Network traffic classification for data fusion: A survey

[1]  Witold Pedrycz,et al.  A Group-Based Distance Learning Method for Semisupervised Fuzzy Clustering , 2020, IEEE Transactions on Cybernetics.

[2]  Q. Zheng,et al.  Knowledge forest: a novel model to organize knowledge fragments , 2019, Science China Information Sciences.

[3]  Gunnard Engebreth Bug Fixes , 2021, PHP 8 Revealed.

[4]  Vladimir A. Muliukha,et al.  Analysis and Classification of Encrypted Network Traffic Using Machine Learning , 2020, 2020 XXIII International Conference on Soft Computing and Measurements (SCM).

[5]  Witold Pedrycz,et al.  A survey on machine learning for data fusion , 2020, Inf. Fusion.

[6]  Raimo Kantola,et al.  An Adaptive Security Data Collection and Composition Recognition method for security measurement over LTE/LTE-A networks , 2020, J. Netw. Comput. Appl..

[7]  David Choffnes,et al.  FlowPrint: Semi-Supervised Mobile-App Fingerprinting on Encrypted Network Traffic , 2020, NDSS.

[8]  Pratibha Khandait,et al.  Efficient Keyword Matching for Deep Packet Inspection based Network Traffic Classification , 2020, 2020 International Conference on COMmunication Systems & NETworkS (COMSNETS).

[9]  Yu Zhang,et al.  STNN: A Novel TLS/SSL Encrypted Traffic Classification System Based on Stereo Transform Neural Network , 2019, 2019 IEEE 25th International Conference on Parallel and Distributed Systems (ICPADS).

[10]  Jun Zhang,et al.  Noise-Resistant Statistical Traffic Classification , 2019, IEEE Transactions on Big Data.

[11]  Laurence T. Yang,et al.  A survey on data fusion in internet of things: Towards secure and privacy-preserving fusion , 2019, Inf. Fusion.

[12]  Witold Pedrycz,et al.  Network traffic fusion and analysis against DDoS flooding attacks with a novel reversible sketch , 2019, Inf. Fusion.

[13]  Witold Pedrycz,et al.  A reversible sketch-based method for detecting and mitigating amplification attacks , 2019, J. Netw. Comput. Appl..

[14]  Wei Su,et al.  Real-Time Classification Method of Network Traffic Based on Parallelized CNN , 2019, 2019 IEEE International Conference on Power, Intelligent Computing and Systems (ICPICS).

[15]  Hyuk Lim,et al.  Bayesian Neural Network Based Encrypted Traffic Classification using Initial Handshake Packets , 2019, 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks – Supplemental Volume (DSN-S).

[16]  Muhammad Ejaz Ahmed,et al.  Statistical Application Fingerprinting for DDoS Attack Mitigation , 2019, IEEE Transactions on Information Forensics and Security.

[17]  Pedro Casas,et al.  Deep in the Dark - Deep Learning-Based Malware Traffic Detection Without Expert Knowledge , 2019, 2019 IEEE Security and Privacy Workshops (SPW).

[18]  Md. Foysal Hossain,et al.  Encrypted Traffic Classification Based ML for Identifying Different Social Media Applications , 2019, 2019 IEEE Canadian Conference of Electrical and Computer Engineering (CCECE).

[19]  Raj Jain,et al.  Flow online identification method for the encrypted Skype , 2019, J. Netw. Comput. Appl..

[20]  Masanori Miyazawa,et al.  Framework and Implementation of Online Smartphone Traffic Classification According to Quality Sensitivity , 2019, 2019 IEEE ComSoc International Communications Quality and Reliability Workshop (CQR).

[21]  Mohammed Atiquzzaman,et al.  Data Collection for Security Measurement in Wireless Sensor Networks: A Survey , 2019, IEEE Internet of Things Journal.

[22]  Zheng Yan,et al.  Adaptive security-related data collection with context awareness , 2019, J. Netw. Comput. Appl..

[23]  Otto Carlos Muniz Bandeira Duarte,et al.  A fast unsupervised preprocessing method for network monitoring , 2018, Annals of Telecommunications.

[24]  Cedric Baudoin,et al.  Towards the Deployment of Machine Learning Solutions in Network Traffic Classification: A Systematic Survey , 2019, IEEE Communications Surveys & Tutorials.

