Pattern Classification (2nd Edition)
Pattern Classification (2nd Edition)
Proceedings of the 4th ACM SIGCOMM conference on Internet measurement
BLINC: multilevel traffic classification in the dark
Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications
Estimating the Support of a High-Dimensional Distribution
Neural Computation
Pattern Recognition Letters - Special issue: ROC analysis in pattern recognition
ACM SIGCOMM Computer Communication Review
Early application identification
CoNEXT '06 Proceedings of the 2006 ACM CoNEXT conference
Growing a multi-class classifier with a reject option
Pattern Recognition Letters
To reject or not to reject: that is the question-an answer in caseof neural classifiers
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
Regularized Linear Models in Stacked Generalization
MCS '09 Proceedings of the 8th International Workshop on Multiple Classifier Systems
Detection and classification of peer-to-peer traffic: A survey
ACM Computing Surveys (CSUR)
Traffic classification combining flow correlation and ensemble classifier
International Journal of Wireless and Mobile Computing
Hi-index | 0.00 |
The assignment of an IP flow to a class, according to the application that generated it, is at the basis of any modern network management platform. However, classification techniques such as the ones based on the analysis of transport layer or application layer information are rapidly becoming ineffective. Moreover, in several network scenarios it is quite unrealistic to assume that all the classes an IP flow can belong to are a priori known. In these cases, in fact, some network protocols may be known, but novel protocols can appear so giving rise to unknown classes. In this paper we propose to face the problem of classifying IP flows by means of different pattern recognition approaches. They have been explicitly devised in order to effectively address the problem of the unknown classes, too. An experimental evaluation of the various proposal on real traffic traces is also provided, by considering different network scenarios.