Show simple item record

dc.contributor.authorOudah, H
dc.contributor.authorGhita, B
dc.contributor.authorBakhshi, T
dc.contributor.authorAlruban, A
dc.contributor.authorWalker, David
dc.date.accessioned2020-02-10T12:19:46Z
dc.date.available2020-02-10T12:19:46Z
dc.date.issued2019-08-20
dc.identifier.issn2090-7141
dc.identifier.issn2090-715X
dc.identifier.urihttp://hdl.handle.net/10026.1/15368
dc.description.abstract

<jats:p>Network traffic classification is a vital task for service operators, network engineers, and security specialists to manage network traffic, design networks, and detect threats. Identifying the type/name of applications that generate traffic is a challenging task as encrypting traffic becomes the norm for Internet communication. Therefore, relying on conventional techniques such as deep packet inspection (DPI) or port numbers is not efficient anymore. This paper proposes a novel flow statistical-based set of features that may be used for classifying applications by leveraging machine learning algorithms to yield high accuracy in identifying the type of applications that generate the traffic. The proposed features compute different timings between packets and flows. This work utilises tcptrace to extract features based on traffic burstiness and periods of inactivity (idle time) for the analysed traffic, followed by the C5.0 algorithm for determining the applications that generated it. The evaluation tests performed on a set of real, uncontrolled traffic, indicated that the method has an accuracy of 79% in identifying the correct network application.</jats:p>

dc.format.extent1-10
dc.languageen
dc.language.isoen
dc.publisherHindawi Limited
dc.titleUsing Burstiness for Network Applications Classification
dc.typejournal-article
dc.typeJournal Article
plymouth.volume2019
plymouth.publication-statusPublished
plymouth.journalJournal of Computer Networks and Communications
dc.identifier.doi10.1155/2019/5758437
plymouth.organisational-group/Plymouth
plymouth.organisational-group/Plymouth/00 Groups by role
plymouth.organisational-group/Plymouth/00 Groups by role/Academics
plymouth.organisational-group/Plymouth/Faculty of Science and Engineering
plymouth.organisational-group/Plymouth/Faculty of Science and Engineering/School of Engineering, Computing and Mathematics
plymouth.organisational-group/Plymouth/REF 2021 Researchers by UoA
plymouth.organisational-group/Plymouth/REF 2021 Researchers by UoA/UoA11 Computer Science and Informatics
dcterms.dateAccepted2019-07-25
dc.rights.embargodate2021-12-8
dc.identifier.eissn2090-715X
dc.rights.embargoperiodNot known
rioxxterms.versionofrecord10.1155/2019/5758437
rioxxterms.licenseref.urihttp://www.rioxx.net/licenses/all-rights-reserved
rioxxterms.licenseref.startdate2019-08-20
rioxxterms.typeJournal Article/Review


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record


All items in PEARL are protected by copyright law.
Author manuscripts deposited to comply with open access mandates are made available in accordance with publisher policies. Please cite only the published version using the details provided on the item record or document. In the absence of an open licence (e.g. Creative Commons), permissions for further reuse of content should be sought from the publisher or author.
Theme by 
Atmire NV