Transport layer identification of P2P traffic
Proceedings of the 4th ACM SIGCOMM conference on Internet measurement
Internet traffic classification using bayesian analysis techniques
SIGMETRICS '05 Proceedings of the 2005 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
Profiling internet backbone traffic: behavior models and applications
Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications
BLINC: multilevel traffic classification in the dark
Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications
Automated Traffic Classification and Application Identification using Machine Learning
LCN '05 Proceedings of the The IEEE Conference on Local Computer Networks 30th Anniversary
On the Impact of Unwanted Traffic onto a 3G Network
SECPERU '06 Proceedings of the Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing
On the impacts of human interactions in MMORPG traffic
Multimedia Tools and Applications
Tetherway: a framework for tethering camouflage
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
Hi-index | 0.00 |
Detailed knowledge about the traffic mixture is essential for network operators and administrators, as it is a key input for numerous network management activities. Several traffic classification approaches co-exist in the literature, but none of them performs well for all different application traffic types present in the Internet. In this study we compare and benchmark the currently known traffic classification methods on network traces captured in an operational 3G mobile network. Utilizing the experiences about the strengths and weaknesses of the existing approaches, a novel combined method is proposed aiming at improving the completeness and accuracy of classification. The novel method is based on a complex decision mechanism, which can provide appropriate identification for each different application type. As a main contribution, with the help of the new method it is shown that applications previously used only in fixed access networks may appear in mobile broadband environment.