2012
DOI: 10.1007/978-3-642-31537-4_45
|View full text |Cite
|
Sign up to set email alerts
|

Machine Learning-Based Classification of Encrypted Internet Traffic

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 15 publications
0
4
0
Order By: Relevance
“…The efficiency of the classifier has been calculated according to the confusion matrix (CM) as shown in Figure3. For each record in the testing dataset the following evaluation metric is applied: • False-Positive CM[0] [1]: the number of non-VPN packets that are incorrectly classified as VPN.…”
Section: Evaluation Metricsmentioning
confidence: 99%
See 1 more Smart Citation
“…The efficiency of the classifier has been calculated according to the confusion matrix (CM) as shown in Figure3. For each record in the testing dataset the following evaluation metric is applied: • False-Positive CM[0] [1]: the number of non-VPN packets that are incorrectly classified as VPN.…”
Section: Evaluation Metricsmentioning
confidence: 99%
“…Traffic Classification is the principle of recognition of protocols and implementations by evaluating the network traffic. Traffic classification techniques are used for a wide variety of purposes, including Quality of Service (QoS), traffic forming, Intrusion Detection Systems (IDS), and network forensic solutions [1,2,3,4,5,6]. Usually, traffic can be classified as normal or malware traffic to detect and prevent attacks.…”
Section: Introductionmentioning
confidence: 99%
“…The approach provides very accurate results in classifying applications [3] . Hence, it is mostly employed in commercial tools, however [4], DPI performs poorly against encrypted traffics, and incurs high computational overhead [5].…”
Section: Introductionmentioning
confidence: 99%
“…The main intuition behind such methods is that the statistical attributes of network traffic are unique for different applications and can therefore be used to differentiate applications from each other [6]. Machine learning (ML) methods on the other hand are highly efficient in dealing with statistical data [4]. Therefore, several machine learning algorithms such as K-Nearest Neighbor [7], Random Forest [3] , Support Vector [8] Machines are employed.…”
Section: Introductionmentioning
confidence: 99%