2015 IEEE International Conference on Computer and Communications (ICCC) 2015
DOI: 10.1109/compcomm.2015.7387586
|View full text |Cite
|
Sign up to set email alerts
|

Unknown network protocol classification method based on semi-supervised learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
12
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(12 citation statements)
references
References 19 publications
0
12
0
Order By: Relevance
“…For instance, since the field keyword "GET" has high frequency in HTTP sessions, it is considered as a field keyword. This is an Apriori property implementation (Agrawal and Srikant, 1994 [29] 2005 I Dialogs/scripts RolePlayer [30] 2006 I Dialogs/scripts Ma et al [31] 2006 I App-identification Boosting [32] 2008 I Field(s) Dispatcher [6] 2009 I C&C malware ASAP [33] 2011 I Semantics Dispatcher2 [34] 2013 I C&C malware ProVeX [35] 2013 I Signatures PIP [36] 2014 I Keywords/ fields FieldHunter [37] 2015 I Fields RS Cluster [38] 2015 I Grouped-messages UPCSS [39] 2015 I Proto-classification PowerShell [40] 2017 I Dialogs/scripts ProPrint [41] 2017 I Fingerprints ProHacker [42] 2017 I Keywords network traces based inputs and 1 approach utilizes both network trace and execution trace based inputs whereas 1 approach utilizes execution traces based input.…”
Section: Both Protocols Formats and Pfsmmentioning
confidence: 99%
See 2 more Smart Citations
“…For instance, since the field keyword "GET" has high frequency in HTTP sessions, it is considered as a field keyword. This is an Apriori property implementation (Agrawal and Srikant, 1994 [29] 2005 I Dialogs/scripts RolePlayer [30] 2006 I Dialogs/scripts Ma et al [31] 2006 I App-identification Boosting [32] 2008 I Field(s) Dispatcher [6] 2009 I C&C malware ASAP [33] 2011 I Semantics Dispatcher2 [34] 2013 I C&C malware ProVeX [35] 2013 I Signatures PIP [36] 2014 I Keywords/ fields FieldHunter [37] 2015 I Fields RS Cluster [38] 2015 I Grouped-messages UPCSS [39] 2015 I Proto-classification PowerShell [40] 2017 I Dialogs/scripts ProPrint [41] 2017 I Fingerprints ProHacker [42] 2017 I Keywords network traces based inputs and 1 approach utilizes both network trace and execution trace based inputs whereas 1 approach utilizes execution traces based input.…”
Section: Both Protocols Formats and Pfsmmentioning
confidence: 99%
“…The technique is suitable for clustering network traffic and group protocol messages according to their types and can analyze multidimension of uncertain information in multiple categorical attributes based on Rough Sets theory [51]. UPCSS (Unknown network Protocol Classification method based on Semi-Supervised learning) [39] is a semisupervised learning method, proposed to identify applications from unknown protocols by labeling small training sample set. Based on Erman's semisupervised approach, UPCSS is designed to detect unknown samples generated by unknown protocols with the help of flow correlation information and semisupervised clustering techniques.…”
Section: Neither Protocols Formats Nor Pfsmsmentioning
confidence: 99%
See 1 more Smart Citation
“…In addition to static supervised and unsupervised algorithms, a growing number of studies have also utilized semi-supervised learning algorithms employing both labelled and unlabelled data [28]. Studies such as [29,30] proposed semi-supervised algorithms which combine two or more ML algorithms to detect new applications. Zhang in [29] studied the problem of zero-day applications using machine learning algorithms.…”
Section: Semi-supervised Learning Techniquesmentioning
confidence: 99%
“…The experimental results showed that the system outperformed other methods (semi-supervised clustering, one-class SVM, random forest and correlation-based classification). Similarly, Lin in [30] studied the problem of unknown protocols in traffic when the traditional methods misclassified the unknown samples which led to reduction in classification accuracy. The authors used three realtime databases (WIDE-10, WIDE-12, and CND) that were collected within different time period.…”
Section: Semi-supervised Learning Techniquesmentioning
confidence: 99%