Network Log Implementation for GRU Based Bandwidth Classification
DOI:
https://doi.org/10.56427/jcbd.v4i2.763
Keywords:
Fake Bandwidth, Bandwidth, GRU, Genuine BandwidthAbstract
Network bandwidth management using log data is a challenging task, especially in anomaly detection, e.g., fraudulent bandwidth that violates the Service Level Agreement (SLA). The present study suggests a deep learning automatic classification method for network logs, which leverages the Gated Recurrent Unit (GRU) and is used in time-series tensor configurations given as [N, 5, 15]. Data was gathered in real time during 29 days with the aid of a MikroTik RB1100AHx router, and it created more than 867,000 rows of data with three logs per second. The logs were classified into three classes: Genuine, Fake, and No Heavy Activity. Pre-processing involved windowing sequences, normalisation, and SMOTE balancing, whereas the GRU model comprised update and reset gates, followed by a Dense layer and a Softmax 3-class output. The model was trained with categorical cross-entropy loss and optimized with the Adam optimizer, validated with a 5-fold cross-validation strategy. The results achieved a 86.8% mean accuracy and an F1 score of 0.90 in the classification of Genuine Bandwidth, indicating that the GRU can successfully detect temporal patterns in network logs. This system is locally deployable through the G-Radio interface, demonstrating its feasibility, scalability, and substantial contribution to automatic bandwidth classification without packet inspection.
Downloads
References
Absardi, Z., & Javidan, R. (2024). A predictive SD-WAN traffic management method for IoT networks in multi-datacenters using deep RNN. IET Commun., 18, 1151-1165. https://doi.org/10.1049/cmu2.12810.
Chakour, I., Daoui, C., Baslam, M., Sainz-De-Abajo, B., & Garcia-Zapirain, B. (2024). Strategic Bandwidth Allocation for QoS in IoT Gateway: Predicting Future Needs Based on IoT Device Habits. IEEE Access, 12, 6590-6603. https://doi.org/10.1109/ACCESS.2024.3351111.
Enisoglu, R., & Rakocevic, V. (2023). Low-Latency Internet Traffic Identification using Machine Learning with Trend-based Features. 2023 International Wireless Communications and Mobile Computing (IWCMC), 394-399. https://doi.org/10.1109/IWCMC58020.2023.10183084.
Morshedi, M., & Noll, J. (2021). Estimating PQoS of Video Streaming on Wi-Fi Networks Using Machine Learning. Sensors (Basel, Switzerland), 21. https://doi.org/10.3390/s21020621.
White, G., & Clarke, S. (2022). Short-Term QoS Forecasting at the Edge for Reliable Service Applications. IEEE Transactions on Services Computing, 15, 1089-1102. https://doi.org/10.1109/tsc.2020.2975799.
Wu, L., Gan, C., Xu, Z., & Hui, J. (2022). (Network value)‐based adaptive dynamic bandwidth allocation algorithm for 5G network slicing. Transactions on Emerging Telecommunications Technologies, 34. https://doi.org/10.1002/ett.4722.
Najm, I., Saeed, A., Ahmad, B., Ahmed, S., Sekhar, R., Shah, P., & Veena, B. (2024). Enhanced Network Traffic Classification with Machine Learning Algorithms. Proceedings of the Cognitive Models and Artificial Intelligence Conference. https://doi.org/10.1145/3660853.3660935.
Tayyeh, Z., Alubady, R., Molhem, M., & Alsamman, M. (2024). Network Traffic Classification Using Machine Learning. 2024 7th International Conference on Internet Applications, Protocols, and Services (NETAPPS), 1-7. https://doi.org/10.1109/NETAPPS63333.2024.10823428.
Lee, J., & Singh, K. (2020). SwitchTree: in-network computing and traffic analyses with Random Forests. Neural Computing and Applications. https://doi.org/10.1007/s00521-020-05440-2.
Dudek, G. (2022). A Comprehensive Study of Random Forest for Short-Term Load Forecasting. Energies. https://doi.org/10.3390/en15207547.
