2013 Annual IEEE India Conference (INDICON) 2013
DOI: 10.1109/indcon.2013.6726074
|View full text |Cite
|
Sign up to set email alerts
|

Machine learning based internet traffic recognition with statistical approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
6
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 22 publications
(7 citation statements)
references
References 18 publications
1
6
0
Order By: Relevance
“…And due to the discriminative ability of the supervised learning, we would select common and comprehensive features as input to provide sufficient statistics for different tasks of classifications. Thus, we concluded from the previous studies [5]- [7] and decided to implement totally 16 features promising the unbias from feature selection (which has been evaluated by matrix factorization methods, such as variational bayesian matrix factorization [34]): transport layer source port, destination port, number of packets with PUSH flag, ratio of upload and download, the first quartile of inter-arrival time and packet size, the statistical properties of the inter-arrival times and packet sizes (the minimum, the maximum, the mean, the variance and the rooted mean square).…”
Section: Datasets and Feature Selectionsupporting
confidence: 51%
See 1 more Smart Citation
“…And due to the discriminative ability of the supervised learning, we would select common and comprehensive features as input to provide sufficient statistics for different tasks of classifications. Thus, we concluded from the previous studies [5]- [7] and decided to implement totally 16 features promising the unbias from feature selection (which has been evaluated by matrix factorization methods, such as variational bayesian matrix factorization [34]): transport layer source port, destination port, number of packets with PUSH flag, ratio of upload and download, the first quartile of inter-arrival time and packet size, the statistical properties of the inter-arrival times and packet sizes (the minimum, the maximum, the mean, the variance and the rooted mean square).…”
Section: Datasets and Feature Selectionsupporting
confidence: 51%
“…Our work was motivated by the fact that the demands will always be changing and that most of the previous works have shown that some features can be used to discriminate different tasks of flows. For instance, the features for classifying either elephant or mice flows and that for identifying the applications of flow, are surprisingly similar [5]- [7]. This alludes to that there might be some common knowledge for different traffic classification tasks and the mapping functions from the selected features to the different flow properties that we need to predict are of close relations.…”
mentioning
confidence: 96%
“…It turns out that revealing the basic patterns of the traffic data at the base station level, can represent an important solution for those providers that face network congestion problems or over-provisioning of the link capacity. Then, we investigated previous work on traffic data classification and identification in [2], [3] and [4]. They deal with different methods, from statistical to principal component analysis approaches, obtaining results with high accuracy.…”
Section: Related Workmentioning
confidence: 99%
“…Unfortunately, the effectiveness of such packet inspection techniques is diminishing because they rely on two related assumptions: 1) third parties unaffiliated are able to inspect each IP packet's payload; 2) the classifier knows the syntax of each application's packet payloads. Newer approaches classify internet traffic by recognising statistical patterns in externally observable attributes [3] (such as typical packet lengths and inter-packet arrival times). They aim to cluster IP traffic flows into groups that have similar traffic patterns, or classify one or more applications.…”
Section: Introductionmentioning
confidence: 99%
“…The evaluation results identified the effectiveness of such structures. After introducing four types of machine learning techniques, Jaiswal and Lokhande [24] demonstrated a classification scheme for network traffic. Both the new captured dataset and standard dataset are adopted for investigation purpose.…”
Section: Related Workmentioning
confidence: 99%