Network Traffic Classification Techniques and Challenges

Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

57 Citations (Scopus)
865 Downloads (Pure)

Abstract

The number of alleged crimes in computer networks had not increased until a few years ago. Real-time analysis has become essential to detect any suspicious activities. Network classification is the first step of network traffic analysis, and it is the core element of network intrusion detection systems (IDS). Although the techniques of classification have improved and their accuracy has been enhanced, the growing trend of encryption and the insistence of application developers to create new ways to avoid applications being filtered and detected are among the reasons that this field remains open for further research. This paper discusses how researchers apply Machine Learning (ML) algorithms in several classification techniques, utilising the statistical properties of the network traffic flow. It also outlines the next stage of our research, which involves investigating different classification techniques (supervised, semi-supervised, and unsupervised) that use ML algorithms to cope with real-world network traffic.

Original languageEnglish
Title of host publicationThe 10th International Conference on Digital Information Management, ICDIM 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages43-48
Number of pages6
ISBN (Print)9781467391511
DOIs
Publication statusPublished - 13 Jan 2016
Event10th International Conference on Digital Information Management, ICDIM 2015 - Jeju Island, Korea, Republic of
Duration: 21 Oct 201523 Oct 2015

Conference

Conference10th International Conference on Digital Information Management, ICDIM 2015
Country/TerritoryKorea, Republic of
CityJeju Island
Period21/10/201523/10/2015

Keywords

  • Machine Learning (ML)
  • network traffic analysis
  • security
  • traffic classification

Fingerprint

Dive into the research topics of 'Network Traffic Classification Techniques and Challenges'. Together they form a unique fingerprint.

Cite this