[HTML][HTML] Network traffic classification: Techniques, datasets, and challenges

A Azab, M Khasawneh, S Alrabaee, KKR Choo… - Digital Communications …, 2024 - Elsevier
In network traffic classification, it is important to understand the correlation between network
traffic and its causal application, protocol, or service group, for example, in facilitating lawful …

Towards the deployment of machine learning solutions in network traffic classification: A systematic survey

F Pacheco, E Exposito, M Gineste… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Traffic analysis is a compound of strategies intended to find relationships, patterns,
anomalies, and misconfigurations, among others things, in Internet traffic. In particular, traffic …

Analyzing HTTPS encrypted traffic to identify user's operating system, browser and application

J Muehlstein, Y Zion, M Bahumi… - 2017 14th IEEE …, 2017 - ieeexplore.ieee.org
Desktops and laptops can be maliciously exploited to violate privacy. There are two main
types of attack scenarios: active and passive. In this paper, we consider the passive scenario …

[PDF][PDF] Analysis and detection of content based video retrieval

SS Gornale, AK Babaleshwar… - Int. J. Image, Graph …, 2019 - academia.edu
System has been investigated over past decade it's rooted in many applications like
developments and technologies. The demand for extraction of high level semantics contents …

Machine learning--based parametric audiovisual quality prediction models for real-time communications

E Demirbilek, JC Grégoire - ACM Transactions on Multimedia …, 2017 - dl.acm.org
In order to mechanically predict audiovisual quality in interactive multimedia services, we
have developed machine learning--based no-reference parametric models. We have …

Markov probability fingerprints: A method for identifying encrypted video traffic

L Yang, S Fu, Y Luo, J Shi - 2020 16th International Conference …, 2020 - ieeexplore.ieee.org
Detecting illegal video plays an important role in preventing and countering crime in daily
life. It is effective for supervisors to monitor the network by analyzing traffic from devices. In …

Itp-knn: Encrypted video flow identification based on the intermittent traffic pattern of video and k-nearest neighbors classification

Y Liu, S Li, C Zhang, C Zheng, Y Sun, Q Liu - … Science–ICCS 2020: 20th …, 2020 - Springer
As video dominates internet traffic, researchers tend to pay attention to video-related fields,
such as video shaping, differentiated service, multimedia protocol tunneling detection. Some …

Clustering the unknown-the youtube case

A Dvir, AK Marnerides, R Dubin… - 2019 International …, 2019 - ieeexplore.ieee.org
Recent stringent end-user security and privacy requirements caused the dramatic rise of
encrypted video streams in which YouTube encrypted traffic is one of the most prevalent …

Doom: a training-free, real-time video flow identification method for encrypted traffic

Y Liu, S Li, C Zhang, C Zheng, Y Sun… - 2020 27th International …, 2020 - ieeexplore.ieee.org
The internet traffic is mainly dominated by videos, limiting video transmission is thus
required to manage the traffic when network congestion occurs. Besides, service providers …

A clustering method of encrypted video traffic based on levenshtein distance

L Yang, S Fu, Y Luo, Y Wang… - 2021 17th International …, 2021 - ieeexplore.ieee.org
In order to detect the playback of illegal videos, it is necessary for supervisors to monitor the
network by analyzing traffic from devices. However, many popular video sites, such as …