A review on machine learning–based approaches for Internet traffic classification
Traffic classification acquired the interest of the Internet community early on. Different
approaches have been proposed to classify Internet traffic to manage both security and …
approaches have been proposed to classify Internet traffic to manage both security and …
Machine learning for traffic analysis: a review
Traffic analysis has many purposes such as evaluating the performance and security of
network operations and management. Therefore, network traffic analysis is considered vital …
network operations and management. Therefore, network traffic analysis is considered vital …
[HTML][HTML] Clustering based semi-supervised machine learning for DDoS attack classification
M Aamir, SMA Zaidi - Journal of King Saud University-Computer and …, 2021 - Elsevier
Semi-supervised machine learning can be used for obtaining subsets of unlabeled or
partially labeled dataset based on the applicable metrics of dissimilarity. At later stage, the …
partially labeled dataset based on the applicable metrics of dissimilarity. At later stage, the …
Adoption and realization of deep learning in network traffic anomaly detection device design
G Wei, Z Wang - Soft Computing, 2021 - Springer
In order to study the application of deep learning in the design of network traffic anomaly
detection device, aiming at two common problems in the field of network anomaly detection …
detection device, aiming at two common problems in the field of network anomaly detection …
Automated feature selection for anomaly detection in network traffic data
Variable selection (also known as feature selection) is essential to optimize the learning
complexity by prioritizing features, particularly for a massive, high-dimensional dataset like …
complexity by prioritizing features, particularly for a massive, high-dimensional dataset like …
Network traffic reduction and representation
LKB Melhim, M Jemmali… - … Journal of Sensor …, 2020 - inderscienceonline.com
Efficient and reliable network operation are the major concerns of computer networks
monitoring, an objective that can be achieved by properly analysing the monitored network …
monitoring, an objective that can be achieved by properly analysing the monitored network …
Likelihood-based inference for modelling packet transit from thinned flow summaries
P Rahman, B Beranger, S Sisson… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Network traffic speeds and volumes present practical challenges to analysis. Packet thinning
and flow aggregation protocols provide smaller structured data summaries, but conversely …
and flow aggregation protocols provide smaller structured data summaries, but conversely …
Malware recognition approach based on self‐similarity and an improved clustering algorithm
J Chen, C Zhang, S Cai, Z Zhang, L Liu… - IET Software, 2022 - Wiley Online Library
The recognition of malware in network traffic is an important research problem. However,
existing solutions addressing this problem rely heavily on the source code and misrecognise …
existing solutions addressing this problem rely heavily on the source code and misrecognise …
Network security and user abnormal behavior detection by using deep neural network
Y Pan - Internet Technology Letters, 2021 - Wiley Online Library
In the big data network environment, because traditional user abnormal behavior detection
methods cannot meet the needs of massive data detection, it cannot quickly respond to …
methods cannot meet the needs of massive data detection, it cannot quickly respond to …
Automatic detection of network traffic anomalies and changes
Accurately predicting network behavior is beneficial for TCP congestion control, and can
help improve routing, allocating network resources, and optimizing network designs. This …
help improve routing, allocating network resources, and optimizing network designs. This …