Traffic Classification in Software-Defined Networking Using Genetic Programming Tools
Abstract
:1. Introduction
- We consider the classification of the network traffic generated by an SDN system, and propose the development of a classifier using the GenClass tool.
- We conducted simulated experiments and evaluated the accuracy and average classification error of the proposed model.
- We provide an experimental comparison between our proposed classifier and the other well-known supervised ML methods and demonstrate the outperformance of GenClass as opposed to others. The GenClass method has managed to identify the hidden associations between the feature of the used dataset and the required classes of the problem. In addition, this method can use from the initial set of features only those that contribute significantly to the decision-making to find the desired category.
- We provide future directions to incorporate the Grammatical Evolution-based algorithms, such as GenClass, in the online process for incoming network traffic classification in real time.
2. Material and Methods
2.1. Theoretical Framework
2.1.1. Operation of Software-Defined Networking
2.1.2. Network Traffic Classification
- Port-based: This technique has been used successfully in the past by exploiting the port numbers provided by the Internet-Assigned Numbers Authority (IANA) for specific applications and protocols. Of course, these techniques are nowadays considered obsolete and inaccurate as most applications communicate via ephemeral (dynamic) ports or over HTTP/HTTPS (e.g., peer-to-peer apps) [17].
- Deep Packet Inspection (DPI): The DPI method maps the content of packets (payload) to a signature, or specific patterns based on the application from which they originate. A DPI classifier examines the payload portion and matches it with a set of stored patterns to classify applications. It is based on four degrees of verification related to signature, syntax, protocol, and semantics. It was demonstrated that it achieves high levels of accuracy, completeness, and convergence. The main problems with the method are the inability to scale, the high cost, the increased complexity, the inability to apply to encrypted traffic, and emerging privacy issues. There is also a requirement to continuously update stored signatures or templates to include new application templates [18].
- Statistical-based classification: Unlike other approaches, statistical-based classification relies on statistical features extracted from packets or traffic flows of network data in combination with machine learning methods. The extracted features, such as packet duration, packet length, time between consecutive arrivals, flow duration time, and flow idle time, are considered unique for each traffic type and are used as inputs to the ML models that decide the classification. This classification approach achieves high accuracy but requires a lot of time to process the data. In general, the performance of these techniques depends largely on the quality of the collected features [10].
- Behavioral classification: In this approach, the point of observation is the end-host, and using appropriate tools, the entire traffic received by it is examined to detect the type of application or protocol running on the target endpoint [19]. This method is also based on the collection of statistics from traffic. The information, such as the distribution of packet sizes, the time between successive packet arrivals, etc., is used to identify the application generating the data. This technique does not need to examine the payload or the encrypted data, but it requires a large number of samples to achieve high accuracy.
2.1.3. ML-Based Traffic Classification Methods in SDN and Related Works
2.2. Proposed Approach
2.2.1. The Dataset
2.2.2. Machine Learning Methods
- GENCLASS: GenClass is a promising classification tool based on genetic programming. It utilizes the Grammatical Evolution method [30] to generate classification rules for a Backus–Naur Form. Its experimental evaluation on a number of different datasets demonstrates its superiority in the majority of cases. This technique was initially presented in the work of Tsoulos [12]. Furthermore, a software that implements this method was also published recently [31]. A short description of this method can be found in Section 2.3.
- FC2 (RBF): Represents the method of feature construction with the assistance of Grammatical Evolution, initially presented in the work of Gavrilis et al. [39]. In this approach, artificial features were created using Grammatical Evolution and subsequently evaluated using the Radial Basis Function (RBF) network [40,41]. The creation of new artificial features from the existing ones on the one hand aims to reduce the dimension of the problem and help to optimize the generalization ability of machine learning models and on the other hand to find hidden correlations that may exist between the existing features which would lead to more efficient training machine learning models.
- FC2 (MLP): Represents the application of feature construction technique to create two artificial features for the provided dataset. These features were evaluated using a neural network. A brief description of the feature construction method can be found in Section 2.4.
