An introduction to variable and feature selection
The Journal of Machine Learning Research
Accurate, scalable in-network identification of p2p traffic using application signatures
Proceedings of the 13th international conference on World Wide Web
Transport layer identification of P2P traffic
Proceedings of the 4th ACM SIGCOMM conference on Internet measurement
Internet traffic classification using bayesian analysis techniques
SIGMETRICS '05 Proceedings of the 2005 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
Automated Traffic Classification and Application Identification using Machine Learning
LCN '05 Proceedings of the The IEEE Conference on Local Computer Networks 30th Anniversary
Traffic classification using clustering algorithms
Proceedings of the 2006 SIGCOMM workshop on Mining network data
ACM SIGCOMM Computer Communication Review
GA-Based Internet Traffic Classification Technique for QoS Provisioning
IIH-MSP '06 Proceedings of the 2006 International Conference on Intelligent Information Hiding and Multimedia
Behavioural Characterization for Network Anomaly Detection
Transactions on Computational Science IV
Software architecture for a lightweight payload signature-based traffic classification system
TMA'11 Proceedings of the Third international conference on Traffic monitoring and analysis
Hi-index | 0.00 |
Accurate application traffic classification and identification are important for network monitoring and analysis. The accuracy of traditional Internet application traffic classification approaches is rapidly decreasing due to the diversity of today's Internet application traffic, such as ephemeral port allocation, proprietary protocol, and traffic encryption. This paper presents an empirical evaluation of application-level traffic classification using supervised machine learning techniques. Our results indicate that we cannot achieve high accuracy with a simple feature set. Even if a simple feature set shows good performance in application category-level classification, more sophisticated feature selection methods and other techniques are necessary for performance enhancement.