2015 International Conference on Computational Intelligence and Communication Networks (CICN) 2015
DOI: 10.1109/cicn.2015.267
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Feature Selection Techniques for Internet Traffic Classification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
33
0
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 60 publications
(36 citation statements)
references
References 28 publications
0
33
0
1
Order By: Relevance
“…Various machine-learning methods had been combined to build hybrid models [46][47][48] in progressive or parallel structures [49], but most of the models were too complex for real-time classification. For the general statistical feature methods, Dorfinger et al [50] identified encrypted traffic according to the entropy of packet data; however, some studies [1,29] have recently found that the entropy method cannot distinguish between encrypted traffic and compressed traffic. Among them, KNN [51][52][53] is light and accurate, and could train a high-performance model with a small amount of labeled data.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Various machine-learning methods had been combined to build hybrid models [46][47][48] in progressive or parallel structures [49], but most of the models were too complex for real-time classification. For the general statistical feature methods, Dorfinger et al [50] identified encrypted traffic according to the entropy of packet data; however, some studies [1,29] have recently found that the entropy method cannot distinguish between encrypted traffic and compressed traffic. Among them, KNN [51][52][53] is light and accurate, and could train a high-performance model with a small amount of labeled data.…”
Section: Related Workmentioning
confidence: 99%
“…Furthermore, trainFlows represents the flow features of the training samples after data normalization, while enTrainFlows represents the encrypted flow data of trainFlows. The sets of FI 1 , FI 2 and FI 3 are the selected feature index, while w (1) , w (2) and w (3) are the feature weight sets after training.…”
Section: Algorithm 3: Fce-knnmentioning
confidence: 99%
See 1 more Smart Citation
“…AND THE PROPOSED APPROACH 2.1 Filter approach A filter method selects a subset of features or ranks features based on some general characteristics of the features, independently without including any classification methods. [5][6][7][8][9][10][11] There are two main types of filter-based feature selection: unsupervised and supervised. Unsupervised methods select features according to distance or similarity/dissimilarity between features, [13,14] whilst supervised methods select features according to their correlation or relevance with class labels.…”
Section: Filter Approach Wrapper Approachmentioning
confidence: 99%
“…However, wrapper methods are usually more accurate than filter methods. [5][6][7][8][9][10][11] Embedded approach searches locally for features that allow better local discrimination. It uses independent criteria to decide on the optimal subsets for given cardinality, in which learning algorithms are usually used to select the final optimal feature subset.…”
Section: Introductionmentioning
confidence: 99%