2018
DOI: 10.1016/j.jnca.2017.11.007
|View full text |Cite
|
Sign up to set email alerts
|

Multi-classification approaches for classifying mobile app traffic

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
88
0
4

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 153 publications
(92 citation statements)
references
References 40 publications
0
88
0
4
Order By: Relevance
“…Without this practice, their model's robustness is frustrated in terms of devices and app versions [4]. Recently, Aceto et al [6] proposed a multiclassification approach of intelligently combining outputs from state-of-the-art classifiers to improve the performance of APP-ID. e performance can be improved according to all considered metrics up to +9.5% recall score with respect to the best base classifier.…”
Section: Traffic Classification For App-idmentioning
confidence: 99%
See 3 more Smart Citations
“…Without this practice, their model's robustness is frustrated in terms of devices and app versions [4]. Recently, Aceto et al [6] proposed a multiclassification approach of intelligently combining outputs from state-of-the-art classifiers to improve the performance of APP-ID. e performance can be improved according to all considered metrics up to +9.5% recall score with respect to the best base classifier.…”
Section: Traffic Classification For App-idmentioning
confidence: 99%
“…Most previously proposed APP-ID solutions report decent performance with results based on private datasets, usually labeled by approaches of unknown reliability. In order to obtain the ground truth, the most common way is running apps one by one separately and manually label the trace [6]. It is, however, not viable due to the background traffic generated by system or sleeping apps.…”
Section: Mobile Traffic Collection and Dataset Constructionmentioning
confidence: 99%
See 2 more Smart Citations
“…Indeed, TC-consisting in associating traffic aggregates to specific applications or groups of applications (viz. labeling them)-is of utmost importance in Internet traffic engineering, along with related methodologies & tools, as they jointly support activities such as network monitoring, security assessment, application identification, anomaly detection, accounting, advertising, and service differentiation [2,3]. For these reasons, TC has gained importance in recent years due to growing incentives to disguise certain applications [4], comprising those generating anonymous traffic [5].…”
Section: Introductionmentioning
confidence: 99%