메뉴 건너뛰기




Volumn 10, Issue 4, 2008, Pages 56-76

A survey of techniques for internet traffic classification using machine learning

Author keywords

Flow clustering; Internet protocol; Machine learning; Payload inspection; Real time; Statistical traffic properties; Traffic classification

Indexed keywords

FLOW CLUSTERING; MACHINE-LEARNING; PAYLOAD INSPECTION; REAL TIME; STATISTICAL TRAFFIC PROPERTIES; TRAFFIC CLASSIFICATION;

EID: 62849120844     PISSN: None     EISSN: 1553877X     Source Type: Journal    
DOI: 10.1109/SURV.2008.080406     Document Type: Review
Times cited : (1382)

References (68)
  • 3
    • 0033295259 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • V. Paxson, "Bro: A system for detecting network intruders in real-time," Computer Networks, no. 31(23-24), pp. 2435-2463, 1999.
    • (1999) Computer Networks , vol.31 , Issue.23-24 , pp. 2435-2463
    • Paxson, V.1
  • 7
    • 19944406146 scopus 로고    scopus 로고
    • Accurate, scalable in network identification of P2P traffic using application signatures
    • New York, NY, USA, May
    • S. Sen, O. Spatscheck, and D. Wang, "Accurate, scalable in network identification of P2P traffic using application signatures," in WWW2004, New York, NY, USA, May 2004.
    • (2004) WWW2004
    • Sen, S.1    Spatscheck, O.2    Wang, D.3
  • 8
    • 0342437731 scopus 로고
    • Integrated services in the Internet architecture: An overview
    • R. Braden, D. Clark, and S. Shenker, "Integrated services in the Internet architecture: An overview," RFC 1633, IETF, 1994.
    • (1994) RFC 1633, IETF
    • Braden, R.1    Clark, D.2    Shenker, S.3
  • 16
    • 34548264165 scopus 로고    scopus 로고
    • Byte me: A case for byte accuracy in traffic classification
    • DOI 10.1145/1269880.1269890, MineNet'07: Proceedings of the Third Annual ACM Workshop on Mining Network Data
    • J. Erman, A. Mahanti, and M. Arlitt, "Byte me: A case for byte accuracy in traffic classification," in MineNet '07: Proc. 3rd annual ACM workshop on Mining network data. New York, NY, USA: ACM Press, June 2007, pp. 35-38. (Pubitemid 47317571)
    • (2007) MineNet'07: Proceedings of the Third Annual ACM Workshop on Mining Network Data , pp. 35-38
    • Erman, J.1    Mahanti, A.2    Arlitt, M.3
  • 17
    • 80054797064 scopus 로고    scopus 로고
    • Internet Assigned Numbers Authority (IANA), as of August 14
    • Internet Assigned Numbers Authority (IANA), http://www.iana.org/ assignments/port-numbers, as of August 14, 2007.
    • (2007)
  • 18
    • 14944383480 scopus 로고    scopus 로고
    • Class-of-service mapping for QoS: A statistical signature-based approach to IP traffic classification
    • Taormina, Sicily, Italy, October
    • M. Roughan, S. Sen, O. Spatscheck, and N. Duffield, "Class-of- service mapping for QoS: A statistical signature-based approach to IP traffic classification," in Proc. ACM/SIGCOMM Internet Measurement Conference (IMC) 2004, Taormina, Sicily, Italy, October 2004.
    • (2004) Proc. ACM/SIGCOMM Internet Measurement Conference (IMC) 2004
    • Roughan, M.1    Sen, S.2    Spatscheck, O.3    Duffield, N.4
  • 22
    • 0028491368 scopus 로고
    • Empirically derived analytic models of wide-area TCP connections
    • V. Paxson, "Empirically derived analytic models of wide-area TCP connections," IEEE/ACM Trans. Networking, vol. 2, no. 4, pp. 316-336, 1994.
    • (1994) IEEE/ACM Trans. Networking , vol.2 , Issue.4 , pp. 316-336
    • Paxson, V.1
  • 28
    • 0002599654 scopus 로고
    • Why should machines learn?
    • R. S. Michalski, J. G. Carbonell, and T. M. Mitchell (editors). Morgan Kaufmann
    • H. Simon, "Why should machines learn?" in R. S. Michalski, J. G. Carbonell, and T. M. Mitchell (editors) Machine Learning: An Artificial Intelligence Approach. Morgan Kaufmann, 1983.
    • (1983) Machine Learning: An Artificial Intelligence Approach
    • Simon, H.1
  • 31
    • 0003200953 scopus 로고
