A review on machine learning–based approaches for Internet traffic classification
Traffic classification acquired the interest of the Internet community early on. Different
approaches have been proposed to classify Internet traffic to manage both security and …
approaches have been proposed to classify Internet traffic to manage both security and …
A supervised machine learning approach to classify host roles on line using sflow
Classifying host roles based on network traffic behavior is valuable for network security
analysis and detecting security policy violation. Behavior-based network security analysis …
analysis and detecting security policy violation. Behavior-based network security analysis …
NTARC: a data model for the systematic review of network traffic analysis research
The increased interest in secure and reliable communications has turned the analysis of
network traffic data into a predominant topic. A high number of research papers propose …
network traffic data into a predominant topic. A high number of research papers propose …
[PDF][PDF] Breaking and improving protocol obfuscation
E Hjelmvik, W John - Chalmers University of Technology, Tech. Rep, 2010 - iis.se
Different techniques for traffic classification are utilized in various fields of application. In this
technical report, we look closer on how statistical analysis can be used to identify network …
technical report, we look closer on how statistical analysis can be used to identify network …
[HTML][HTML] Role-based lateral movement detection with unsupervised learning
BA Powell - Intelligent Systems with Applications, 2022 - Elsevier
Adversarial lateral movement via compromised accounts remains difficult to discover via
traditional rule-based defenses because it generally lacks explicit indicators of compromise …
traditional rule-based defenses because it generally lacks explicit indicators of compromise …
Social relationship discovery of IP addresses in the managed IP networks by observing traffic at network boundary
The continuous growth of Internet and its applications caused more difficulties for analyzing
Internet communications which are becoming more and more complex, this has caused new …
Internet communications which are becoming more and more complex, this has caused new …
Obfuscation of sensitive data for incremental release of network flows
Large datasets of real network flows acquired from the Internet are an invaluable resource
for the research community. Applications include network modeling and simulation …
for the research community. Applications include network modeling and simulation …
A technique for classification of VoIP flows in UDP media streams using VoIP signalling traffic
T Sinam, IT Singh, P Lamabam… - 2014 IEEE …, 2014 - ieeexplore.ieee.org
VoIP applications are becoming popular these days. A lot of Internet traffic are being
generated by them. Detection of VoIP traffic is becoming important because of QoS issues …
generated by them. Detection of VoIP traffic is becoming important because of QoS issues …
Similarity as a central approach to flow‐based anomaly detection
Network flow monitoring is currently a common practice in mid‐and large‐size networks.
Methods of flow‐based anomaly detection are subject to ongoing extensive research …
Methods of flow‐based anomaly detection are subject to ongoing extensive research …
SmoteAdaNL: a learning method for network traffic classification
Abstract Machine learning based network traffic classification is a critical technique for
network management, and has attracted much attention. Recently, most of the researchers …
network management, and has attracted much attention. Recently, most of the researchers …