Show simple item record

dc.contributor.authorOudah, H
dc.contributor.authorGhita, B
dc.contributor.authorBakhshi, T
dc.date.accessioned2023-05-22T11:34:24Z
dc.date.available2023-05-22T11:34:24Z
dc.date.issued2018-03-30
dc.identifier.issn2042-4639
dc.identifier.issn2042-4639
dc.identifier.urihttps://pearl.plymouth.ac.uk/handle/10026.1/20902
dc.description.abstract

Classifying Internet traffic into applications is vital to many areas, from quality of service (QoS) provisioning, to network management and security. The task is challenging as network applications are rather dynamic in nature, tend to use a web front-end and are typically encrypted, rendering traditional port-based and deep packet inspection (DPI) method unusable. Recent classification studies proposed two alternatives: using the statistical properties of traffic or inferring the behavioural patterns of network applications, both aiming to describe the activity within and among network flows in order to understand application usage and behaviour. The aim of this paper is to propose and investigate a novel feature to define application behaviour as seen through the generated network traffic by considering the timing and pattern of user events during application sessions, leading to an extended traffic feature set based on burstiness. The selected features were further used to train and test a supervised C5.0 machine learning classifier and led to a better characterization of network applications, with a traffic classification accuracy ranging between 90- 98%.

dc.format.extent764-773
dc.publisherInfonomics Society
dc.titleA Novel Feature Set for Application Identification
dc.typejournal-article
plymouth.issue1
plymouth.volume8
plymouth.publication-statusPublished online
plymouth.journalInternational Journal for Information Security Research
dc.identifier.doi10.20533/ijisr.2042.4639.2018.0088
plymouth.organisational-group|Plymouth
plymouth.organisational-group|Plymouth|Faculty of Science and Engineering
plymouth.organisational-group|Plymouth|Faculty of Science and Engineering|School of Engineering, Computing and Mathematics
plymouth.organisational-group|Plymouth|REF 2021 Researchers by UoA
plymouth.organisational-group|Plymouth|Users by role
plymouth.organisational-group|Plymouth|Users by role|Academics
plymouth.organisational-group|Plymouth|REF 2021 Researchers by UoA|UoA11 Computer Science and Informatics
dcterms.dateAccepted2018-01-01
dc.date.updated2023-05-22T11:34:18Z
dc.rights.embargodate2023-5-23
dc.identifier.eissn2042-4639
rioxxterms.versionofrecord10.20533/ijisr.2042.4639.2018.0088


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record


All items in PEARL are protected by copyright law.
Author manuscripts deposited to comply with open access mandates are made available in accordance with publisher policies. Please cite only the published version using the details provided on the item record or document. In the absence of an open licence (e.g. Creative Commons), permissions for further reuse of content should be sought from the publisher or author.
Theme by 
Atmire NV