JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2014, Vol. 49 ›› Issue (09): 109-114.doi: 10.6040/j.issn.1671-9352.2.2014.106

Previous Articles     Next Articles

An efficient network traffic classification scheme based on similarity

DU Rui-ying1, YANG Yong2, CHEN Jing1, WANG Chi-heng1   

  1. 1. School of Computer, Wuhan University, Wuhan 430072, Hubei, China;
    2. International School of Software, Wuhan University, Wuhan 430072, Hubei, China
  • Received:2014-06-24 Revised:2014-08-27 Online:2014-09-20 Published:2014-09-30

Abstract: Support Vector Machine is a classification algorithm that combines high efficiency, high accuracy and real time. There's a problem when SVM makes its decision for an un-labeled instance because uninvolved classifiersparticipate in that affects SVM's real time performance and reliability. Thus, a method utilized Efficient SVM based on Similarity (ESVMS) for traffic classification was proposed. ESVMS estimates the classes that an un-labeled instances may belongs to as to kick out the uninvolved classifiers. Experimental results show that ESVMS holds the accuracy of SVM's and improves its real time performance.

Key words: machine learning, support vector machine, network traffic classification

CLC Number: 

  • TP393
[1] LI Xiang, QI Feng, XU Dan, et al. An internet traffic classification method based on semi-supervised support vector machine[C]//Proceedings of 2011 IEEE International Conference on Communications (ICC). Washington:IEEE Computer Society, 2011:1-5.
[2] LIU Tingwen, SUN Yong, GUO Li. Fast and memory-efficient traffic classification with deep packet inspection in CMP architecture[C]//Proceedings of 2010 IEEE 5th International Conference on Networking, Architecture and Storage (NAS). Washington:IEEE Computer Society, 2010:208-217.
[3] KIM H, CLAFFY K C, FOMENKOV M, et al. Internet traffic classification demystified:myths, caveats, and the best practices[C]//Proceedings of 2008 ACM CoNEXT Conference. New York:ACM Press,2008:11-15.
[4] JIN Yu, DUFFIELD N, ERMAN J, et al. A modular machine learning system for Flow-Level traffic classification in large networks[J]. ACM Transactions on Knowledge Discovery From Data, 2012, 6(1):4-10.
[5] BUJLOW T, RIAZ T, PEDERSEN J M. A method for classification of network traffic based on C5.0 machine learning algorithm[C]//Proceedings of 2012 International Conference on Computing, Networking and Communications (ICNC). Washington:IEEE Computer Society, 2012:237-241.
[6] MOORE A W, ZUEV D. Internet traffic classification using bayesian analysis techniques[J]. ACM SIGMETRICS Performance Evaluation Review, 2005, 33(6):50-60.
[7] MCGREGOR A, HALL M P, LORIER P, et al. Flow clustering using machine learning techniques:passive and active network measurement [J]. Lecture Notes in Computer Science, 2004, 3015:205-214.
[8] MOON T K. The expectation-maximization algorithm[J]. IEEE Signal Processing Magazine,1996, 13(6):47-60.
[9] ERMAN J, ARLITT M, MAHANTI A. Traffic classification using clustering algorithms[C]//Proceedings of 2006 SIGCOMM Workshop on Mining Network Data. New York:ACM Pres, 2006:281-286.
[10] KRYSZKIEWICZ M, LASEK P. TI-DBSCAN:clustering with DBSCAN by means of the triangle inequality[J]. Lecture Notes in Computer Science, 2010, 6086:60-69.
[11] ZANDER S, NGUYEN T, ARMITAGE G. Automated traffic classification and application identification using machine learning[C]//Proceedings of IEEE Conference on Local Computer Networks. Washington:IEEE Computer Society, 2005:250-257.