2.3. The GenClass Method
- Initialization Step:
- (a)
- Set the parameters of the method: for number of chromosomes, for maximum number of allowed generations, for the selection rate, and for the mutation rate.
- (b)
- Obtain the train set … M of the used dataset.
- (c)
- Set , the iteration number.
- Fitness Calculation Step:
- (a)
- For do
- i.
- Create a classification program using the Grammatical Evolution procedure and the grammar defined in [12].
- ii.
- Calculate the fitness value of chromosome i as
- (b)
- EndFor.
- Genetic Operations Step:
- (a)
- Selection procedure. All chromosomes are sorted according to their fitness values calculated before and the first of chromosomes with the lowest fitness values are transferred intact to the next generation. The remaining chromosomes are substituted by offsprings produced during the crossover procedure.
- (b)
- Crossover procedure. In order to produce new offsprings, the tournament selection is used to select a pair of chromosomes from the current population. This set of selected chromosomes will produce two new offsprings and using one-point crossover.
- (c)
- Perform the mutation procedure. During this procedure, a random number is drawn for each element of every chromosome. If , then the corresponding element is altered randomly.
- Termination Check Step:
- (a)
- Set ;
- (b)
- If , terminate; or else, go to the Fitness Calculation Step.
2.4. The Feature Construction Method
- Initialization Step:
- (a)
- Set the parameters of the method: for number of chromosomes, for maximum number of allowed generations, for the selection rate, for the mutation rate, and the number of desired features that should be constructed.
- (b)
- Obtain the train set …M of the used dataset.
- (c)
- Set k = 0 as the generation number.
- Fitness Calculation Step:
- (a)
- For do
- i.
- Create artificial features from the original ones using Grammatical Evolution.
- ii.
- Create the dataset from the original one, TR, using the new features.
- iii.
- Train an RBF network on the dataset. This network is preferred over other neural networks because of its very fast training method.
- iv.
- Calculate the corresponding fitness value as
- (b)
- Select EndFor
- Genetic Operations Step: use the same genetic operators as in GenClass method provided in Section 2.3.
- Termination Check Step:
- (a)
- Set ;
- (b)
- If , terminate; or else return to the Fitness Calculation Step.
3. Results
- The row SVM stands for the application of Support Vector Machine on the proposed dataset. The LibSVM implementation [43] was used in the conducted experiments.
- The row TREE refers to the application of Decision Trees to the objective problem using the freely available software https://github.com/ikeofilic1/dtrees (accessed on 28 August 2024).
- The row FC2 (RBF) denotes the application of the feature construction technique. The method was used to construct artificial features and these features were evaluated using an RBF network with H weights.
- The row FC2 (MLP) represents the application of the feature-construction technique to create artificial features. The produced features are evaluated using a neural network with H hidden nodes.
- The row GENCLASS denotes the usage of the GenClass method to produce classification rules.
4. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Göransson, P.; Black, C.; Culver, T. Software defined networks. In A Comprehensive Approach; Elsevier: Amsterdam, The Netherlands, 2017; p. 409. [Google Scholar]
