Analysis of service-oriented traffic classification with imperfect traffic classification methods
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 10, Issue 3
Abstract
Typically the traffic through the network is heterogeneous and it flows from multiple utilities and applications Considering todays threats in network there is yet not a single solution to solve all the issues because the traditional methods of port-based and payload-based with machine learning algorithm suffers from dynamic ports and encrypted application.Many international network equipment manufactures like cisco, juniper also working to reduce these issues in the hardware side.Here this paper presents a new approach considering the idea based on SOTC.This method adapts the current approaches with new idea based on service-oriented traffic classification(SOTC) and it can be used as an efficient alternate to existing methods to reduce the false positive and false negative traffic and to reduce computation and memory requirements.By evaluating the results on real traffic it confirm that this method is effective in improving the accuracy of traffic classification considerably,and promise to suits for a large number of applications.Finally, it is also possible to adopt a service database built offline, possibly provided by a third party and modeled after the signature database of antivirus programs,which in term reduce the work of training procedure and overfitting of parameters in case of parameteric classifier of supervised traffic classification.
Authors and Affiliations
Vivek A
Threats and Security using Trust Techniques in Wireless Sensor Networks
Abstract: Wireless Sensor Networks are implementing on large scale in real time environments due to its incredible uses in real life. Wireless Sensor Networks don’t need human interference for its working so theycan plac...
Secure System Password (SSP) Application for NT Editor Hacking Tool
Abstract: In windows, the password will be stored in SAM registry by default. This SAM registry hides the windows password when the system is in ON state. The password in SAM registry will be cleared or changed by using...
Feature Based Semantic Polarity Analysis Through Ontology
Abstract: Opinion mining, a trending research area where customers feels that opinions of others are alwaysimportant for making decisions while purchasing the products. Here the problem is to collect those opinions...
Android Malware: Study and analysis of malware for privacy leak in ad-hoc network
Smartphone’s users has been increasing since last few years which provides numerous operations like accessing information through online mode, payment options, using utility applications, playing games. Sma...
Wavelet Based Features for Defect Detection in Fabric using Genetic Algorithm
Abstract: In this paper a new scheme is proposed for Fabric defect detection in textile industry. For this purpose, wavelet transformer is used as feature extractor of coefficients of fabric. These coefficients c...