An effective network traffic classification method with unknown flow detection

Zhang, Jun, Chen, Chao, Xiang, Yang, Zhou, Wanlei and Vasilakos, Athanasios V. 2013, An effective network traffic classification method with unknown flow detection, IEEE transactions on network and service management, vol. 10, no. 2, pp. 133-147, doi: 10.1109/TNSM.2013.022713.120250.

Attached Files
Name Description MIMEType Size Downloads

Title An effective network traffic classification method with unknown flow detection
Author(s) Zhang, JunORCID iD for Zhang, Jun
Chen, Chao
Xiang, YangORCID iD for Xiang, Yang
Zhou, WanleiORCID iD for Zhou, Wanlei
Vasilakos, Athanasios V.
Journal name IEEE transactions on network and service management
Volume number 10
Issue number 2
Start page 133
End page 147
Total pages 15
Publisher IEEE
Place of publication Piscataway, N.J.
Publication date 2013
ISSN 1536-1233
Keyword(s) compound classification
network security
traffic classification
unknown flow detection
Summary Traffic classification technique is an essential tool for network and system security in the complex environments such as cloud computing based environment. The state-of-the-art traffic classification methods aim to take the advantages of flow statistical features and machine learning techniques, however the classification performance is severely affected by limited supervised information and unknown applications. To achieve effective network traffic classification, we propose a new method to tackle the problem of unknown applications in the crucial situation of a small supervised training set. The proposed method possesses the superior capability of detecting unknown flows generated by unknown applications and utilizing the correlation information among real-world network traffic to boost the classification performance. A theoretical analysis is provided to confirm performance benefit of the proposed method. Moreover, the comprehensive performance evaluation conducted on two real-world network traffic datasets shows that the proposed scheme outperforms the existing methods in the critical network environment.
Language eng
DOI 10.1109/TNSM.2013.022713.120250
Field of Research 080503 Networking and Communications
080109 Pattern Recognition and Data Mining
Socio Economic Objective 890199 Communication Networks and Services not elsewhere classified
HERDC Research category C1 Refereed article in a scholarly journal
Copyright notice ©2013, IEEE
Persistent URL

Document type: Journal Article
Collections: School of Information Technology
2018 ERA Submission
Connect to link resolver
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 26 times in TR Web of Science
Scopus Citation Count Cited 45 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 494 Abstract Views, 6 File Downloads  -  Detailed Statistics
Created: Tue, 27 Aug 2013, 12:21:23 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact