2013
DOI: 10.1109/tifs.2012.2223675
|View full text |Cite
|
Sign up to set email alerts
|

Internet Traffic Classification by Aggregating Correlated Naive Bayes Predictions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
65
0
1

Year Published

2014
2014
2021
2021

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 152 publications
(66 citation statements)
references
References 30 publications
0
65
0
1
Order By: Relevance
“…The effectiveness of this scheme is validated via simulation. Flow correlation information is utilized by Zhang et al [10][11][12] to further improve the classification accuracy considering only a small number of training instances based on K-Nearest-Neighbor and Naive Bayes classifiers that are used to detect anomalies in the network. Yan et al [13] propose a framework of security and trust for 5G based on the perspective that the next generation network functions will be highly virtualized and software defined networking is applied for traffic control.…”
Section: Anomaly Detection Techniquesmentioning
confidence: 99%
“…The effectiveness of this scheme is validated via simulation. Flow correlation information is utilized by Zhang et al [10][11][12] to further improve the classification accuracy considering only a small number of training instances based on K-Nearest-Neighbor and Naive Bayes classifiers that are used to detect anomalies in the network. Yan et al [13] propose a framework of security and trust for 5G based on the perspective that the next generation network functions will be highly virtualized and software defined networking is applied for traffic control.…”
Section: Anomaly Detection Techniquesmentioning
confidence: 99%
“…In constrained based clustering and classification technique provide the different constraints function for the process of clustering. The constrained based clustering technique set the constrained function for different type of data for a separate constraints function [2]. The constrained based clustering technique is very complex process and defines separate constraints function for the processing of classification and cluster generation.…”
Section: Introductionmentioning
confidence: 99%
“…Rapid developments in multimedia and broadband applications have made traffic classification a difficult subject, but over the years it has drawn significant importance [1]- [5] among researchers. Use of nonstandard ports, user privacy and huge traffic load on the network is creating major bottlenecks to some of the developed techniques.…”
Section: Introductionmentioning
confidence: 99%