- Raikar, M.M.; Meena, S.; Mulla, M.M.; Shetti, N.S.; Karanandi, M. Data traffic classification in software defined networks (SDN) using supervised-learning. Procedia Comput. Sci. 2020, 171, 2750–2759. [Google Scholar] [CrossRef]
- Foremski, P. On different ways to classify Internet traffic: A short review of selected publications. Theor. Appl. Inform. 2013, 25, 119–136. [Google Scholar]
- Azab, A.; Khasawneh, M.; Alrabaee, S.; Choo, K.K.R.; Sarsour, M. Network traffic classification: Techniques, datasets, and challenges. Digit. Commun. Netw. 2024, 10, 676–692. [Google Scholar] [CrossRef]
- Xu, C.; Qin, D.; Song, F. A survey of SDN traffic management research. In Proceedings of the 2022 11th International Conference on Communications, Circuits and Systems (ICCCAS), Singapore, 13–15 May 2022; IEEE: Piscataway, NJ, USA, 2022; pp. 231–236. [Google Scholar]
- Xie, J.; Yu, F.R.; Huang, T.; Xie, R.; Liu, J.; Wang, C.; Liu, Y. A survey of machine learning techniques applied to software defined networking (SDN): Research issues and challenges. IEEE Commun. Surv. Tutorials 2018, 21, 393–430. [Google Scholar] [CrossRef]
- Amanowicz, M.; Jankowski, D. Detection and classification of malicious flows in software-defined networks using data mining techniques. Sensors 2021, 21, 2972. [Google Scholar] [CrossRef]
- Serag, R.H.; Abdalzaher, M.S.; Elsayed, H.A.E.A.; Sobh, M.; Krichen, M.; Salim, M.M. Machine-Learning-Based Traffic Classification in Software-Defined Networks. Electronics 2024, 13, 1108. [Google Scholar] [CrossRef]
- Lin, C.Y.; Huang, H.Y. A Traffic Classification Based Traffic Engineering Framework in Software-Defined Networking. SSRN 2023, 4394498. [Google Scholar]
- Yan, J.; Yuan, J. A survey of traffic classification in software defined networks. In Proceedings of the 2018 1st IEEE International Conference on Hot Information-Centric Networking (HotICN), Shenzhen, China, 15–17 August 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 200–206. [Google Scholar]
- Shafiq, M.; Yu, X.; Laghari, A.A.; Yao, L.; Karn, N.K.; Abdessamia, F. Network traffic classification techniques and comparative analysis using machine learning algorithms. In Proceedings of the 2016 2nd IEEE International Conference on Computer and Communications (ICCC), Chengdu, China, 14–17 October 2016; IEEE: Piscataway, NJ, USA, 2016; pp. 2451–2455. [Google Scholar]
- Tsoulos, I.G. Creating classification rules using grammatical evolution. Int. J. Comput. Intell. Stud. 2020, 9, 161–171. [Google Scholar]
- Nunes, B.A.A.; Mendonca, M.; Nguyen, X.N.; Obraczka, K.; Turletti, T. A survey of software-defined networking: Past, present, and future of programmable networks. IEEE Commun. Surv. Tutorials 2014, 16, 1617–1634. [Google Scholar] [CrossRef]
- McKeown, N.; Anderson, T.; Balakrishnan, H.; Parulkar, G.; Peterson, L.; Rexford, J.; Shenker, S.; Turner, J. OpenFlow: Enabling innovation in campus networks. ACM SIGCOMM Comput. Commun. Rev. 2008, 38, 69–74. [Google Scholar] [CrossRef]
- Bosshart, P.; Daly, D.; Gibb, G.; Izzard, M.; McKeown, N.; Rexford, J.; Schlesinger, C.; Talayco, D.; Vahdat, A.; Varghese, G.; et al. P4: Programming protocol-independent packet processors. ACM SIGCOMM Comput. Commun. Rev. 2014, 44, 87–95. [Google Scholar] [CrossRef]
- Ajaeiya, G.A.; Adalian, N.; Elhajj, I.H.; Kayssi, A.; Chehab, A. Flow-based Intrusion Detection System for SDN. In Proceedings of the 2017 IEEE Symposium on Computers and Communications (ISCC), Heraklion, Greece, 3–6 July 2017; pp. 787–793. [Google Scholar] [CrossRef]
