A review on machine learning–based approaches for Internet traffic classification

O Salman, IH Elhajj, A Kayssi, A Chehab - Annals of Telecommunications, 2020 - Springer
Traffic classification acquired the interest of the Internet community early on. Different
approaches have been proposed to classify Internet traffic to manage both security and …

A supervised machine learning approach to classify host roles on line using sflow

B Li, MH Gunes, G Bebis, J Springer - … of the first edition workshop on …, 2013 - dl.acm.org
Classifying host roles based on network traffic behavior is valuable for network security
analysis and detecting security policy violation. Behavior-based network security analysis …

NTARC: a data model for the systematic review of network traffic analysis research

F Iglesias, DC Ferreira, G Vormayr, M Bachl, T Zseby - Applied Sciences, 2020 - mdpi.com
The increased interest in secure and reliable communications has turned the analysis of
network traffic data into a predominant topic. A high number of research papers propose …

[PDF][PDF] Breaking and improving protocol obfuscation

E Hjelmvik, W John - Chalmers University of Technology, Tech. Rep, 2010 - iis.se
Different techniques for traffic classification are utilized in various fields of application. In this
technical report, we look closer on how statistical analysis can be used to identify network …

[HTML][HTML] Role-based lateral movement detection with unsupervised learning

BA Powell - Intelligent Systems with Applications, 2022 - Elsevier
Adversarial lateral movement via compromised accounts remains difficult to discover via
traditional rule-based defenses because it generally lacks explicit indicators of compromise …

Social relationship discovery of IP addresses in the managed IP networks by observing traffic at network boundary

A Jakalan, J Gong, Q Su, X Hu, AMS Abdelgder - Computer Networks, 2016 - Elsevier
The continuous growth of Internet and its applications caused more difficulties for analyzing
Internet communications which are becoming more and more complex, this has caused new …

Obfuscation of sensitive data for incremental release of network flows

D Riboni, A Villani, D Vitali, C Bettini… - … /ACM Transactions on …, 2014 - ieeexplore.ieee.org
Large datasets of real network flows acquired from the Internet are an invaluable resource
for the research community. Applications include network modeling and simulation …

A technique for classification of VoIP flows in UDP media streams using VoIP signalling traffic

T Sinam, IT Singh, P Lamabam… - 2014 IEEE …, 2014 - ieeexplore.ieee.org
VoIP applications are becoming popular these days. A lot of Internet traffic are being
generated by them. Detection of VoIP traffic is becoming important because of QoS issues …

Similarity as a central approach to flow‐based anomaly detection

M Drašar, M Vizváry, J Vykopal - International Journal of …, 2014 - Wiley Online Library
Network flow monitoring is currently a common practice in mid‐and large‐size networks.
Methods of flow‐based anomaly detection are subject to ongoing extensive research …

SmoteAdaNL: a learning method for network traffic classification

Z Liu, R Wang, M Tao - Journal of Ambient Intelligence and Humanized …, 2016 - Springer
Abstract Machine learning based network traffic classification is a critical technique for
network management, and has attracted much attention. Recently, most of the researchers …