Muhuri, P., Chatterjee, P., Yuan, X., Roy, K., & Esterline, A. (2020). Using a Long Short-Term Memory Recurrent Neural Network (LSTM-RNN) to Classify Network Attacks. Inf., 11, 243. https://doi.org/10.3390/info11050243.
Chen, A., Fu, Y., Zheng, X., & Lu, G. (2022). An efficient network behavior anomaly detection using a hybrid DBN-LSTM network. Comput. Secur., 114, 102600. https://doi.org/10.1016/j.cose.2021.102600.
Dutta, V., Choraś, M., Pawlicki, M., & Kozik, R. (2020). A Deep Learning Ensemble for Network Anomaly and Cyber-Attack Detection. Sensors (Basel, Switzerland), 20. https://doi.org/10.3390/s20164583.
Kinoyama, R., Perez, E., & Iba, H. (2021). Preventing Overfitting of LSTMs using Ant Colony Optimization. 2021 10th International Congress on Advanced Applied Informatics (IIAI-AAI), 343-350. https://doi.org/10.1109/iiai-aai53430.2021.00061.
Zhu, M., Liu, Y., Qin, P., Ding, Y., Cai, Z., Gao, Z., Ye, B., Qi, H., Cheng, S., & Zeng, Z. (2024). Improving long short-term memory (LSTM) networks for arbitrage spread forecasting: integrating cuckoo and zebra algorithms in chaotic mapping space for enhanced accuracy. PeerJ Computer Science, 10. https://doi.org/10.7717/peerj-cs.2552.
Kovalenko, V., Dorohyi, I., & Doroshenko, K. (2024). COMPARATIVE ANALYSIS OF MODELS FOR FAKE NEWS DETECTION AND CLASSIFICATION USING GRU. Scientific Papers of Donetsk National Technical University. Series: “Computer Engineering and Automation". https://doi.org/10.31474/2786-9024/v2i2(34).313834.
Hu, X., Gao, G., Li, B., Wang, W., & Ghannouchi, F. (2024). A Novel Lightweight Grouped Gated Recurrent Unit for Automatic Modulation Classification. IEEE Wireless Communications Letters, 13, 2135-2139. https://doi.org/10.1109/LWC.2024.3402975.
Fathima, N., Ibrahim, S., & Khraisat, A. (2024). Enhancing Network Traffic Anomaly Detection: Leveraging Temporal Correlation Index in a Hybrid Framework. IEEE Access, 12, 136805-136824. https://doi.org/10.1109/ACCESS.2024.3458903.
Duan, H., Zhang, L., Zhang, J., Wu, Y., & Lv, T. (2024). Network traffic prediction based on LST-GRU model. 2024 IEEE 7th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), 7, 29-33. https://doi.org/10.1109/IAEAC59436.2024.10503949.
Wang, H. (2023). Three-Stage Sampling Algorithm for Highly Imbalanced Multi-Classification Time Series Datasets. Symmetry, 15, 1849. https://doi.org/10.20944/preprints202309.1016.v1.
Rakovskiy, D. (2023). Influence of multi&label class problem of system logs on the security of computer networks. H&ES Research. https://doi.org/10.36724/2409-5419-2023-15-1-48-56.
Rakovskiy, D. (2022). ANALYSIS OF THE PROBLEM OF MULTIVALUED OF CLASS LABELS ON THE SECURITY OF COMPUTER NETWORKS. SYNCHROINFO JOURNAL. https://doi.org/10.36724/2664-066x-2022-8-6-10-17.
Miao, G., Wu, G., Zhang, Z., Tong, Y., & Lu, B. (2023). SPN: A Method of Few-Shot Traffic Classification With Out-of-Distribution Detection Based on Siamese Prototypical Network. IEEE Access, 11, 114403-114414. https://doi.org/10.1109/ACCESS.2023.3325065.
