2017
DOI: 10.1007/s00779-017-1096-z
|View full text |Cite
|
Sign up to set email alerts
|

Hybrid multicriteria fuzzy classification of network traffic patterns, anomalies, and protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
10
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(11 citation statements)
references
References 40 publications
0
10
0
Order By: Relevance
“…In the specific context of traffic classification, there are some works [34,35] that propose the use of fuzzy models. The work in [34] discusses the application of hybrid models in which fuzzy theory elements are included into a neural network architecture.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In the specific context of traffic classification, there are some works [34,35] that propose the use of fuzzy models. The work in [34] discusses the application of hybrid models in which fuzzy theory elements are included into a neural network architecture.…”
Section: Related Workmentioning
confidence: 99%
“…The work in [34] discusses the application of hybrid models in which fuzzy theory elements are included into a neural network architecture. As regards the contribution discussed in [35], the authors propose an approach which combines a decision trees and fuzzy membership functions for dealing with noisy and vague data. Note that both works include in their experimental analysis a comparison with the traffic classification methods based on SVM.…”
Section: Related Workmentioning
confidence: 99%
“…Al-Obeidat and El-Alfy [12] proposed an approach to address the space issue between yes and no in binary classification. Their decision tree generates rules, which have incredibly crisp intervals, and using the fuzzy membership to an object of a class can address marginal space issues between yes and no.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Characterization of network anomaly traffic is one of the key technologies commonly used to model and detect network anomalies and then to raise the cybersecurity awareness capability of network administrators. e existing approaches of network anomaly detection can be mainly classified into six categories [1]: classification-based methods [2][3][4], clustering-based methods [5][6][7][8][9], statistical methods [10,11], stochastic methods [12,13], deep-learning-based methods [14][15][16][17], and others [18][19][20][21].…”
Section: Introductionmentioning
confidence: 99%