Fundamentals of neural networks: architectures, algorithms, and applications
Fundamentals of neural networks: architectures, algorithms, and applications
Pattern recognition using neural networks: theory and algorithms for engineers and scientists
Pattern recognition using neural networks: theory and algorithms for engineers and scientists
Intrusion detection with neural networks
NIPS '97 Proceedings of the 1997 conference on Advances in neural information processing systems 10
An Introduction to Neural Networks
An Introduction to Neural Networks
Identifying key features for intrusion detection using neural networks
ICCC '02 Proceedings of the 15th international conference on Computer communication
Using Neural Networks to Classify Internet Users
AICT-SAPIR-ELETE '05 Proceedings of the Advanced Industrial Conference on Telecommunications/Service Assurance with Partial and Intermittent Resources Conference/E-Learning on Telecommunications Workshop
Detection and classification of peer-to-peer traffic: A survey
ACM Computing Surveys (CSUR)
Hi-index | 0.00 |
There are several network management and measurement tasks, including for example traffic engineering, service differentiation, performance or failure monitoring or security, that can greatly benefit with the ability to perform an accurate mapping of network traffic to IP applications. In the last years traditional mapping approaches have become increasingly inaccurate because many applications use non-default or ephemeral port numbers, use well-known port numbers associated with other applications, change application signatures or use traffic encryption. Thus, new solutions are needed for this problem and this paper presents a new approach, based on neural networks, that is able to solve the problem of application detection and at the same time can predict the traffic level associated with each application based on the overall aggregated traffic, while overcoming the limitations of the previous approaches. Results obtained show that the proposed framework constitutes a valuable tool to detect Internet applications and predict their traffic levels since it can achieve good performance results while, at the same time, avoid the most important disadvantages presented by the other detection methods.