- Qazi, Z.A.; Lee, J.; Jin, T.; Bellala, G.; Arndt, M.; Noubir, G. Application-awareness in SDN. In Proceedings of the ACM SIGCOMM 2013 Conference on SIGCOMM, Hong Kong, China, 12–16 August 2013; pp. 487–488. [Google Scholar]
- Amaral, P.; Dinis, J.; Pinto, P.; Bernardo, L.; Tavares, J.; Mamede, H.S. Machine learning in software defined networks: Data collection and traffic classification. In Proceedings of the 2016 IEEE 24th International Conference on Network Protocols (ICNP), Singapore, 8–11 November 2016; IEEE: Piscataway, NJ, USA, 2016; pp. 1–5. [Google Scholar]
- Valenti, S.; Rossi, D.; Dainotti, A.; Pescapè, A.; Finamore, A.; Mellia, M. Reviewing traffic classification. In Data Traffic Monitoring and Analysis: From Measurement, Classification, and Anomaly Detection to Quality of Experience; Springer: Berlin/Heidelberg, Germany, 2013; pp. 123–147. [Google Scholar]
- Kamath, R.; Sivalingam, K.M. Machine Learning based Flow Classification in DCNs using P4 Switches. In Proceedings of the 2021 International Conference on Computer Communications and Networks (ICCCN), Athens, Greece, 19–22 July 2021; pp. 1–10. [Google Scholar] [CrossRef]
- Perera Jayasuriya Kuranage, M.; Piamrat, K.; Hamma, S. Network traffic classification using machine learning for software defined networks. In Proceedings of the Machine Learning for Networking: Second IFIP TC 6 International Conference, MLN 2019, Paris, France, 3–5 December 2019; Revised Selected Papers 2. Springer: Berlin/Heidelberg, Germany, 2020; pp. 28–39. [Google Scholar]
- Ashour, M.M.; Yakout, M.A.; AbdElhalim, E. Traffic Classification in Software Defined Networks based on Machine Learning Algorithms. Int. J. Telecommun. 2024, 4, 1–19. [Google Scholar]
- Nuñez-Agurto, D.; Fuertes, W.; Marrone, L.; Benavides-Astudillo, E.; Coronel-Guerrero, C.; Perez, F. A Novel Traffic Classification Approach by Employing Deep Learning on Software-Defined Networking. Future Internet 2024, 16, 153. [Google Scholar] [CrossRef]
- Pradhan, B.; Srivastava, G.; Roy, D.S.; Reddy, K.H.K.; Lin, J.C.W. Traffic classification in underwater networks using sdn and data-driven hybrid metaheuristics. ACM Trans. Sens. Netw. (TOSN) 2022, 18, 1–15. [Google Scholar] [CrossRef]
- Vulpe, A.; Dobrin, C.; Stefan, A.; Caranica, A. AI/ML-based real-time classification of Software Defined Networking traffic. In Proceedings of the 18th International Conference on Availability, Reliability and Security, Benevento, Italy, 29 August–1 September 2023; pp. 1–7. [Google Scholar]
- Wassie Geremew, G.; Ding, J. Elephant Flows Detection Using Deep Neural Network, Convolutional Neural Network, Long Short-Term Memory, and Autoencoder. J. Comput. Netw. Commun. 2023, 2023, 1495642. [Google Scholar] [CrossRef]
- Spyrou, E.D.; Tsoulos, I.; Stylios, C. Distributed Denial of Service Classification for Software-Defined Networking Using Grammatical Evolution. Future Internet 2023, 15, 401. [Google Scholar] [CrossRef]
- Ganesan, E.; Hwang, I.S.; Liem, A.T.; Ab-Rahman, M.S. SDN-enabled FiWi-IoT smart environment network traffic classification using supervised ML models. Photonics 2021, 8, 201. [Google Scholar] [CrossRef]
- Mpouziotas, D.; Besharat, J.; Tsoulos, I.G.; Stylios, C. AliAmvra—Enhancing Customer Experience through the Application of Machine Learning Techniques for Survey Data Assessment and Analysis. Information 2024, 15, 83. [Google Scholar] [CrossRef]
- O’Neill, M.; Ryan, C. Grammatical evolution. IEEE Trans. Evol. Comput. 2001, 5, 349–358. [Google Scholar] [CrossRef]
- Anastasopoulos, N.; Tsoulos, I.G.; Tzallas, A. GenClass: A parallel tool for data classification based on Grammatical Evolution. SoftwareX 2021, 16, 100830. [Google Scholar] [CrossRef]
