2012 26th International Conference on Advanced Information Networking and Applications Workshops 2012
DOI: 10.1109/waina.2012.145
|View full text |Cite
|
Sign up to set email alerts
|

Session Level Flow Classification by Packet Size Distribution and Session Grouping

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2013
2013
2016
2016

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 19 publications
0
6
0
Order By: Relevance
“…The main method for classification is Hidden Markov Modeling to profile network behavior . To detect in the application level, session classification method is performed too . The combination of these two methods leads to strong results that cover both in application level behavior and protocols.…”
Section: Evaluation and Experimental Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…The main method for classification is Hidden Markov Modeling to profile network behavior . To detect in the application level, session classification method is performed too . The combination of these two methods leads to strong results that cover both in application level behavior and protocols.…”
Section: Evaluation and Experimental Resultsmentioning
confidence: 99%
“…Most of the network analysis techniques are based on the three vital origins: direction, time, and packet size. Some techniques like the Hidden Markov Model and session classification use time and size features to analyze the Internet traffic, but some other techniques work according to the direction of the data flow or mixed information of the direction and size or time .…”
Section: Preliminaries and Backgroundmentioning
confidence: 99%
See 1 more Smart Citation
“…Intelligent flow processing is an advanced method in Refs. [29][30][31] for intrusion detection. Intelligent flow processing in vCNSMS is based on the smart packet verdict scheme.…”
Section: Intelligent Flow Processing In Vcnsmsmentioning
confidence: 99%
“…Identification and classification of network applications using data mining and pattern recognition methods [5]- [7] confirm that computer networks, including the Internet, use a wide range of packet-based applications. Traditionally, applications are identified by inspection of the destination port number in packet header.…”
Section: Introductionmentioning
confidence: 98%