2018 International Conference on Computational Techniques, Electronics and Mechanical Systems (CTEMS) 2018
DOI: 10.1109/ctems.2018.8769309
|View full text |Cite
|
Sign up to set email alerts
|

Network Traffic Classification Techniques-A Review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(10 citation statements)
references
References 9 publications
0
6
0
Order By: Relevance
“…ADFA is an IDS that includes three data types in its structure: (1) normal training data with 4373 traces; (2) normal validation data with 833 traces; and (3) attack data with 10 attacks per vector. As the web became a significant internet criminal activity platform, the security community put in efforts to blacklist malicious URLs.…”
Section: Common Datasets Usedmentioning
confidence: 99%
See 3 more Smart Citations
“…ADFA is an IDS that includes three data types in its structure: (1) normal training data with 4373 traces; (2) normal validation data with 833 traces; and (3) attack data with 10 attacks per vector. As the web became a significant internet criminal activity platform, the security community put in efforts to blacklist malicious URLs.…”
Section: Common Datasets Usedmentioning
confidence: 99%
“…Several techniques have been proposed over the years to handle and classify network traffic attacks. One is the port-based technique, which includes identifying port numbers among the ones registered by the Internet Assign Number Authority (IANA) [1]. However, due to the growing number of applications, the number of unpredictable ports has increased and this technique has proven to be ineffective.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…They are particularly well-suited for peer-to-peer (P2P) traffic. However, they have some disadvantages and weaknesses [35,36]. They require very expensive hardware for the payload method search.…”
Section: Payload-based Classificationmentioning
confidence: 99%