Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement 2009
DOI: 10.1145/1644893.1644908
|View full text |Cite
|
Sign up to set email alerts
|

Challenging statistical classification for operational usage

Abstract: Accurate identification of network traffic according to application type is a key issue for most companies, including ISPs. For example, some companies might want to ban p2p traffic from their network while some ISPs might want to offer additional services based on the application. To classify applications on the fly, most companies rely on deep packet inspection (DPI) solutions. While DPI tools can be accurate, they require constant updates of their signatures database. Recently, several statistical traffic c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

1
39
0
1

Year Published

2011
2011
2019
2019

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 48 publications
(41 citation statements)
references
References 20 publications
1
39
0
1
Order By: Relevance
“…These algorithms are started with a set of random solution called initial population. Each member of this population is called a chromosome [8]. Each chromosome of this problem which consists of the string genes.…”
Section: IIImentioning
confidence: 99%
See 1 more Smart Citation
“…These algorithms are started with a set of random solution called initial population. Each member of this population is called a chromosome [8]. Each chromosome of this problem which consists of the string genes.…”
Section: IIImentioning
confidence: 99%
“…Arrange the all flow level of traffic data and goes from the multiple constraints function. The multiple constraints satisfied the given threshold function for the selection of constraint function [8,9]. The process of seed selection used genetic algorithm.…”
Section: IVmentioning
confidence: 99%
“…Maier et al [27] analyzed traffic data from the access network of a large European DSL operator, in [28] they analyzed traffic generated by mobile devices connecting to the access network via Wi-Fi. Pietrzyk et al [29] compared statistical classification of ADSL traffic to deep packet inspection. Romirer-Maierhofer et al [30] studied round trip times in a 3G network.…”
Section: Background and Related Workmentioning
confidence: 99%
“…According to the Wikipedia article about BitTorrent [2], the traffic generated by BitTorrent is greater than the traffic generated by Netflix and Hulu combined. Recently, a significant research effort has been done to develop tools for automatic classification of Internet traffic by application [9], [8], [11]. The purpose of the present work is to provide a framework for subclassification of P2P traffic generated by the BitTorrent protocol.…”
mentioning
confidence: 99%
“…The purpose of the present work is to provide a framework for subclassification of P2P traffic generated by the BitTorrent protocol. Unlike previous works [9], [8], [11], we cannot rely on packet level characteristics (packet size, packet interarrival time, etc). Instead we make use of the bipartite user-content graph.…”
mentioning
confidence: 99%