[25]  Witold Pedrycz,et al.  Security Data Collection and Data Analytics in the Internet: A Survey , 2019, IEEE Communications Surveys & Tutorials.

[26]  Zhen Liu,et al.  Extending labeled mobile network traffic data by three levels traffic identification fusion , 2018, Future Gener. Comput. Syst..

[27]  Zheng Yan,et al.  A survey on network data collection , 2018, J. Netw. Comput. Appl..

[28]  Feng Xiao,et al.  Network traffic classification based on transfer learning , 2018, Comput. Electr. Eng..

[29]  Jakub Lokoc,et al.  Learning communication patterns for malware discovery in HTTPs data , 2018, Expert Syst. Appl..

[30]  Jinghua Yan,et al.  A Survey of Traffic Classification Validation and Ground Truth Collection , 2018, 2018 8th International Conference on Electronics Information and Emergency Communication (ICEIEC).

[31]  Otto Carlos Muniz Bandeira Duarte,et al.  An Adaptive Real-Time Architecture for Zero-Day Threat Detection , 2018, 2018 IEEE International Conference on Communications (ICC).

[32]  Omer Gurewitz,et al.  Traffic Classification Based on Zero-Length Packets , 2018, IEEE Transactions on Network and Service Management.

[33]  Zheng Yan,et al.  A Survey on Network Security-Related Data Collection Technologies , 2018, IEEE Access.

[34]  Witold Pedrycz,et al.  Data collection for attack detection and security measurement in Mobile Ad Hoc Networks: A survey , 2018, J. Netw. Comput. Appl..

[35]  Guanglu Sun,et al.  Internet Traffic Classification Based on Incremental Support Vector Machines , 2018, Mob. Networks Appl..

[36]  Antonio Pescapè,et al.  Multi-classification approaches for classifying mobile app traffic , 2018, J. Netw. Comput. Appl..

[37]  Neminath Hubballi,et al.  RDClass: on using relative distance of keywords for accurate network traffic classification , 2018, IET Networks.

[38]  Hassan Nazeer Chaudhry,et al.  A machine learning approach for feature selection traffic classification using security analysis , 2018, The Journal of Supercomputing.

[39]  Mohammed Atiquzzaman,et al.  LTE/LTE-A Network Security Data Collection and Analysis for Security Measurement: A Survey , 2018, IEEE Access.

[40]  Ali Fanian,et al.  Encrypted Traffic Classification Using Statistical Features , 2018 .

[41]  Narseo Vallina-Rodriguez,et al.  Bug Fixes, Improvements, ... and Privacy Leaks - A Longitudinal Study of PII Leaks Across Android App Versions , 2018, NDSS.

[42]  Tao Qin,et al.  Internet traffic classification based on expanding vector of flow , 2017, Comput. Networks.

[43]  Dongming Yuan,et al.  A self-adaptive network traffic classification system with unknown flow detection , 2017, 2017 3rd IEEE International Conference on Computer and Communications (ICCC).

[44]  Viktor K. Prasanna,et al.  Accelerating Decision Tree Based Traffic Classification on FPGA and Multicore Platforms , 2017, IEEE Transactions on Parallel and Distributed Systems.

[45]  Otto Carlos Muniz Bandeira Duarte,et al.  Collecting and characterizing a real broadband access network traffic dataset , 2017, 2017 1st Cyber Security in Networking Conference (CSNet).

[46]  Blake Anderson,et al.  Machine Learning for Encrypted Malware Traffic Classification: Accounting for Noisy Labels and Non-Stationarity , 2017, KDD.

[47]  Wei Wu,et al.  Efficient and robust feature extraction and selection for traffic classification , 2017, Comput. Networks.

[48]  Jiong Jin,et al.  Novel feature selection and classification of Internet video traffic based on a hierarchical scheme , 2017, Comput. Networks.

[49]  Ciprian Dobre,et al.  Internet traffic classification based on flows' statistical properties with machine learning , 2017, Int. J. Netw. Manag..

[50]  Jie Cao,et al.  An accurate traffic classification model based on support vector machines , 2017, Int. J. Netw. Manag..

