Proceedings of the 6th International COnference 2010
DOI: 10.1145/1921168.1921180
|View full text |Cite
|
Sign up to set email alerts
|

Internet traffic classification demystified

Abstract: Recent research on Internet traffic classification has yield a number of data mining techniques for distinguishing types of traffic, but no systematic analysis on "Why" some algorithms achieve high accuracies. In pursuit of empirically grounded answers to the "Why" question, which is critical in understanding and establishing a scientific ground for traffic classification research, this paper reveals the three sources of the discriminative power in classifying the Internet application traffic: (i) ports, (ii) … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 101 publications
(13 citation statements)
references
References 44 publications
0
13
0
Order By: Relevance
“…web applications, Peer-to-Peer, DNS, SMTP, Gaming, etc.) [28,34]. However, the work towards IoT device identification and classification is in inception.…”
Section: Paper Organizationmentioning
confidence: 99%
“…web applications, Peer-to-Peer, DNS, SMTP, Gaming, etc.) [28,34]. However, the work towards IoT device identification and classification is in inception.…”
Section: Paper Organizationmentioning
confidence: 99%
“…For this comparison, we chose the J48 technique as a representative example of batch-oriented techniques, which is an open source version of the C4.5 decision tree implemented in WEKA. We selected this technique because it has been widely used for network traffic classification [5,6,12,29], achieving very good results when compared with other techniques [4,30]. Usually ML-based network traffic classification solutions presented in the literature are evaluated from a static point of view using limited datasets.…”
Section: Hoeffding Adaptive Tree Evaluationmentioning
confidence: 99%
“…State-of-the-art proposals for traffic classification are usually based on Deep Packet Inspection (DPI) or Machine Learning (ML) techniques [2][3][4][5][6][7][8][9]. These techniques extract in an offline phase a set of patterns, rules or models that capture a static view of a particular network and moment of time from a training dataset.…”
Section: Introductionmentioning
confidence: 99%
“…With appearance of the new service, the method of machine learning has been applied to the traffic identification. Identify fields on the flow, roughly divided into three research directions: one is the feature selection algorithm [7,8], the other is identification algorithm [1,2,9], another is a category for different types of data sets, for example, all packets can be divided into flows [10][11][12][13][14] that are sampling NETFLOW [15]. Complementary information about related work in the field of traffic identification can be found in the survey of traffic identification techniques using machine learning in [16], in the comparison of contemporary classification methods in [13], the survey on Inter-net traffic identification in [17] and the research review on traffic identification in [18].…”
Section: Research On Traffic Identificationmentioning
confidence: 99%