2017
DOI: 10.1007/978-981-10-6502-6_44
|View full text |Cite
|
Sign up to set email alerts
|

Multi-stage Feature Selection for On-Line Flow Peer-to-Peer Traffic Identification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
6

Relationship

3
3

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 22 publications
0
5
0
Order By: Relevance
“…The key challenge for selecting features is preserving the appropriate features subset for accurate traffic identification. Traffic classification accuracy is associated with a small number of appropriate features [17], [19]- [21]. Various FS methods select various sets of significant features, but they do not always select the same number of significant features.…”
Section: Challenges In Feature Selection For Traffic Classificationmentioning
confidence: 99%
See 1 more Smart Citation
“…The key challenge for selecting features is preserving the appropriate features subset for accurate traffic identification. Traffic classification accuracy is associated with a small number of appropriate features [17], [19]- [21]. Various FS methods select various sets of significant features, but they do not always select the same number of significant features.…”
Section: Challenges In Feature Selection For Traffic Classificationmentioning
confidence: 99%
“…Nonetheless, it is not always so in practice because not every feature is informative and useful. Some statistical flow features may not be relevant and uninformative, while others may have high inter-correlation with each other features and thus redundant [17], [18]. The use of less significant traffic features affects the efficiency and accuracy of network traffic classification [17], [19]- [21].…”
Section: Introductionmentioning
confidence: 99%
“…Online features are extracted and online features with IAT and without IAT as suggested in our previous work [28] are selected. For the UNIBS and PAM datasets, the features are extracted based on the first five packets statistic of each flow.…”
Section: Dataset Preprocessingmentioning
confidence: 99%
“…This method is challenged by high resource requirements, its inefficiency on encrypted traffic and privacy related issues. Host behaviour-based [14,16], and flow features-based [11,17] which analyse packet flow [18] and flow duration are alternative approaches that do not require payload inspection [12]. Recently, methods using Transport Layer Statistics features and Machine Learning approaches have been developed [19], and there are continuous studies toward improving their performance.…”
Section: Introductionmentioning
confidence: 99%