    • Machine learning and intrusion detection: Current and future directions
    • Washington, D.C., October
    • J. Frank, "Machine learning and intrusion detection: Current and future directions," in Proc. National 17th Computer Security Conference, Washington,D.C., October 1994.
    • (1994) Proc. National 17th Computer Security Conference
    • Frank, J.1
  • 36
    • 84950632109 scopus 로고
    • Objective criteria for the evaluation of clustering methods
    • W. Rand, "Objective criteria for the evaluation of clustering methods," J. American Statistical Association, vol. 66, no. 336, pp. 846-850, 1971.
    • (1971) J. American Statistical Association , vol.66 , Issue.336 , pp. 846-850
    • Rand, W.1
  • 37
    • 0141860731 scopus 로고    scopus 로고
    • Cluster validity methods: Part I
    • M. Halkidi, Y. Batistakis, and M. Vazirgiannis, "Cluster validity methods: Part I," SIGMOD Rec., vol. 31, no. 2, pp. 40-45, 2002.
    • (2002) SIGMOD Rec. , vol.31 , Issue.2 , pp. 40-45
    • Halkidi, M.1    Batistakis, Y.2    Vazirgiannis, M.3
  • 38
    • 16444383160 scopus 로고    scopus 로고
    • Survey of clustering algorithms
    • DOI 10.1109/TNN.2005.845141
    • R. Xu and D. Wunsch, "Survey of clustering algorithms," IEEE Trans. Neural Networks, no. Vol.16, Issue 3, pp. 645-678, May 2005. (Pubitemid 40718010)
    • (2005) IEEE Transactions on Neural Networks , vol.16 , Issue.3 , pp. 645-678
    • Xu, R.1    Wunsch II, D.2
  • 39
    • 0348096294 scopus 로고    scopus 로고
    • Clustering validity checking methods: Part II
    • M. Halkidi, Y. Batistakis, and M. Vazirgiannis, "Clustering validity checking methods: Part II," SIGMOD Rec., vol. 31, no. 3, pp. 19-27, 2002.
    • (2002) SIGMOD Rec. , vol.31 , Issue.3 , pp. 19-27
    • Halkidi, M.1    Batistakis, Y.2    Vazirgiannis, M.3
  • 40
    • 0242410408 scopus 로고    scopus 로고
    • Benchmarking attribute selection techniques for discrete class data mining
    • M. Hall and G. Holmes, "Benchmarking attribute selection techniques for discrete class data mining," IEEE Trans. Knowledge Data Eng., vol. 15, no. 6, pp. 1437-1447, 2003.
    • (2003) IEEE Trans. Knowledge Data Eng. , vol.15 , Issue.6 , pp. 1437-1447
    • Hall, M.1    Holmes, G.2
  • 42
    • 0031381525 scopus 로고    scopus 로고
    • Wrappers for feature subset selection
    • PII S000437029700043X
    • R. Kohavi and G. H. John, "Wrappers for feature subset selection," Artificial Intelligent, vol. 97, no. 1-2, pp. 273-324, 1997. (Pubitemid 127401107)
    • (1997) Artificial Intelligence , vol.97 , Issue.1-2 , pp. 273-324
    • Kohavi, R.1    John, G.H.2
  • 43
    • 0004294784 scopus 로고
    • (2nd ed.). Boston, MA, USA: Addison-Wesley Longman Publishing Co., Inc.
    • P. H. Winston, Artificial intelligence (2nd ed.). Boston, MA, USA: Addison-Wesley Longman Publishing Co., Inc., 1984.
    • (1984) Artificial Intelligence
    • Winston, P.H.1
  • 45
    • 34248358287 scopus 로고    scopus 로고
    • Traffic classification using clustering algorithms
    • DOI 10.1145/1162678.1162679, Proceedings of the 2006 SIGCOMM Workshop on Mining Network Data, MineNet'06
    • J. Erman, M. Arlitt, and A. Mahanti, "Traffic classification using clustering algorithms," in MineNet '06: Proc. 2006 SIGCOMM workshop on Mining network data. New York, NY, USA: ACM Press, 2006, pp. 281-286. (Pubitemid 46740690)
    • (2006) Proceedings of the 2006 SIGCOMM Workshop on Mining Network Data, MineNet'06 , vol.2006 , pp. 281-286
    • Erman, J.1    Arlitt, M.2    Mahanti, A.3
  • 46
  • 47
    • 35348815604 scopus 로고    scopus 로고
    • Identifying and discriminating between web and peer-to-peer traffic in the network core
    • DOI 10.1145/1242572.1242692, 16th International World Wide Web Conference, WWW2007