[51]  Nabin Kumar Karn,et al.  Network Traffic Classification techniques and comparative analysis using Machine Learning algorithms , 2016, 2016 2nd IEEE International Conference on Computer and Communications (ICCC).

[52]  Siu-Ming Yiu,et al.  A Survey on Regular Expression Matching for Deep Packet Inspection: Applications, Algorithms, and Hardware Platforms , 2016, IEEE Communications Surveys & Tutorials.

[53]  Bogdan V. Ghita,et al.  On Internet Traffic Classification: A Two-Phased Machine Learning Approach , 2016, J. Comput. Networks Commun..

[54]  Mauro Conti,et al.  AppScanner: Automatic Fingerprinting of Smartphone Apps from Encrypted Network Traffic , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).

[55]  Arnaud Legout,et al.  ReCon: Revealing and Controlling PII Leaks in Mobile Network Traffic , 2015, MobiSys.

[56]  Nino Vincenzo Verde,et al.  Analyzing Android Encrypted Network Traffic to Identify User Actions , 2016, IEEE Transactions on Information Forensics and Security.

[57]  Shikha Agrawal,et al.  A Survey on Feature Selection Techniques for Internet Traffic Classification , 2015, 2015 International Conference on Computational Intelligence and Communication Networks (CICN).

[58]  Dinil Mon Divakaran,et al.  SLIC: Self-Learning Intelligent Classifier for network traffic , 2015, Comput. Networks.

[59]  Yu-ning Dong,et al.  Fine grained classification of Internet video traffics , 2015, 2015 21st Asia-Pacific Conference on Communications (APCC).

[60]  Jie Wu,et al.  Robust Network Traffic Classification , 2015, IEEE/ACM Transactions on Networking.

[61]  Peng Hao,et al.  Transfer learning using computational intelligence: A survey , 2015, Knowl. Based Syst..

[62]  Paulo Salvador,et al.  Do we need a perfect ground-truth for benchmarking Internet traffic classifiers? , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).

[63]  Dan Meng,et al.  An empirical study of morphing on behavior-based network traffic classification , 2015, Secur. Commun. Networks.

[64]  Riyad Alshammari,et al.  Identification of VoIP encrypted traffic using a machine learning approach , 2015, J. King Saud Univ. Comput. Inf. Sci..

[65]  Shafi Goldwasser,et al.  Machine Learning Classification over Encrypted Data , 2015, NDSS.

[66]  Zigang Cao,et al.  A Survey on Encrypted Traffic Classification , 2014 .

[67]  Jun Zhang,et al.  Internet Traffic Classification Using Constrained Clustering , 2014, IEEE Transactions on Parallel and Distributed Systems.

[68]  Yanick Fratantonio,et al.  ANDRUBIS -- 1,000,000 Apps Later: A View on Current Android Malware Behaviors , 2014, 2014 Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS).

[69]  Alejandro Zunino,et al.  An empirical comparison of botnet detection methods , 2014, Comput. Secur..

[70]  Zahir Tari,et al.  An optimal and stable feature selection approach for traffic classification based on multi-criterion fusion , 2014, Future Gener. Comput. Syst..

[71]  Qinghua Zheng,et al.  Omni-word Feature and Soft Constraint for Chinese Relation Extraction , 2014, ACL.

[72]  Daniel Hernández-Lobato,et al.  A Double Pruning Scheme for Boosting Ensembles , 2014, IEEE Transactions on Cybernetics.

[73]  Eduardo Rocha,et al.  A Survey of Payload-Based Traffic Classification Approaches , 2014, IEEE Communications Surveys & Tutorials.

[74]  Myung-Sup Kim,et al.  Integrated Internet Application-level Traffic Classification , 2014, KSII Trans. Internet Inf. Syst..

[75]  Jun Zhang,et al.  Internet Traffic Classification by Aggregating Correlated Naive Bayes Predictions , 2023, IEEE Transactions on Information Forensics and Security.

[76]  Arian Bär,et al.  IP mining: Extracting knowledge from the dynamics of the Internet addressing space , 2013, Proceedings of the 2013 25th International Teletraffic Congress (ITC).

[77]  Jun Zhang,et al.  Unsupervised traffic classification using flow statistical properties and IP packet payload , 2013, J. Comput. Syst. Sci..

