN also exploits temporal ones, mostly the nearly synchronous (within a 200ms range) arrival times of packets with certain sizes. Taken together, these results show that SNNs are an excellent fit for encrypted internet traffic classification: they can be more accurate than conventional artificial neural networks (ANN), and they could be implemented efficiently on low power embedded systems.</description><identifier>EISSN: 2331-8422</identifier><identifier>DOI: 10.48550/arxiv.2101.09818</identifier><language>eng</language><publisher>Ithaca: Cornell University Library, arXiv.org</publisher><subject>Accuracy ; Artificial neural networks ; Audio data ; Classification ; Computer Science - Learning ; Computer Science - Networking and Internet Architecture ; Embedded systems ; Energy consumption ; Inspection ; Internet ; Learning theory ; Machine learning ; Neural networks ; Neurons ; Packet transmission ; Recognition ; Spiking</subject><ispartof>arXiv.org, 2022-07</ispartof><rights>2022. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><rights>http://creativecommons.org/licenses/by/4.0</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>228,230,776,780,881,27902</link.rule.ids><backlink>$$Uhttps://doi.org/10.48550/arXiv.2101.09818$$DView paper in arXiv$$Hfree_for_read</backlink><backlink>$$Uhttps://doi.org/10.1016/j.neucom.2022.06.055$$DView published paper (Access to full text may be restricted)$$Hfree_for_read</backlink></links><search><creatorcontrib>Rasteh, Ali</creatorcontrib><creatorcontrib>Delpech, Florian</creatorcontrib><creatorcontrib>Aguilar-Melchor, Carlos</creatorcontrib><creatorcontrib>Zimmer, Romain</creatorcontrib><creatorcontrib>Saeed Bagheri Shouraki</creatorcontrib><creatorcontrib>Masquelier, Timothée</creatorcontrib><title>Encrypted Internet traffic classification using a supervised Spiking Neural Network</title><title>arXiv.org</title><description>Internet traffic recognition is an essential tool for access providers since recognizing traffic categories related to different data packets transmitted on a network help them define adapted priorities. That means, for instance, high priority requirements for an audio conference and low ones for a file transfer, to enhance user experience. As internet traffic becomes increasingly encrypted, the mainstream classic traffic recognition technique, payload inspection, is rendered ineffective. This paper uses machine learning techniques for encrypted traffic classification, looking only at packet size and time of arrival. Spiking neural networks (SNN), largely inspired by how biological neurons operate, were used for two reasons. Firstly, they are able to recognize time-related data packet features. Secondly, they can be implemented efficiently on neuromorphic hardware with a low energy footprint. Here we used a very simple feedforward SNN, with only one fully-connected hidden layer, and trained in a supervised manner using the newly introduced method known as Surrogate Gradient Learning. Surprisingly, such a simple SNN reached an accuracy of 95.9% on ISCX datasets, outperforming previous approaches. Besides better accuracy, there is also a very significant improvement on simplicity: input size, number of neurons, trainable parameters are all reduced by one to four orders of magnitude. Next, we analyzed the reasons for this good accuracy. It turns out that, beyond spatial (i.e. packet size) features, the SNN also exploits temporal ones, mostly the nearly synchronous (within a 200ms range) arrival times of packets with certain sizes. Taken together, these results show that SNNs are an excellent fit for encrypted internet traffic classification: they can be more accurate than conventional artificial neural networks (ANN), and they could be implemented efficiently on low power embedded systems.</description><subject>Accuracy</subject><subject>Artificial neural networks</subject><subject>Audio data</subject><subject>Classification</subject><subject>Computer Science - Learning</subject><subject>Computer Science - Networking and Internet Architecture</subject><subject>Embedded systems</subject><subject>Energy consumption</subject><subject>Inspection</subject><subject>Internet</subject><subject>Learning theory</subject><subject>Machine learning</subject><subject>Neural networks</subject><subject>Neurons</subject><subject>Packet transmission</subject><subject>Recognition</subject><subject>Spiking</subject><issn>2331-8422</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>BENPR</sourceid><sourceid>GOX</sourceid><recordid>eNotj8tOwzAURC0kJKrSD2BFJNYJ9nX8WqKqQKUKFu0-clIbuQ1OsJ1C_570sZrR1czoHoQeCC5KyRh-1uHPHQogmBRYSSJv0AQoJbksAe7QLMYdxhi4AMboBK0XvgnHPplttvTJBG9SloK21jVZ0-oY3eh0cp3Phuj8V6azOPQmHFwcK-ve7U_HDzME3Y6Sfruwv0e3VrfRzK46RZvXxWb-nq8-35bzl1WuGaicCSFU3XDLKADDWHMtG0NVDWAYIUrx0mouFVekrreCC0utFDWxUArZWEun6PEyeyau-uC-dThWJ_LqTD4mni6JPnQ_g4mp2nVD8ONPFZQSK1Ziqeg_FV1cFA</recordid><startdate>20220721</startdate><enddate>20220721</enddate><creator>Rasteh, Ali</creator><creator>Delpech, Florian</creator><creator>Aguilar-Melchor, Carlos</creator><creator>Zimmer, Romain</creator><creator>Saeed Bagheri Shouraki</creator><creator>Masquelier, Timothée</creator><general>Cornell University Library, arXiv.org</general><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>HCIFZ</scope><scope>L6V</scope><scope>M7S</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope><scope>AKY</scope><scope>GOX</scope></search><sort><creationdate>20220721</creationdate><title>Encrypted