2020 International Conference on COMmunication Systems &Amp; NETworkS (COMSNETS) 2020
DOI: 10.1109/comsnets48256.2020.9027353
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Keyword Matching for Deep Packet Inspection based Network Traffic Classification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 18 publications
(9 citation statements)
references
References 12 publications
0
6
0
Order By: Relevance
“…In these tables, column headers include the name of device and number within bracket indicates the number of flows used in testing. For example, in Table 4, the second column Belkin Motion Sensor (26,197) indicates there are 26,197 flows in testing dataset of this device. We can notice from Table 5 that in all the cases the number of flows classified correctly has increased along with a significant reduction in number of unclassified cases.…”
Section: Recallmentioning
confidence: 99%
See 2 more Smart Citations
“…In these tables, column headers include the name of device and number within bracket indicates the number of flows used in testing. For example, in Table 4, the second column Belkin Motion Sensor (26,197) indicates there are 26,197 flows in testing dataset of this device. We can notice from Table 5 that in all the cases the number of flows classified correctly has increased along with a significant reduction in number of unclassified cases.…”
Section: Recallmentioning
confidence: 99%
“…This is achieved through 1. Reducing the quantum of payload data screened for finding the keywords: Our initial work [26] in this direction has proposed few optimizations. 2.…”
Section: Ta B L E 6 Confusion Matrix For Keyword-based Classification...mentioning
confidence: 99%
See 1 more Smart Citation
“…For evaluation, they utilized the JnetPcap library and Aho‐Corasic FSM on the first 100 bytes of each payload to derive keywords and the next 924 bytes to design application specific signatures. They were able to achieve a minimum recall of 93.72% 23 …”
Section: Related Workmentioning
confidence: 99%
“…Some approaches classify traffic according to its category i.e., whether the traffic represents file transfer, peer to peer (P2P), games, multimedia, web, or attacks [2]- [8]. Others try to identify the protocol involved at the application level such as file transfer protocol (FTP), hypertext transfer protocol (HTTP), secure shell (SSH), Telnet [9]- [14]. One particular study reviewed current traffic classification methods by classifying them into five categories: statistics-based, correlation-based, behaviour-based, payload-based, [15].…”
Section: Introductionmentioning
confidence: 99%