Generally speaking, most systems of network traffic identification are based on features. The features may be port numbers, static signatures, statistic characteristics and so on. The difficulty of the traffic identification is to find the features in the flow data. The process is very time-consuming. Also, these approaches are invalid to unknown protocol.