2018 7th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO) 2018
DOI: 10.1109/icrito.2018.8748772
|View full text |Cite
|
Sign up to set email alerts
|

Clustering Techniques for Traffic Classification: A Comprehensive Review

Abstract: The threat of malicious content on a network requires network administrators and users to accurately detect desirable traffic flow into their respective networks. To this effect, several studies have found it imperative to classify traffic flow, and to use traffic classification in various applications such as intrusion detection, monitoring systems, as well as pattern detection in various networks. Research into machine learning techniques of clustering emerged due to the inefficiencies and drawbacks of the t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 28 publications
(37 reference statements)
0
4
0
Order By: Relevance
“…However, the effectiveness of these methods also has greatly reduced due to the fact that the customers use encrypted flows, while governments decided to band to have third parties to involve in the system to examine payloads for safety purposes. In addition, the inspection process of packets payload syntax could give a heavy operational load and delay [9].…”
Section: Literature Review 21 Overviewmentioning
confidence: 99%
See 2 more Smart Citations
“…However, the effectiveness of these methods also has greatly reduced due to the fact that the customers use encrypted flows, while governments decided to band to have third parties to involve in the system to examine payloads for safety purposes. In addition, the inspection process of packets payload syntax could give a heavy operational load and delay [9].…”
Section: Literature Review 21 Overviewmentioning
confidence: 99%
“…This approach has become popular as encrypting traffic of applications becoming a new trend that causes challenges for any of the proposed classification tools that previously claimed to be able to achieve high accuracy in applications classification. However, the accuracy might drop if the training data is insufficient as high amount of data is needed as learning process [4], [9]. In Weka [19], various ML algorithms are tested and compared.…”
Section: Literature Review 21 Overviewmentioning
confidence: 99%
See 1 more Smart Citation
“…K-means clustering: Clustering techniques consist of unsupervised and semi-supervised learning methods and are mainly used to handle the associations of some characteristic features [28]. In this study, we considered each frame with its extracted features as a record, and used k-means clustering to classify them into categories which could indicate degrees of risk.…”
Section: Data Mining Techniques For Ppre Analysismentioning
confidence: 99%