- Bishop, C. Neural Networks for Pattern Recognition; Oxford University Press: Oxford, UK, 1995. [Google Scholar]
- Cybenko, G. Approximation by superpositions of a sigmoidal function. Math. Control. Signals Syst. 1989, 2, 303–314. [Google Scholar] [CrossRef]
- Powell, M.J.D. A Tolerant Algorithm for Linearly Constrained Optimization Calculations. Math. Program. 1989, 45, 547–566. [Google Scholar] [CrossRef]
- Deris, A.M.; Zain, A.M.; Sallehuddin, R. Overview of support vector machine in modeling machining performances. Procedia Eng. 2011, 24, 308–312. [Google Scholar] [CrossRef]
- Zhang, D. Support vector machine. In Fundamentals of Image Data Mining: Analysis, Features, Classification and Retrieval; Springer International Publishing: Cham, Switzerland, 2021; pp. 201–228. [Google Scholar]
- Kotsiantis, S.B. Decision trees: A recent overview. Artif. Intell. Rev. 2013, 39, 261–283. [Google Scholar] [CrossRef]
- Charbuty, B.; Abdulazeez, A. Classification based on decision tree algorithm for machine learning. J. Appl. Sci. Technol. Trends 2021, 2, 20–28. [Google Scholar] [CrossRef]
- Gavrilis, D.; Tsoulos, I.G.; Dermatas, E. Selecting and constructing features using grammatical evolution. Pattern Recognit. Lett. 2008, 29, 1358–1365. [Google Scholar] [CrossRef]
- Park, J.; Sandberg, I.W. Universal Approximation Using Radial-Basis-Function Networks. Neural Comput. 1991, 3, 246–257. [Google Scholar] [CrossRef]
- Yu, H.; Xie, T.; Paszczynski, S.; Wilamowski, B.M. Advantages of Radial Basis Function Networks for Dynamic System Design. IEEE Trans. Ind. Electron. 2011, 58, 5438–5450. [Google Scholar] [CrossRef]
- Tsoulos, I.G. QFC: A Parallel Software Tool for Feature Construction, Based on Grammatical Evolution. Algorithms 2022, 15, 295. [Google Scholar] [CrossRef]
- Chang, C.C.; Lin, C.J. LIBSVM: A library for support vector machines. ACM Trans. Intell. Syst. Technol. (TIST) 2011, 2, 1–27. [Google Scholar] [CrossRef]
- Belkadi, O.; Vulpe, A.; Laaziz, Y.; Halunga, S. ML-Based Traffic Classification in an SDN-Enabled Cloud Environment. Electronics 2023, 12, 269. [Google Scholar] [CrossRef]
- Gropp, W.; Lusk, E.; Doss, N.; Skjellum, A. A high-performance, portable implementation of the MPI message passing interface standard. Parallel Comput. 1996, 22, 789–828. [Google Scholar] [CrossRef]
- Chandra, R. Parallel Programming in OpenMP; Morgan Kaufmann: Cambridge, MA, USA, 2001. [Google Scholar]
- Zhu, L.; Karim, M.M.; Sharif, K.; Xu, C.; Li, F.; Du, X.; Guizani, M. SDN controllers: A comprehensive analysis and performance evaluation study. ACM Comput. Surv. (CSUR) 2020, 53, 1–40. [Google Scholar] [CrossRef]
- Zhang, P.; Zhao, Y.; Wang, Y.; Jin, Y. Enhancing network performance tomography in software-defined cloud network. IEEE Commun. Lett. 2016, 27, 832–835. [Google Scholar] [CrossRef]
- Craig, A.; Nandy, B.; Lambadaris, I.; Ashwood-Smith, P. Load balancing for multicast traffic in SDN using real-time link cost modification. In Proceedings of the 2015 IEEE International Conference on Communications (ICC), London, UK, 8–12 June 2015; IEEE: Piscataway, NJ, USA, 2015; pp. 5789–5795. [Google Scholar]
- Kakkavas, G.; Stamou, A.; Karyotis, V.; Papavassiliou, S. Network tomography for efficient monitoring in SDN-enabled 5G networks and beyond: Challenges and opportunities. IEEE Commun. Mag. 2021, 59, 70–76. [Google Scholar] [CrossRef]
Authors and Year | Challenge | ML Model | ML Algorithms | Type of Traffic | Dataset | Features | Metrics | Controller | Topology | Accuracy |
