{"id":"https://openalex.org/W3199790628","doi":"https://doi.org/10.1109/tnsm.2021.3112283","title":"A Cost-Sensitive Deep Learning-Based Approach for Network Traffic Classification","display_name":"A Cost-Sensitive Deep Learning-Based Approach for Network Traffic Classification","publication_year":2021,"publication_date":"2021-09-13","ids":{"openalex":"https://openalex.org/W3199790628","doi":"https://doi.org/10.1109/tnsm.2021.3112283","mag":"3199790628"},"language":"en","primary_location":{"id":"doi:10.1109/tnsm.2021.3112283","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnsm.2021.3112283","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network and Service Management","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://hdl.handle.net/10453/151147","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5046224094","display_name":"Akbar Telikani","orcid":"https://orcid.org/0000-0003-4467-4915"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Akbar Telikani","raw_affiliation_strings":["School of Computing and Information Technology, University of Wollongong, Wollongong, NSW, Australia","School of Computing and Information Technology, University of Wollongong, Wollongong, NSW, 2522, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computing and Information Technology, University of Wollongong, Wollongong, NSW, Australia","institution_ids":["https://openalex.org/I204824540"]},{"raw_affiliation_string":"School of Computing and Information Technology, University of Wollongong, Wollongong, NSW, 2522, Australia","institution_ids":["https://openalex.org/I204824540"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039341855","display_name":"Amir H. Gandomi","orcid":"https://orcid.org/0000-0002-2798-0104"},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Amir H. Gandomi","raw_affiliation_strings":["Faculty of Engineering and Information Technology, University of Technology Sydney, Ultimo, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"Faculty of Engineering and Information Technology, University of Technology Sydney, Ultimo, NSW, Australia","institution_ids":["https://openalex.org/I114017466"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001746807","display_name":"Kim\u2010Kwang Raymond Choo","orcid":"https://orcid.org/0000-0001-9208-5336"},"institutions":[{"id":"https://openalex.org/I45438204","display_name":"The University of Texas at San Antonio","ror":"https://ror.org/01kd65564","country_code":"US","type":"education","lineage":["https://openalex.org/I45438204"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kim-Kwang Raymond Choo","raw_affiliation_strings":["Department of Information Systems and Cyber Security, University of Texas at San Antonio, San Antonio, TX, USA","Department of Information Systems and Cyber Security, University of Texas at San Antonio, San Antonio, TX 78249, USA"],"affiliations":[{"raw_affiliation_string":"Department of Information Systems and Cyber Security, University of Texas at San Antonio, San Antonio, TX, USA","institution_ids":["https://openalex.org/I45438204"]},{"raw_affiliation_string":"Department of Information Systems and Cyber Security, University of Texas at San Antonio, San Antonio, TX 78249, USA","institution_ids":["https://openalex.org/I45438204"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5031318875","display_name":"Jun Shen","orcid":"https://orcid.org/0000-0002-9403-7140"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Jun Shen","raw_affiliation_strings":["School of Computing and Information Technology, University of Wollongong, Wollongong, NSW, Australia","School of Computing and Information Technology, University of Wollongong, Wollongong, NSW, 2522, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computing and Information Technology, University of Wollongong, Wollongong, NSW, Australia","institution_ids":["https://openalex.org/I204824540"]},{"raw_affiliation_string":"School of Computing and Information Technology, University of Wollongong, Wollongong, NSW, 2522, Australia","institution_ids":["https://openalex.org/I204824540"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5046224094"],"corresponding_institution_ids":["https://openalex.org/I204824540"],"apc_list":null,"apc_paid":null,"fwci":5.037,"has_fulltext":true,"cited_by_count":61,"citation_normalized_percentile":{"value":0.96037063,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":"19","issue":"1","first_page":"661","last_page":"670"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11652","display_name":"Imbalanced Data