[78]  Jun Zhang,et al.  Network traffic clustering using Random Forest proximities , 2013, 2013 IEEE International Conference on Communications (ICC).

[79]  Manuela Pereira,et al.  Detection and classification of peer-to-peer traffic: A survey , 2013, CSUR.

[80]  Zahir Tari,et al.  Toward an efficient and scalable feature selection approach for internet traffic classification , 2013, Comput. Networks.

[81]  Nen-Fu Huang,et al.  Application traffic classification at the early stage by characterizing application rounds , 2013, Inf. Sci..

[82]  Elena Baralis,et al.  Self-learning classifier for Internet traffic , 2013, 2013 Proceedings IEEE INFOCOM.

[83]  Jun Zhang,et al.  An Effective Network Traffic Classification Method with Unknown Flow Detection , 2013, IEEE Transactions on Network and Service Management.

[84]  Dario Rossi,et al.  Reviewing Traffic Classification , 2013, Data Traffic Monitoring and Analysis.

[85]  Jun Zhang,et al.  Network Traffic Classification Using Correlation Information , 2013, IEEE Transactions on Parallel and Distributed Systems.

[86]  Dong Zhou,et al.  Translation techniques in cross-language information retrieval , 2012, CSUR.

[87]  Sebastian Zander,et al.  Sub-flow packet sampling for scalable ML classification of interactive traffic , 2012, 37th Annual IEEE Conference on Local Computer Networks.

[88]  Ian Goldberg,et al.  Enhancing Tor's performance using real-time traffic classification , 2012, CCS.

[89]  Elena Baralis,et al.  Hierarchical learning for fine grained internet traffic classification , 2012, 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC).

[90]  Xenofontas A. Dimitropoulos,et al.  Classifying internet one-way traffic , 2012, Internet Measurement Conference.

[91]  Sunil Agrawal,et al.  Machine Learning Classifier for Internet Traffic from Academic Perspective , 2012 .

[92]  Jun Zhang,et al.  A novel semi-supervised approach for network traffic clustering , 2011, 2011 5th International Conference on Network and System Security.

[93]  Shunzheng Yu,et al.  Internet Traffic Classification Using Machine Learning: A Token-based Approach , 2011, 2011 14th IEEE International Conference on Computational Science and Engineering.

[94]  Stuart Cheshire,et al.  Internet Assigned Numbers Authority (IANA) Procedures for the Management of the Service Name and Transport Protocol Port Number Registry , 2011, RFC.

[95]  James Won-Ki Hong,et al.  Toward fine-grained traffic classification , 2011, IEEE Communications Magazine.

[96]  Dario Rossi,et al.  Experiences of Internet traffic monitoring with tstat , 2011, IEEE Network.

[97]  Antonio Pescapè,et al.  Early Classification of Network Traffic through Multi-classification , 2011, TMA.

[98]  Donald Eastlake rd,et al.  Transport Layer Security (TLS) Extensions: Extension Definitions , 2011 .

[99]  Donald E. Eastlake,et al.  Transport Layer Security (TLS) Extensions: Extension Definitions , 2011, RFC.

[100]  Yanghee Choi,et al.  Internet traffic classification demystified: on the sources of the discriminative power , 2010, CoNEXT.

[101]  Dario Rossi,et al.  KISS: Stochastic Packet Inspection Classifier for UDP Traffic , 2010, IEEE/ACM Transactions on Networking.

[102]  Luka Cehovin,et al.  Empirical evaluation of feature selection methods in classification , 2010, Intell. Data Anal..

[103]  Shunzheng Yu,et al.  Automatic Application Signature Construction from Unknown Traffic , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.

[104]  Hannes Federrath,et al.  Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial naïve-bayes classifier , 2009, CCSW '09.

[105]  Marco Canini,et al.  Experience with high-speed automated application-identification for network-management , 2009, ANCS '09.

[106]  Yuan-Cheng Lai,et al.  Application classification using packet size distribution and port association , 2009, J. Netw. Comput. Appl..

[107]  Judith Kelner,et al.  A Survey on Internet Traffic Identification , 2009, IEEE Communications Surveys & Tutorials.

[108]  Marco Canini,et al.  GTVS: Boosting the Collection of Application Traffic Ground Truth , 2009, TMA.

