2012
DOI: 10.1109/mnet.2012.6135854
|View full text |Cite
|
Sign up to set email alerts
|

Issues and future directions in traffic classification

Abstract: he variety and complexity of modern Internet traffic exceeds anything imagined by the original designers of the underlying Internet architecture. As the Internet becomes our most critical communications infrastructure, service providers attempt to retrofit functionality, including security, reliability, privacy, and multiple service qualities, into a "best effort" architecture originally intended to support a research environment. In order to prioritize, protect, or prevent certain traffic, providers need to i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

1
226
0
3

Year Published

2013
2013
2022
2022

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 514 publications
(230 citation statements)
references
References 14 publications
1
226
0
3
Order By: Relevance
“…Internet traffic classification techniques such as port number matching, payload signature matching, statistics, and application behavior-based methods have been the foundation for traffic classification engines for many years [1], [3], [8], [9]. However, these methods are not yet applicable to real Copyright c 2014 The Institute of Electronics, Information and Communication Engineers networks.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Internet traffic classification techniques such as port number matching, payload signature matching, statistics, and application behavior-based methods have been the foundation for traffic classification engines for many years [1], [3], [8], [9]. However, these methods are not yet applicable to real Copyright c 2014 The Institute of Electronics, Information and Communication Engineers networks.…”
Section: Related Workmentioning
confidence: 99%
“…In previous studies, categorization was not associated with an application name but rather an L7 protocol name [1]- [3]. However, criteria for application naming are needed because many applications can use an L7 protocol such as hypertext transfer protocol (HTTP) for various purposes.…”
Section: Introductionmentioning
confidence: 99%
“…Alternative protocol identification strategies that have been explored include using packet sizes and timings [6,51], the types and number connections initiated by a host (its "social behavior") [23,26], and various machine learning techniques [33,34,55]. However, the feasibility of deploying more sophisticated classification strategies for DPI at scale remains unclear [11,34,40].…”
Section: Related Workmentioning
confidence: 99%
“…network management system to network system security [1], from benefit separation to network traffic engineering, from slant investigation to network traffic research [3].…”
Section: Introductionmentioning
confidence: 99%