    • J. Erman, A. Mahanti, M. Arlitt, and C. Williamson, "Identifying and discriminating between web and peer-to-peer traffic in the network core," in WWW '07: Proc. 16th international conference on World Wide Web. Banff, Alberta, Canada: ACM Press, May 2007, pp. 883-892. (Pubitemid 47582318)
    • (2007) 16th International World Wide Web Conference, WWW2007 , pp. 883-892
    • Erman, J.1    Mahanti, A.2    Arlitt, M.3    Williamson, C.4
  • 49
    • 0002629270 scopus 로고    scopus 로고
    • Maximum likelihood from incomplete data via the EM algorithm
    • A. Dempster, N. Laird, and D. Rubin, "Maximum likelihood from incomplete data via the EM algorithm," J. Royal Statistical Society, vol. 30, no. 1, 1997.
    • (1997) J. Royal Statistical Society , vol.30 , Issue.1
    • Dempster, A.1    Laird, N.2    Rubin, D.3
  • 51
    • 80054811767 scopus 로고    scopus 로고
    • as of August 14
    • NetMate, http://sourceforge.net/projects/netmate-meter/, as of August 14, 2007.
    • (2007) NetMate
  • 52
    • 80054807017 scopus 로고    scopus 로고
    • The National Laboratory for Applied Network Research (NLANR), as of August 14
    • The National Laboratory for Applied Network Research (NLANR), Traffic Measurement Data Repository, http://pma.nlanr.net/Special/, as of August 14, 2007.
    • (2007) Traffic Measurement Data Repository
  • 55
    • 33846098197 scopus 로고    scopus 로고
    • Bayesian neural networks for internet traffic classification
    • DOI 10.1109/TNN.2006.883010
    • T. Auld, A. W. Moore, and S. F. Gull, "Bayesian neural networks for Internet traffic classification," IEEE Trans. Neural Networks, no. 1, pp. 223-239, January 2007. (Pubitemid 46062929)
    • (2007) IEEE Transactions on Neural Networks , vol.18 , Issue.1 , pp. 223-239
    • Auld, T.1    Moore, A.W.2    Gull, S.F.3
  • 56
    • 46149109490 scopus 로고    scopus 로고
    • Training on multiple sub-flows to optimise the use of Machine Learning classifiers in real-world IP networks
    • Tampa, Florida, USA, November
    • T. Nguyen and G. Armitage, "Training on multiple sub-flows to optimise the use of Machine Learning classifiers in real-world IP networks," in Proc. IEEE 31st Conference on Local Computer Networks, Tampa, Florida, USA, November 2006.
    • (2006) Proc IEEE 31st Conference on Local Computer Networks
    • Nguyen, T.1    Armitage, G.2
  • 58
    • 80054807017 scopus 로고    scopus 로고
    • The University of Twente, as of 17th August
    • The University of Twente, Traffic Measurement Data Repository, http://arch.cs.utwente.nl/projects/m2c/m2c-D15.pdf, as of 17th August 2007.
    • (2007) Traffic Measurement Data Repository
  • 59
    • 48149107984 scopus 로고    scopus 로고
    • as of 17th August
    • Wolfenstein Enemy Territory, http://www.enemyterritory.com/, as of 17th August 2007.
    • (2007) Wolfenstein Enemy Territory
  • 61
    • 48749130030 scopus 로고    scopus 로고
    • Traffic classification through simple statistical fingerprinting
    • M. Crotti, M. Dusi, F. Gringoli, and L. Salgarelli, "Traffic classification through simple statistical fingerprinting," SIGCOMM Comput. Commun. Rev., vol. 37, no. 1, pp. 5-16, 2007.
    • (2007) SIGCOMM Comput. Commun. Rev. , vol.37 , Issue.1 , pp. 5-16
    • Crotti, M.1    Dusi, M.2    Gringoli, F.3    Salgarelli, L.4
  • 67
    • 36949009834 scopus 로고    scopus 로고
    • Revealing skype traffic: When randomness plays with you
    • DOI 10.1145/1282380.1282386, ACM SIGCOMM 2007: Conference on Computer Communications
    • D. Bonfiglio, M. Mellia, M. Meo, D. Rossi, and P. Tofanelli, "Revealing Skype traffic: when randomness plays with you," in SIGCOMM '07: Proc. 2007 conference on Applications, technologies, architectures, and protocols for computer communications. New York, NY, USA: ACM, August 2007, pp. 37-48. (Pubitemid 350239771)
    • (2007) ACM SIGCOMM 2007: Conference on Computer Communications , pp. 37-48
    • Bonfiglio, D.1    Mellia, M.2    Meo, M.3    Rossi, D.4    Tofanelli, P.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.