---|---|---|---|---|---|---|---|---|---|---|
Ganesan et al. [28], 2021 | QoS issues | Supervised learning | RF, KNN, NN-MLP, NB, LR, SVM | Voice, video, IoT (IoT traffic types), HTTP | UNSW dataset (publicly available) | Statistical features (port numbers, IP src, IP dst, DNS, NTP, packet size, etc.) | TP, FP, FN, TN, accuracy, precision, recall, F1-score | Tree and branch topology | 99% | |
Wassie et al. [26], 2023 | Network management | Deep Learning | DNN, CNN, LSTM, and deep autoencoder | Real-time apps | NIMS, SDN datasets | Low size, total packet size, protocol, app type, flow duration, and more (23 features) | Accuracy, loss metrics, run time | RYU | 99.12% | |
Lin et al. [9], 2023 | Network management | Supervised learning | RF | Chat, email, file transfer, streaming, P2P, VoIP, HTTP | ISCX-VPN-NonVPN-2016 | Average packet inter-arrival time, distribution of packet sizes or extracted features | F-score, throughput, confusion matrix | RYU | Simple diamond | |
Ashour et al. [22], 2024 | Application identification | Supervised learning | KNN, LR, RF, DT, NB, and SVM | WWW, DNS, FTP, ICMP, P2P, and VOIP | SDN-traffic, Kaggle | Quantity of packets, avg. transmission time, number of instantly transmitted packets | Accuracy, F1-score, recall, precision, and training time | Straight-forward topology | 99.8% | |
Nunez-Agurto, et al. [23], 2024 | Application identification and security issues | Deep Learning | LSTM, BiLSTM, GRU, and BiGRU | Multimedia, VoIP, Instant message, File transfer, Attack | InSDN and ISCX-VPNNoVPN | 12 features | Accuracy, precision, recall, and F1-Score | 99.65% | ||
Perera et al. [21], 2020 | Network management | Unsupervised and supervised ML | RF, KNN, DT, SVM | Four types of traffic | Publicly available | MAC addresses and ports, flow duration, flow byte count, flow packet count, and average packet size | Accuracy | RYU | Simple | 96.37% |
Pradhan et al. [24], 2022 | QoS issues | Semi-supervised machine learning | Feed-forward NN, NB, and LR | HTTP, video streaming, FTP, P2P, instant messaging | ANT and Kaggle dataset | Packet size, packet inter-arrival time | Confusion matrix, precision, recall, and F-Measure | |||
Raikar et al. [2], 2020 | Application identification | Supervised learning | SVM, NB, nearest centroid | HTTP, mail, streaming | Own collected data | srcip, srcport, dstip, dstport, proto, total fpackets, total fvolume, total bpackets | Accuracy, precision, recall, F-score, training error, training and testing time | POX | Simple, linear, tree | 96.79% |
Spyrou et al. [27], 2023 | Security issues | Supervised learning | NB, KNNs, RF as opposed to GenClass | Dataset of normal and malicious traffic | DDoS SDN dataset | 23 features extracted from switches | Average class error | |||
Vulpe et al. [25], 2023 | Network management (traffic monitoring) | Supervised learning | LR, KNN, NB, SVM, DT, ANN | Ping, DNS, Telnet, and voice (real time) | Own collected data | Delta packets, delta bytes, packet statistics, instant bytes per second, average bytes per second, time | Accuracy, precision, recall, F1-score | RYU | mininet topologies | 97.94% |
Our work | Application identification | Supervised learning | MLP (BFGS), FC2 (RBF), FC2 (MLP), GENCLASS | DNS, WWW, FTP, P2P, ICMP, VOIP | SDN-dataset | Flow features | Average classification error | 99.42% |
Features | Description | Features |
---|---|---|
forward_pl | Package size in bytes | reverse_pl |
forward_piat | Packet arrival interval in seconds | reverse_piat |
forward_pps | Packets per second | reverse_pps |
