The Effectiveness Study of ML-based Methods for Protocol Identification in Different Network Environments

作者: Luoshi Zhang , Yibo Xue , Dawei Wang

DOI: 10.14257/IJFGCN.2015.8.2.16

关键词: False positives and false negativesComputer scienceProtocol (science)Variety (cybernetics)Identification methodsIdentification (information)Data miningResearch studiesEncryptionScale (chemistry)

摘要: Due to the wide use of encrypted protocols and random ports, traditional methods that based on port number or packet payload have gradually lose their effectiveness. To address this …

参考文章(13)
Anthony McGregor, Mark Hall, Perry Lorier, James Brunskill, Flow Clustering Using Machine Learning Techniques passive and active network measurement. ,vol. 3015, pp. 205- 214 ,(2004) , 10.1007/978-3-540-24668-8_21
T. Karagiannis, A. Broido, N. Brownlee, K.C. Claffy, M. Faloutsos, Is P2P dying or just hiding? [P2P traffic measurement] global communications conference. ,vol. 3, pp. 1532- 1538 ,(2004) , 10.1109/GLOCOM.2004.1378239
Andrew W. Moore, Denis Zuev, Internet traffic classification using bayesian analysis techniques measurement and modeling of computer systems. ,vol. 33, pp. 50- 60 ,(2005) , 10.1145/1064212.1064220
Nigel Williams, Sebastian Zander, Grenville Armitage, A preliminary performance comparison of five machine learning algorithms for practical IP traffic flow classification ACM SIGCOMM Computer Communication Review. ,vol. 36, pp. 5- 16 ,(2006) , 10.1145/1163593.1163596
Tom Auld, Andrew W. Moore, Stephen F. Gull, Bayesian Neural Networks for Internet Traffic Classification IEEE Transactions on Neural Networks. ,vol. 18, pp. 223- 239 ,(2007) , 10.1109/TNN.2006.883010
Thomas Karagiannis, Konstantina Papagiannaki, Michalis Faloutsos, BLINC: multilevel traffic classification in the dark acm special interest group on data communication. ,vol. 35, pp. 229- 240 ,(2005) , 10.1145/1080091.1080119
J.P. Early, C.E. Brodley, C. Rosenberg, Behavioral authentication of server flows 19th Annual Computer Security Applications Conference, 2003. Proceedings.. pp. 46- 55 ,(2003) , 10.1109/CSAC.2003.1254309
Yu Jin, Esam Sharafuddin, Zhi-Li Zhang, Unveiling core network-wide communication patterns through application traffic activity graph decomposition Proceedings of the eleventh international joint conference on Measurement and modeling of computer systems - SIGMETRICS '09. ,vol. 37, pp. 49- 60 ,(2009) , 10.1145/1555349.1555356
Baohua Yang, Guangdong Hou, Lingyun Ruan, Yibo Xue, Jun Li, SMILER: Towards Practical Online Traffic Classification architectures for networking and communications systems. pp. 178- 188 ,(2011) , 10.1109/ANCS.2011.34
Juan D Rodriguez, Aritz Perez, Jose A Lozano, None, Sensitivity Analysis of k-Fold Cross Validation in Prediction Error Estimation IEEE Transactions on Pattern Analysis and Machine Intelligence. ,vol. 32, pp. 569- 575 ,(2010) , 10.1109/TPAMI.2009.187