2017 International Conference on Computing, Networking and Communications (ICNC) 2017
DOI: 10.1109/iccnc.2017.7876241
|View full text |Cite
|
Sign up to set email alerts
|

Application identification via network traffic classification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
43
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 107 publications
(43 citation statements)
references
References 16 publications
0
43
0
Order By: Relevance
“…As mentioned in Section 2, authors in [16] tried to characterize network traffic using time-related features handcrafted from traffic flows such as the duration of the flow and flow bytes per second. Yamansavascilar et al also used such time-related features to identify the end-user application [47]. Both of these studies evaluated their models on the "ISCX VPN-nonVPN traffic dataset" and their best results can be found in Table 5.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…As mentioned in Section 2, authors in [16] tried to characterize network traffic using time-related features handcrafted from traffic flows such as the duration of the flow and flow bytes per second. Yamansavascilar et al also used such time-related features to identify the end-user application [47]. Both of these studies evaluated their models on the "ISCX VPN-nonVPN traffic dataset" and their best results can be found in Table 5.…”
Section: Resultsmentioning
confidence: 99%
“…In the light of this approach, the cumbersome step of finding and extracting distinguishing features has been omitted. -Deep Packet can identify traffic at both granular levels (application identification and traffic characterization) with state-of-the-art results compared to the other works conducted on similar dataset [16,47]. -Deep Packet can accurately classify one of the hardest class of applications, known to be P2P [20].…”
Section: Introductionmentioning
confidence: 93%
See 1 more Smart Citation
“…They experimented using k ‐nearest neighbor ( k NN) and C4.5 decision tree algorithms and achieved approximately 92% and 88% recall, respectively, for the VPN‐tunneled dataset. Yamansavascilar and others selected 111 discriminators for 14 classes of applications and achieved an accuracy of 94% with k ‐NN algorithm. However, in their report, they did not mention the specific details of their implementation, and the results need to be revalidated by independent third parties to increase their credibility.…”
Section: Resultsmentioning
confidence: 99%
“…In [5] conducts research to analyze security by using IPv6 addressing and performing comparisons between routing protocols used. In the year 2017, [6] conducted research to identify the application by classifying network traffic. In international scientific journals described by S. Moemen Bellah dan H. Khanjari in 2015 [7] has modeled for band width management automatically on a virtual private network.…”
Section: Introductionmentioning
confidence: 99%