Classification Techniques","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8190492391586304},{"id":"https://openalex.org/keywords/traffic-classification","display_name":"Traffic classification","score":0.8147028684616089},{"id":"https://openalex.org/keywords/autoencoder","display_name":"Autoencoder","score":0.6653808355331421},{"id":"https://openalex.org/keywords/overfitting","display_name":"Overfitting","score":0.6479716300964355},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6410491466522217},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.6220625638961792},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5212031602859497},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.4961620271205902},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4958885610103607},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.48704794049263},{"id":"https://openalex.org/keywords/multiclass-classification","display_name":"Multiclass classification","score":0.4332970976829529},{"id":"https://openalex.org/keywords/quality-of-service","display_name":"Quality of service","score":0.35514432191848755},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.18122738599777222},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.10578370094299316}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8190492391586304},{"id":"https://openalex.org/C169988225","wikidata":"https://www.wikidata.org/wiki/Q7832484","display_name":"Traffic classification","level":3,"score":0.8147028684616089},{"id":"https://openalex.org/C101738243","wikidata":"https://www.wikidata.org/wiki/Q786435","display_name":"Autoencoder","level":3,"score":0.6653808355331421},{"id":"https://openalex.org/C22019652","wikidata":"https://www.wikidata.org/wiki/Q331309","display_name":"Overfitting","level":3,"score":0.6479716300964355},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6410491466522217},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.6220625638961792},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5212031602859497},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.4961620271205902},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4958885610103607},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.48704794049263},{"id":"https://openalex.org/C123860398","wikidata":"https://www.wikidata.org/wiki/Q6934605","display_name":"Multiclass classification","level":3,"score":0.4332970976829529},{"id":"https://openalex.org/C5119721","wikidata":"https://www.wikidata.org/wiki/Q220501","display_name":"Quality of service","level":2,"score":0.35514432191848755},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.18122738599777222},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.10578370094299316},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/tnsm.2021.3112283","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnsm.2021.3112283","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network and Service Management","raw_type":"journal-article"},{"id":"pmh:oai:opus.lib.uts.edu.au:10453/151147","is_oa":true,"landing_page_url":"http://hdl.handle.net/10453/151147","pdf_url":"http://hdl.handle.net/10453/151147","source":{"id":"https://openalex.org/S4306401357","display_name":"UTS ePRESS (University of Technology Sydney)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I114017466","host_organization_name":"University of Technology Sydney","host_organization_lineage":["https://openalex.org/I114017466"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Journal Article"},{"id":"pmh:oai:ro.uow.edu.au:test2021-4199","is_oa":false,"landing_page_url":"https://ro.uow.edu.au/test2021/3190","pdf_url":null,"source":{"id":"https://openalex.org/S4306400510","display_name":"Research Online (University of Wollongong)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I204824540","host_organization_name":"University of Wollongong","host_organization_lineage":["https://openalex.org/I204824540"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Test Series for Scopus Harvesting 2021","raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:opus.lib.uts.edu.au:10453/151147","is_oa":true,"landing_page_url":"http://hdl.handle.net/10453/151147","pdf_url":"http://hdl.handle.net/10453/151147","source":{"id":"https://openalex.org/S4306401357","display_name":"UTS ePRESS (University of Technology Sydney)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I114017466","host_organization_name":"University of Technology Sydney","host_organization_lineage":["https://openalex.org/I114017466"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Journal