Flow traffic classification with support vector machine by using payload length

Masayoshi Kohara, Yoshiaki Hori, Kouichi Sakurai, Heejo Lee, Jae Cheol Ryou

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)

    Abstract

    Classifying traffic is an important task for effective network planning and design, and monitoring the trends of the applications in operational networks. In this paper, we propose flow traffic classification methods using support vector machine. Classifying traffic is an important task for effective network planning and design, and monitoring the trends of the applications in operational networks. The proposals satisfy the following three requirements. Using to only flow information, not using port numbers, automatic making of traffic models. In this paper, we provide an empirical evaluation of our proposals using datasets of MIT Lincoln Laboratory, which illustrates that our proposals can classify network traffic flow over 90 % precision.

    Original languageEnglish
    Title of host publicationProceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009
    DOIs
    Publication statusPublished - 2009
    Event2009 2nd International Conference on Computer Science and Its Applications, CSA 2009 - Jeju Island, Korea, Republic of
    Duration: 2009 Dec 102009 Dec 12

    Publication series

    NameProceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009

    Other

    Other2009 2nd International Conference on Computer Science and Its Applications, CSA 2009
    Country/TerritoryKorea, Republic of
    CityJeju Island
    Period09/12/1009/12/12

    Keywords

    • Machine learning
    • Network
    • Traffic analysis

    ASJC Scopus subject areas

    • Computational Theory and Mathematics
    • Computer Science Applications

    Fingerprint

    Dive into the research topics of 'Flow traffic classification with support vector machine by using payload length'. Together they form a unique fingerprint.

    Cite this