[12] ZHANG Jun, XIANG Yang, WANG Yu, et al. Network traffic classification using correlation information[J]. IEEE Transactions on Parallel and Distributed Systems, 2013, 24(1):104-117.
[13] SU Mingyang. Using clustering to improve the KNN-based classifiers for online anomaly network traffic identification[J]. Journal of Network and Computer Applications, 2011, 34(2):722-730.
[14] JING Ning,YANG Ming,CHENG Shaoyin, et al. An efficient SVM-based method for multi-class network traffic classification[C]//Proceedings of 2011 IEEE International on Performance Computing and Communications Conference (IPCCC). Washington:IEEE Computer Society, 2011:1-8.
[15] CHUNG J Y, PARK B, WON Y J, et al. An effective similarity metric for application traffic classification[C]//Proceedings of 2010 IEEE-IFIP Network Operations and Management Symposium. Washington:IEEE Computer Society, 2010:286-292.
[16] BENSON T, AKELLA A, MALTZ D A. Network traffic characteristics of data centers in the wild[C]//Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurement. New York:ACM Press, 2010:267-280.
[17] SHAO Xiufeng, CHENG Wei. Improved CURE algorithm and application of clustering for large-scale data[C]//Proceedings of 2011 International Symposium on Information Technology in Medicine and Education (ITME 2011). Piscataway:IEEE Press, 2011:305-308.
[18] BOUCKAERT R R, FRANK E, HALL M A, et al. WEKA-experiences with a Java open-source project [J]. The Journal of Machine Learning Research, 2010, 11(9):2533-2541.
[1] SU Feng-long, XIE Qing-hua, HUANG Qing-quan, QIU Ji-yuan, YUE Zhen-jun. Semi-supervised method for attribute extraction based on transductive learning [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(3): 111-115.
[2] DU Hong-le, ZHANG Yan, ZHANG Lin. Intrusion detection on imbalanced dataset [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(11): 50-57.
[3] LIU Ming, ZAN Hong-ying, YUAN Hui-bin. Key sentiment sentence prediction using SVM and RNN [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2014, 49(11): 68-73.
[4] PAN Qing-qing, ZHOU Feng, YU Zheng-tao, GUO Jian-yi, XIAN Yan-tuan. Recognition method of Vietnamese named entity based on#br# conditional random fields [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2014, 49(1): 76-79.
[5] DONG Yuan1, XU Ya-bin1,2*, LI Zhuo1,2, LI Yan-ping1. Research on spam identification based on social computing and machine learning [J]. J4, 2013, 48(7): 72-78.
[6] HUANG Lin-sheng1, DENG Zhi-hong1,2, TANG Shi-wei1,2, WANG Wen-qing3, CHEN Ling3. A Chinese organization′s full name and matching abbreviation  algorithm based on edit-distance [J]. J4, 2012, 47(5): 43-48.
[7] CAO Lin-lin1,2, ZHANG Hua-xiang1,2*, WANG Zhi-chao1,2. EB-SVM: support vector machine based data pruning with informatior entropy [J]. J4, 2012, 47(5): 59-62.
[8] ZHANG Ning-xian, GUO Min*, MA Miao. Classification of fruit fly wings vibration sound based on the AR model and SVM [J]. J4, 2011, 46(7): 83-86.
[9] SONG Yu-dan, WANG Shi-tong*. Minimum within-class variance SVM with absent features [J]. J4, 2010, 45(7): 102-107.
[10] YI Chao-qun, LI Jian-ping, ZHU Cheng-wen. A kind of feature selection based on classification accuracy of SVM [J]. J4, 2010, 45(7): 119-121.
[11] YANG Bing, WANG Shi-tong*. Total margin v minimum class variance support vector machines  based on common  vectors for noisy face classification [J]. J4, 2010, 45(11): 5-11.
[12] CAO Hong,DONG Shou-bin,ZHANG Ling . AA SVM multiclassifier based on the weighted threshold strategy [J]. J4, 2006, 41(3): 66-69 .
[13] IN Yu-ming,LI You . Chunk parsing for sentences based on SVM [J]. J4, 2006, 41(3): 112-115 .
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!