2022
DOI: 10.1109/access.2022.3181135
|View full text |Cite
|
Sign up to set email alerts
|

Procedures, Criteria, and Machine Learning Techniques for Network Traffic Classification: A Survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
22
0

Year Published

2022
2022
2025
2025

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 22 publications
(22 citation statements)
references
References 132 publications
0
22
0
Order By: Relevance
“…Several methods for traffic classification exist, each handling traffic information differently. These techniques are port-based classification, payload-based classification, statistical-based classification, behavioral-based classification, and correlation-based classification [36,37].…”
Section: Traffic Classification Techniquementioning
confidence: 99%
See 1 more Smart Citation
“…Several methods for traffic classification exist, each handling traffic information differently. These techniques are port-based classification, payload-based classification, statistical-based classification, behavioral-based classification, and correlation-based classification [36,37].…”
Section: Traffic Classification Techniquementioning
confidence: 99%
“…The method is based on examining packet headers and comparing port numbers of registered applications. Examining only the packet headers presents a fast and simple classification [36]. This type of classification is especially important for identifying network applications in large network traffic [36].…”
Section: Traffic Classification Techniquementioning
confidence: 99%
“…Behavior features refer to the observable data behaviors or user behaviors in communication system [11]. Statistical features are extracted by statistical analysis of protocol data stream [12].…”
Section: A Related Workmentioning
confidence: 99%
“…For the purposes of this paper, we used the NSL-KDD dataset, which is a refined version of its predecessor KDD’99, a well-known benchmark in the research on intrusion detection techniques [ 6 , 9 , 10 , 11 , 12 , 13 ]. This labeled dataset is split into training and testing files and can be downloaded from [ 12 ].…”
Section: Introductionmentioning
confidence: 99%