Article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/1","score":0.5799999833106995,"display_name":"No poverty"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3199790628.pdf","grobid_xml":"https://content.openalex.org/works/W3199790628.grobid-xml"},"referenced_works_count":34,"referenced_works":["https://openalex.org/W2075798023","https://openalex.org/W2148143831","https://openalex.org/W2259894692","https://openalex.org/W2343828539","https://openalex.org/W2551429935","https://openalex.org/W2552826511","https://openalex.org/W2617931713","https://openalex.org/W2743678626","https://openalex.org/W2750674396","https://openalex.org/W2783320270","https://openalex.org/W2784189535","https://openalex.org/W2794826941","https://openalex.org/W2800167607","https://openalex.org/W2892460540","https://openalex.org/W2897202622","https://openalex.org/W2907487329","https://openalex.org/W2910962950","https://openalex.org/W2911301616","https://openalex.org/W2912386632","https://openalex.org/W2917091861","https://openalex.org/W2928842143","https://openalex.org/W2949072481","https://openalex.org/W2963516518","https://openalex.org/W2964050365","https://openalex.org/W2972176792","https://openalex.org/W2978153077","https://openalex.org/W2981318525","https://openalex.org/W3007517706","https://openalex.org/W3045769106","https://openalex.org/W3045858585","https://openalex.org/W3109491787","https://openalex.org/W3165205057","https://openalex.org/W3197886029","https://openalex.org/W6801142633"],"related_works":["https://openalex.org/W1574414179","https://openalex.org/W4362597605","https://openalex.org/W4297676672","https://openalex.org/W4281702477","https://openalex.org/W2922073769","https://openalex.org/W2810330923","https://openalex.org/W32109103","https://openalex.org/W2171634548","https://openalex.org/W4382934674","https://openalex.org/W2076952529"],"abstract_inverted_index":{"Network":[0],"traffic":[1,33],"classification":[2,45,134,195],"(NTC)":[3],"plays":[4],"an":[5],"important":[6],"role":[7],"in":[8,16,98,142,168,200],"cyber":[9],"security":[10],"and":[11,19,40,69,108,176],"network":[12],"performance,":[13],"for":[14,114,154],"example":[15],"intrusion":[17],"detection":[18],"facilitating":[20],"a":[21,79,109],"higher":[22,194],"quality":[23],"of":[24,32,89,145],"service.":[25],"However,":[26],"due":[27],"to":[28,52,63,85,127,132,202],"the":[29,87,94,101,119,123,128,148,163,183,189],"unbalanced":[30],"nature":[31],"datasets,":[34],"NTC":[35,49,205],"can":[36,43,192],"be":[37],"extremely":[38],"challenging":[39],"poor":[41],"management":[42],"degrade":[44],"performance.":[46],"While":[47],"existing":[48],"methods":[50],"seek":[51],"re-balance":[53],"data":[54,120],"distribution":[55],"through":[56],"resampling":[57],"strategies,":[58],"such":[59],"approaches":[60],"are":[61,125,140],"known":[62],"suffer":[64],"from":[65],"information":[66],"loss,":[67],"overfitting,":[68],"increased":[70],"model":[71],"complexity.":[72],"To":[73,157],"address":[74],"these":[75],"challenges,":[76],"we":[77,161],"propose":[78],"new":[80],"cost-sensitive":[81,165],"deep":[82,90,170],"learning":[83,91,166,171],"approach":[84,191],"increase":[86],"robustness":[88],"classifiers":[92],"against":[93],"imbalanced":[95],"class":[96],"problem":[97],"NTC.":[99],"First,":[100],"dataset":[102,186],"is":[103,112,151],"divided":[104],"into":[105],"different":[106],"partitions,":[107],"cost":[110,129,149],"matrix":[111,150],"created":[113],"each":[115,143,155],"partition":[116],"by":[117],"considering":[118],"distribution.":[121],"Then,":[122],"costs":[124,139],"applied":[126],"function":[130],"layer":[131],"penalize":[133],"errors.":[135],"In":[136],"our":[137],"approach,":[138],"diverse":[141],"type":[144],"misclassification":[146],"because":[147],"specifically":[152],"generated":[153],"partition.":[156],"determine":[158],"its":[159],"utility,":[160],"implement":[162],"proposed":[164,190],"method":[167],"two":[169],"classifiers,":[172],"namely:":[173],"stacked":[174],"autoencoder":[175],"convolution":[177],"neural":[178],"networks.":[179],"Our":[180],"experiments":[181],"on":[182,197],"ISCX":[184],"VPN-nonVPN":[185],"show":[187],"that":[188],"obtain":[193],"performance":[196],"low-frequency":[198],"classes,":[199],"comparison":[201],"three":[203],"other":[204],"methods.":[206]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":23},{"year":2024,"cited_by_count":13},{"year":2023,"cited_by_count":16},{"year":2022,"cited_by_count":7}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