Internet traffic classification using a supervised Spiking Neural Network</title><author>Rasteh, Ali ; Delpech, Florian ; Aguilar-Melchor, Carlos ; Zimmer, Romain ; Saeed Bagheri Shouraki ; Masquelier, Timothée</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a529-57779bc6f5322500a6a8ce39b22e5119964fa689691bbd767f3f87b1f2478cff3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Accuracy</topic><topic>Artificial neural networks</topic><topic>Audio data</topic><topic>Classification</topic><topic>Computer Science - Learning</topic><topic>Computer Science - Networking and Internet Architecture</topic><topic>Embedded systems</topic><topic>Energy consumption</topic><topic>Inspection</topic><topic>Internet</topic><topic>Learning theory</topic><topic>Machine learning</topic><topic>Neural networks</topic><topic>Neurons</topic><topic>Packet transmission</topic><topic>Recognition</topic><topic>Spiking</topic><toplevel>online_resources</toplevel><creatorcontrib>Rasteh, Ali</creatorcontrib><creatorcontrib>Delpech, Florian</creatorcontrib><creatorcontrib>Aguilar-Melchor, Carlos</creatorcontrib><creatorcontrib>Zimmer, Romain</creatorcontrib><creatorcontrib>Saeed Bagheri Shouraki</creatorcontrib><creatorcontrib>Masquelier, Timothée</creatorcontrib><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science & Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection (ProQuest)</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Engineering Collection</collection><collection>Engineering Database</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering Collection</collection><collection>arXiv Computer Science</collection><collection>arXiv.org</collection><jtitle>arXiv.org</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Rasteh, Ali</au><au>Delpech, Florian</au><au>Aguilar-Melchor, Carlos</au><au>Zimmer, Romain</au><au>Saeed Bagheri Shouraki</au><au>Masquelier, Timothée</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Encrypted Internet traffic classification using a supervised Spiking Neural Network</atitle><jtitle>arXiv.org</jtitle><date>2022-07-21</date><risdate>2022</risdate><eissn>2331-8422</eissn><abstract>Internet traffic recognition is an essential tool for access providers since recognizing traffic categories related to different data packets transmitted on a network help them define adapted priorities. That means, for instance, high priority requirements for an audio conference and low ones for a file transfer, to enhance user experience. As internet traffic becomes increasingly encrypted, the mainstream classic traffic recognition technique, payload inspection, is rendered ineffective. This paper uses machine learning techniques for encrypted traffic classification, looking only at packet size and time of arrival. Spiking neural networks (SNN), largely inspired by how biological neurons operate, were used for two reasons. Firstly, they are able to recognize time-related data packet features. Secondly, they can be implemented efficiently on neuromorphic hardware with a low energy footprint. Here we used a very simple feedforward SNN, with only one fully-connected hidden layer, and trained in a supervised manner using the newly introduced method known as Surrogate Gradient Learning. Surprisingly, such a simple SNN reached an accuracy of 95.9% on ISCX datasets, outperforming previous approaches. Besides better accuracy, there is also a very significant improvement on simplicity: input size, number of neurons, trainable parameters are all reduced by one to four orders of magnitude. Next, we analyzed the reasons for this good accuracy. It turns out that, beyond spatial (i.e. packet size) features, the SNN also exploits temporal ones, mostly the nearly synchronous (within a 200ms range) arrival times of packets with certain sizes. Taken together, these results show that SNNs are an excellent fit for encrypted internet traffic classification: they can be more accurate than conventional artificial neural networks (ANN), and they could be implemented efficiently on low power embedded systems.</abstract><cop>Ithaca</cop><pub>Cornell University Library, arXiv.org</pub><doi>10.48550/arxiv.2101.09818</doi><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | EISSN: 2331-8422 |
ispartof | arXiv.org, 2022-07 |
issn | 2331-8422 |
language | eng |
recordid | cdi_arxiv_primary_2101_09818 |
source | arXiv.org; Free E- Journals |
subjects | Accuracy Artificial neural networks Audio data Classification Computer Science - Learning Computer Science - Networking and Internet Architecture Embedded systems Energy consumption Inspection Internet Learning theory Machine learning Neural networks Neurons Packet transmission Recognition Spiking |
title | Encrypted Internet traffic classification using a supervised Spiking Neural Network |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-31T11%3A52%3A26IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_arxiv&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Encrypted%20Internet%20traffic%20classification%20using%20a%20supervised%20Spiking%20Neural%20Network&rft.jtitle=arXiv.org&rft.au=Rasteh,%20Ali&rft.date=2022-07-21&rft.eissn=2331-8422&rft_id=info:doi/10.48550/arxiv.2101.09818&rft_dat=%3Cproquest_arxiv%3E2480954089%3C/proquest_arxiv%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2480954089&rft_id=info:pmid/&rfr_iscdi=true |