Hybrid multicriteria fuzzy classification of network traffic patterns, anomalies, and protocols

作者: F. Al-Obeidat , E.-S. M. El-Alfy

DOI: 10.1007/S00779-017-1096-Z

关键词: Fuzzy classificationComputer scienceTraffic shapingNetwork traffic controlBenchmark (computing)Traffic generation modelTraffic classificationNetwork packetMachine learningQuality of serviceArtificial intelligenceData mining

摘要: … 2 With attribute selection: Comparisons of average accuracy and running time for different approaches using 10-fold cross validation (results are approximated to two decimal digits); …

参考文章(51)
Denis Zuev, Andrew W. Moore, Traffic Classification Using a Statistical Approach Lecture Notes in Computer Science. pp. 321- 324 ,(2005) , 10.1007/978-3-540-31966-5_25
Denis Zuev, Andrew Moore, Michael Crogan, Discriminators for use in flow-based classification ,(2013)
Keki B. Irani, Usama M. Fayyad, Multi-Interval Discretization of Continuous-Valued Attributes for Classification Learning international joint conference on artificial intelligence. ,vol. 2, pp. 1022- 1027 ,(1993)
J. R. Quinlan, Improved use of continuous attributes in C4.5 Journal of Artificial Intelligence Research. ,vol. 4, pp. 77- 90 ,(1996) , 10.1613/JAIR.279
Vivens Ndatinya, Zhifeng Xiao, Vasudeva Rao Manepalli, Ke Meng, Yang Xiao, Network forensics analysis using Wireshark International Journal of Security and Networks. ,vol. 10, pp. 91- 106 ,(2015) , 10.1504/IJSN.2015.070421
JunPing Wang, Qiuming Kuang, ShiHui Duan, A new online anomaly learning and detection for large-scale service of Internet of Thing ubiquitous computing. ,vol. 19, pp. 1021- 1031 ,(2015) , 10.1007/S00779-015-0874-8
El-Sayed M. El-Alfy, Feras N. Al-Obeidat, Detecting Cyber-Attacks on Wireless Mobile Networks Using Multicriterion Fuzzy Classifier with Genetic Attribute Selection Mobile Information Systems. ,vol. 2015, pp. 1- 13 ,(2015) , 10.1155/2015/585432
Wenying Feng, Qinglei Zhang, Gongzhu Hu, Jimmy Xiangji Huang, Mining network data for intrusion detection through combining SVMs with ant colony networks Future Generation Computer Systems. ,vol. 37, pp. 127- 140 ,(2014) , 10.1016/J.FUTURE.2013.06.027
Y. Okada, S. Ata, N. Nakamura, Y. Nakahira, I. Oka, Comparisons of Machine Learning Algorithms for Application Identification of Encrypted Traffic international conference on machine learning and applications. ,vol. 2, pp. 358- 361 ,(2011) , 10.1109/ICMLA.2011.162
Yuichi Kumano, Shingo Ata, Nobuyuki Nakamura, Yoshihiro Nakahira, Ikuo Oka, Towards real-time processing for application identification of encrypted traffic 2014 International Conference on Computing, Networking and Communications (ICNC). pp. 136- 140 ,(2014) , 10.1109/ICCNC.2014.6785319