Wang, L., , X., Li, N., Lv, Q., Wang, Y., Huang, W., & Chen, H. (2023). TGPrint: Attack fingerprint classification on encrypted network traffic based graph convolution attention networks. Comput. Secur., 135, 103466. https://doi.org/10.1016/j.cose.2023.103466.
Ren, G., Cheng, G., & Fu, N. (2023). Accurate Encrypted Malicious Traffic Identification via Traffic Interaction Pattern Using Graph Convolutional Network. Applied Sciences. https://doi.org/10.3390/app13031483.
Feng, C., & Tian, P. (2021). Time Series Anomaly Detection for Cyber-physical Systems via Neural System Identification and Bayesian Filtering. Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data Mining. https://doi.org/10.1145/3447548.3467137.
Zhang, S., Hu, X., & Liu, J. (2024). TranBF: Deep Transformer Networks and Bayesian Filtering for Time Series Anomalous Signal Detection in Cyber-physical Systems. 2024 IEEE International Conference on Multimedia and Expo (ICME), 1-6. https://doi.org/10.1109/ICME57554.2024.10687464.
Zarzycki, K., & Lawrynczuk, M. (2021). LSTM and GRU Neural Networks as Models of Dynamical Processes Used in Predictive Control: A Comparison of Models Developed for Two Chemical Reactors. Sensors (Basel, Switzerland), 21. https://doi.org/10.3390/s21165625.
Xia, B., Bai, Y., Yin, J., Li, Y., & Xu, J. (2020). LogGAN: a Log-level Generative Adversarial Network for Anomaly Detection using Permutation Event Modeling. Information Systems Frontiers, 23, 285 - 298. https://doi.org/10.1007/s10796-020-10026-3.
Huang, X., Yuan, Y., Chang, C., Gao, Y., Zheng, C., & Yan, L. (2023). Human Activity Recognition Method Based on Edge Computing-Assisted and GRU Deep Learning Network. Applied Sciences. https://doi.org/10.3390/app13169059.
Raghuwanshi, A., Khare, N., & Pithode, K. (2023). Real-Time Network Traffic Classification using Advanced Neural Embeddings. 2023 IEEE International Conference on ICT in Business Industry & Government (ICTBIG), 1-6. https://doi.org/10.1109/ICTBIG59752.2023.10456341.
Hussain, B., Afzal, M., Ahmad, S., & Mostafa, A. (2021). Intelligent Traffic Flow Prediction Using Optimized GRU Model. IEEE Access, 9, 100736-100746. https://doi.org/10.1109/ACCESS.2021.3097141.
Wang, S., Dai, Y., Shen, J., & Xuan, J. (2021). Research on expansion and classification of imbalanced data based on SMOTE algorithm. Scientific Reports, 11. https://doi.org/10.1038/s41598-021-03430-5.
Faraji, A., Sadrossadat, S., Na, W., Feng, F., & Zhang, Q. (2023). A New Macromodeling Method Based on Deep Gated Recurrent Unit Regularized With Gaussian Dropout for Nonlinear Circuits. IEEE Transactions on Circuits and Systems I: Regular Papers, 70, 2904-2915. https://doi.org/10.1109/TCSI.2023.3264616.
Shafiq, D., Jhanjhi, N., Abdullah, A., & Alzain, M. (2021). A Load Balancing Algorithm for the Data Centres to Optimize Cloud Computing Applications. IEEE Access, 9, 41731-41744. https://doi.org/10.1109/ACCESS.2021.3065308.
Kumar, S., Camps-Mur, D., & Villegas, E. (2024). C-SLA-MLO: Enhancing SLA Compliance in Industrial Wi-Fi through Cooperative Multilink Operation. Internet Things, 27, 101269. https://doi.org/10.1016/j.iot.2024.101269.
Nurcahyo, A. C., Yong, A. T. H., & Atanda, A. F. (2024). Classification of Simulated Fake Bandwidth Data Using LSTM. TEPIAN, 5(3), 35–47. https://doi.org/10.51967/tepian.v5i3.3106
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Azriel Christian Nurcahyo, Huong Yong Ting, Abdulwahab Funsho Atanda

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.