NETWORK TRAFFIC CLASSIFICATION TECHNIQUES-A REVIEW

被引:0
|
作者
Goli, Yoga Durgadevi [1 ]
Ambika, R. [2 ]
机构
[1] BMSIT&M, Dept Comp Sci & Engn, Bangalore, Karnataka, India
[2] BMSIT&M, Dept Elect & Commun Engn, Bangalore, Karnataka, India
关键词
Network security; Network Traffic; Traffic classification; Machine Learning;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the growth in the amount of devices associated with the internet; the data that is getting circulated over the internet is also increasing. It is an undeniable fact that this data has significant presence for individuals as well as for organizations. A network needs to handle this massive amount of data traffic which contains malicious data as well. Therefore, it is very essential to distinguish between normal and abnormal traffic by analyzing the network traffic. A number of network traffic classification techniques are available. The researchers are trying to find the traffic classification techniques that do not depend on port numbers or that do not read the packet payload contents. In this study, an analysis of various traffic classification techniques and the application of several Machine learning techniques for traffic classification is carried out. This survey paper also presents a brief review of various machine learning techniques for traffic classification.
引用
收藏
页码:219 / 222
页数:4
相关论文
共 50 条
  • [41] Leaf nitrogen determination using non-destructive techniques-A review
    Ali, M. M.
    Al-Ani, Ahmed
    Eamus, Derek
    Tan, Daniel K. Y.
    [J]. JOURNAL OF PLANT NUTRITION, 2017, 40 (07) : 928 - 953
  • [42] Measuring Verbal Psychotherapeutic Techniques-A Systematic Review of Intervention Characteristics and Measures
    Gumz, Antje
    Treese, Barbara
    Marx, Christopher
    Strauss, Bernhard
    Wendt, Hanna
    [J]. FRONTIERS IN PSYCHOLOGY, 2015, 6
  • [43] Algal Biomass Analysis by Laser-Based Analytical Techniques-A Review
    Porizka, Pavel
    Prochazkova, Petra
    Prochazka, David
    Sladkova, Lucia
    Novotny, Jan
    Petrilak, Michal
    Brada, Michal
    Samek, Ota
    Pilat, Zdenek
    Zemanek, Pavel
    Adam, Vojtech
    Kizek, Rene
    Novotny, Karel
    Kaiser, Jozef
    [J]. SENSORS, 2014, 14 (09): : 17725 - 17752
  • [44] An experimental study of different machine and deep learning techniques for classification of encrypted network traffic
    Obasi, ThankGod
    Shafiq, M. Omair
    [J]. 2020 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2020, : 4690 - 4699
  • [45] Software defined networking based network traffic classification using machine learning techniques
    Salau, Ayodeji Olalekan
    Beyene, Melesew Mossie
    [J]. SCIENTIFIC REPORTS, 2024, 14 (01):
  • [46] Compressed Network in Network Models for Traffic Classification
    Lu, Min
    Zhou, Bin
    Bu, Zhiyong
    Zhang, Kecheng
    Ling, Zhenhua
    [J]. 2021 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2021,
  • [47] DDoS Detection and Prediction Techniques-A Survey
    Goyal, Ashtha
    Matta, Priya
    Gautam, Pratiksha
    [J]. Proceedings of International Conference on Computational Intelligence and Sustainable Engineering Solution, CISES 2023, 2023, : 820 - 826
  • [48] Determination of Trace Elements in Vegetable Oils and Biodiesel by Atomic Spectrometric Techniques-A Review
    Lepri, Fabio G.
    Chaves, Eduardo S.
    Vieira, Mariana A.
    Ribeiro, Anderson S.
    Curtius, Adilson J.
    De Oliveira, Ligia C. C.
    De Campos, Reinaldo C.
    [J]. APPLIED SPECTROSCOPY REVIEWS, 2011, 46 (03) : 175 - 206
  • [49] Monitoring of fracture propagation in brittle materials using acoustic emission techniques-A review
    Nejati, Hamid Reza
    Nazerigivi, Amin
    Imani, Mehrdad
    Karrech, Ali
    [J]. COMPUTERS AND CONCRETE, 2020, 25 (01): : 15 - 27
  • [50] Network Traffic Classification for Attack Detection Using Big Data Tools: A Review
    Al-Araji, Zaid. J.
    Ahmad, Sharifah Sakinah Syed
    Al-Salihi, Mustafa W.
    Al-Lamy, Hayder A.
    Ahmed, Mohammed
    Raad, Wisam
    Yunos, Norhazwani Md
    [J]. INTELLIGENT AND INTERACTIVE COMPUTING, 2019, 67 : 355 - 363