2013
DOI: 10.1109/tpds.2012.98
|View full text |Cite
|
Sign up to set email alerts
|

Network Traffic Classification Using Correlation Information

Abstract: Traffic classification has wide applications in network management, from security monitoring to quality of service measurements. Recent research tends to apply machine learning techniques to flow statistical feature based classification methods. The nearest neighbor (NN)-based method has exhibited superior classification performance. It also has several important advantages, such as no requirements of training procedure, no risk of overfitting of parameters, and naturally being able to handle a huge number of … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
117
0
1

Year Published

2014
2014
2021
2021

Publication Types

Select...
6
3

Relationship

1
8

Authors

Journals

citations
Cited by 288 publications
(120 citation statements)
references
References 39 publications
2
117
0
1
Order By: Relevance
“…The effectiveness of this scheme is validated via simulation. Flow correlation information is utilized by Zhang et al [10][11][12] to further improve the classification accuracy considering only a small number of training instances based on K-Nearest-Neighbor and Naive Bayes classifiers that are used to detect anomalies in the network. Yan et al [13] propose a framework of security and trust for 5G based on the perspective that the next generation network functions will be highly virtualized and software defined networking is applied for traffic control.…”
Section: Anomaly Detection Techniquesmentioning
confidence: 99%
“…The effectiveness of this scheme is validated via simulation. Flow correlation information is utilized by Zhang et al [10][11][12] to further improve the classification accuracy considering only a small number of training instances based on K-Nearest-Neighbor and Naive Bayes classifiers that are used to detect anomalies in the network. Yan et al [13] propose a framework of security and trust for 5G based on the perspective that the next generation network functions will be highly virtualized and software defined networking is applied for traffic control.…”
Section: Anomaly Detection Techniquesmentioning
confidence: 99%
“…As soon as the empirical mean and variance are available for both edges of a segment, the linear equations (intercept and slope) of that segment for both μ and σ 2 models are computed (lines [12][13][14][15][16][17]. Segments are identified by an intercept a that equals the empirical value at the starting of the segment and a slope b computed from the values at both edges and the segment length according to equation (3).…”
Section: A Traffic Modelingmentioning
confidence: 99%
“…Let us consider now a particular core OD pair od and its set of aggregated metro-flows F(od), where predictive models for the mean (μf) and the variance (σ Correlation is commonly observed in the traffic and has been already studied in the literature [16]. Therefore, it would not be realistic to assume that the aggregated metro-flows have uncorrelated traffic if, for instance, they convey similar service traffic.…”
Section: B Od Pair Traffic Modellingmentioning
confidence: 99%
“…Эта проблему очень трудно решить, если нет информации о реальных приложениях. Для решения этой проблемы в работе [27] предложен новый непараметрический подход, который заключается во включении корреляционной информации потоков в процесс классификации.…”
Section: идентификация сетевых трафиков на основе методов машиннunclassified