[109]  George Varghese,et al.  Graph-Based P2P Traffic Classification at the Internet Backbone , 2009, IEEE INFOCOM Workshops 2009.

[110]  Marco Canini,et al.  Per flow packet sampling for high-speed network monitoring , 2009, 2009 First International Communication Systems and Networks and Workshops.

[111]  Heng Tao Shen,et al.  Principal Component Analysis , 2009, Encyclopedia of Biometrics.

[112]  Oliver W. W. Yang,et al.  Contention avoidance and resolution schemes in bufferless all-optical packet-switched networks: a survey , 2008, IEEE Communications Surveys & Tutorials.

[113]  Grenville J. Armitage,et al.  A survey of techniques for internet traffic classification using machine learning , 2008, IEEE Communications Surveys & Tutorials.

[114]  István Szabó,et al.  On the Validation of Traffic Classification Algorithms , 2008, PAM.

[115]  James Won-Ki Hong,et al.  Towards automated application signature generation for traffic identification , 2008, NOMS 2008 - 2008 IEEE Network Operations and Management Symposium.

[116]  Qiang Yang,et al.  Boosting for transfer learning , 2007, ICML '07.

[117]  Anirban Mahanti,et al.  Byte me: a case for byte accuracy in traffic classification , 2007, MineNet '07.

[118]  Brian Neil Levine,et al.  Inferring the source of encrypted HTTP connections , 2006, CCS '06.

[119]  Renata Teixeira,et al.  Traffic classification on the fly , 2006, CCRV.

[120]  Subhash C. Bagui,et al.  Combining Pattern Classifiers: Methods and Algorithms , 2005, Technometrics.

[121]  Jason Lee,et al.  A first look at modern enterprise traffic , 2005, IMC '05.

[122]  Michalis Faloutsos,et al.  BLINC: multilevel traffic classification in the dark , 2005, SIGCOMM '05.

[123]  Andrew W. Moore,et al.  Internet traffic classification using bayesian analysis techniques , 2005, SIGMETRICS '05.

[124]  Chao-Ton Su,et al.  An Extended Chi2 Algorithm for Discretization of Real Value Attributes , 2005, IEEE Trans. Knowl. Data Eng..

[125]  Eibe Frank,et al.  Logistic Model Trees , 2003, Machine Learning.

[126]  Michalis Faloutsos,et al.  Transport layer identification of P2P traffic , 2004, IMC '04.

[127]  Nick Mathewson,et al.  Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.

[128]  Jason Weston,et al.  Gene Selection for Cancer Classification using Support Vector Machines , 2002, Machine Learning.

[129]  Huan Liu,et al.  Consistency-based search in feature selection , 2003, Artif. Intell..

[130]  Huan Liu,et al.  Feature Selection for High-Dimensional Data: A Fast Correlation-Based Filter Solution , 2003, ICML.

[131]  Foster J. Provost,et al.  Learning When Training Data are Costly: The Effect of Class Distribution on Tree Induction , 2003, J. Artif. Intell. Res..

[132]  Petra Perner,et al.  Data Mining - Concepts and Techniques , 2002, Künstliche Intell..

[133]  João Gama,et al.  Functional trees for classification , 2001, Proceedings 2001 IEEE International Conference on Data Mining.

[134]  Pedro Larrañaga,et al.  Feature Subset Selection by Bayesian network-based optimization , 2000, Artif. Intell..

[135]  T. Ishioka Extended K-means with an Efficient Estimation of the Number of Clusters , 2000, IDEAL.

[136]  Michael S. Borella,et al.  The effect of network delay and media on user perceptions of web resources , 2000, Behav. Inf. Technol..

[137]  Lloyd A. Smith,et al.  Feature Selection for Machine Learning: Comparing a Correlation-Based Filter Approach to the Wrapper , 1999, FLAIRS.

[138]  Harold Joseph Highland,et al.  The 17th NSCS abstructArtificial Intelligence and Intrusion Detection: Current and Future Directions : Jeremy Frank, University of California, Davis, CA , 1995 .

[139]  Larry A. Rendell,et al.  The Feature Selection Problem: Traditional Methods and a New Algorithm , 1992, AAAI.

[140]  Franklin E White,et al.  Data Fusion Lexicon , 1991 .