Show simple item record

dc.contributor.authorOudah, H
dc.contributor.authorGhita, B
dc.contributor.authorBakhshi, T
dc.contributor.editorMori P
dc.contributor.editorFurnell S
dc.contributor.editorCamp O
dc.date.accessioned2022-11-07T12:10:01Z
dc.date.available2022-11-07T12:10:01Z
dc.date.issued2019
dc.identifier.isbn9789897583599
dc.identifier.urihttp://hdl.handle.net/10026.1/19886
dc.description.abstract

Traffic classification is an essential tool for network management and security. Traditional techniques such as port-based and payload analysis are ineffective as major Internet applications use dynamic port numbers and encryption. Recent studies have used statistical properties of flows to classify traffic with high accuracy, minimising the overhead limitations associated with other schemes such as deep packet inspection (DPI). Classification accuracy of statistical flow-based approaches, however, depends on the discrimination ability of the traffic features used. To this effect, the present paper customised the popular tcptrace utility to generate classification features based on traffic burstiness and periods of inactivity (idle time) for everyday Internet usage. An attempt was made to train a C5.0 decision tree classifier using the proposed features for eleven different Internet applications, generated by ten users. Overall, the newly proposed features reported a significant level of accuracy (∼98%) in classifying the respective applications.

dc.format.extent397-404
dc.language.isoen
dc.publisherSCITEPRESS - Science and Technology Publications
dc.subjectTraffic Classification
dc.subjectTcptrace
dc.subjectApplication Detection
dc.subjectC5.0 Algorithm
dc.titleA Novel Features Set for Internet Traffic Classification using Burstiness
dc.typeconference
dc.typeConference Proceeding
plymouth.author-urlhttps://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000570402400042&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=11bb513d99f797142bcfeffcc58ea008
plymouth.date-start2019-02-23
plymouth.date-finish2019-02-25
plymouth.publisher-urlhttp://www.informatik.uni-trier.de/~ley/db/conf/icissp/icissp2019.html
plymouth.conference-name5th International Conference on Information Systems Security and Privacy
plymouth.publication-statusPublished
plymouth.journalProceedings of the 5th International Conference on Information Systems Security and Privacy
dc.identifier.doi10.5220/0007384203970404
plymouth.organisational-group/Plymouth
plymouth.organisational-group/Plymouth/Faculty of Science and Engineering
plymouth.organisational-group/Plymouth/Faculty of Science and Engineering/School of Engineering, Computing and Mathematics
plymouth.organisational-group/Plymouth/REF 2021 Researchers by UoA
plymouth.organisational-group/Plymouth/REF 2021 Researchers by UoA/UoA11 Computer Science and Informatics
plymouth.organisational-group/Plymouth/Users by role
plymouth.organisational-group/Plymouth/Users by role/Academics
dc.rights.embargoperiodNot known
rioxxterms.versionofrecord10.5220/0007384203970404
rioxxterms.licenseref.urihttp://www.rioxx.net/licenses/all-rights-reserved
rioxxterms.typeConference Paper/Proceeding/Abstract


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record


All items in PEARL are protected by copyright law.
Author manuscripts deposited to comply with open access mandates are made available in accordance with publisher policies. Please cite only the published version using the details provided on the item record or document. In the absence of an open licence (e.g. Creative Commons), permissions for further reuse of content should be sought from the publisher or author.
Theme by 
Atmire NV