forward_bps | Bytes per second | reverse_bps |
forward_pl_mean | Average packet size in bytes | reverse_pl_mean |
forward_piat_mean | Average packet arrival interval in seconds | reverse_piat_mean |
forward_pps_mean | Average number of packets per second | reverse_pps_mean |
forward_bps_mean | Average number of bytes per second | reverse_bps_mean |
forward_pl_var | Variance of packet size in bytes | reverse_pl_var |
forward_piat_var | Variance of packet arrival interval in seconds | reverse_piat_var |
forward_pps_var | Variance of the number of packets per second | reverse_pps_var |
forward_bps_var | Variance of the number of bytes per second | reverse_bps_var |
forward_pl_q1 | 1st quartile of packet size in bytes | reverse_pl_q1 |
forward_pl_q3 | 3rd quartile of packet size in bytes | reverse_pl_q3 |
forward_piat_q1 | 1st quartile of the packet arrival interval in seconds | reverse_piat_q1 |
forward_piat_q3 | 3rd quartile of the packet arrival interval in seconds | reverse_piat_q3 |
forward_pl_max | Maximum packet size in bytes | reverse_pl_max |
forward_pl_min | Minimum packet size in bytes | reverse_pl_min |
forward_piat_max | Maximum packet arrival interval in seconds | reverse_piat_max |
forward_piat_min | Minimum packet arrival interval in seconds | reverse_piat_min |
forward_pps_max | Maximum number of packets per second | reverse_pps_max |
forward_pps_min | Maximum number of packets per second | reverse_pps_min |
forward_bps_max | Maximum number of bytes per second | reverse_bps_max |
forward_bps_min | Minimum number of bytes per second | reverse_bps_min |
forward_duration | Duration | reverse_duration |
forward_size_packets | Size of packets | reverse_size_packets |
forward_size_bytes | Size of bytes | reverse_size_bytes |
Application type | Category |
Application | Number of Flows | Proportion |
---|---|---|
WWW | 2441 | 57.65% |
P2P | 710 | 16.77% |
ICMP | 409 | 9.66% |
VOIP | 256 | 6.05% |
FTP | 217 | 5.53% |
DNS | 184 | 4.35% |
Parameter | Meaning | Value |
---|---|---|
Number of chromosomes/particles | 500 | |
Maximum number of allowed generations | 200 | |
Number of produced artificial features | 2 | |
H | Number of weights for neural network | 10 |
Selection rate | 0.90 | |
Mutation rate | 0.05 |
Method | Classification Error |
---|---|
MLP | 16.33% |
SVM | 20.38% |
TREE | 7.64% |
FC2(RBF) | 13.67% |
FC2(MLP) | 9.35% |
GENCLASS | 0.58% |
Method | Precision | Recall |
---|---|---|
MLP | 0.37 | 0.68 |
SVM | 0.51 | 0.53 |
TREE | 0.51 | 0.93 |
FC2(RBF) | 0.62 | 0.69 |
FC2(MLP) | 0.85 | 0.92 |
GENCLASS | 0.96 | 0.95 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Margariti, S.V.; Tsoulos, I.G.; Kiousi, E.; Stergiou, E. Traffic Classification in Software-Defined Networking Using Genetic Programming Tools. Future Internet 2024, 16, 338. https://doi.org/10.3390/fi16090338
Margariti SV, Tsoulos IG, Kiousi E, Stergiou E. Traffic Classification in Software-Defined Networking Using Genetic Programming Tools. Future Internet. 2024; 16(9):338. https://doi.org/10.3390/fi16090338
Chicago/Turabian StyleMargariti, Spiridoula V., Ioannis G. Tsoulos, Evangelia Kiousi, and Eleftherios Stergiou. 2024. "Traffic Classification in Software-Defined Networking Using Genetic Programming Tools" Future Internet 16, no. 9: 338. https://doi.org/10.3390/fi16090338
APA StyleMargariti, S. V., Tsoulos, I. G., Kiousi, E., & Stergiou, E. (2024). Traffic Classification in Software-Defined Networking Using Genetic Programming Tools. Future Internet, 16(9), 338. https://doi.org/10.3390/fi16090338