Skip to main content
Top
Published in: Neural Computing and Applications 7/2020

16-09-2019 | Deep Learning & Neural Computing for Intelligent Sensing and Control

RETRACTED ARTICLE: Traffic identification and traffic analysis based on support vector machine

Authors: Youchan Zhu, Yi Zheng

Published in: Neural Computing and Applications | Issue 7/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

As the number of applications based on the Internet is increasing, the traffic becomes more and more complex. So how to improve the service quality and security of the network is becoming more and more important. This paper studies the application of support vector machine in traffic identification to classify the network traffic. Through data collection and feature generation methods and network traffic feature screening methods, support vector machine is used as a classifier by using the generalization capability of support vector machine, and the parameters and kernel functions of the support vector machine are adjusted and selected based on cross-comparison ideas and methods. Using the cross-validation method to make the most reasonable statistics for the classification and recognition accuracy of the adjusted support vector machine avoids the situation that the classification accuracy of the support vector machine is unstable or the statistics are inaccurate. Finally, a traffic classification and identification system based on support vector machine is realized. The final recognition rate of encrypted traffic is up to 99.31%, which overcomes the disadvantages of traditional traffic identification and achieves a fairly reliable accuracy.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference He Q, Dong Q, Zhao B, Wang Y, Qiang B (2016) P2P traffic optimization based on congestion distance and DHT. J Internet Serv Inf Secur 6(2):53–69 He Q, Dong Q, Zhao B, Wang Y, Qiang B (2016) P2P traffic optimization based on congestion distance and DHT. J Internet Serv Inf Secur 6(2):53–69
2.
go back to reference Munir S, Majeed N, Babu S, Bari I, Harry J, Masood ZA (2016) A joint port and statistical analysis based technique to detect encrypted VoIP traffic. Int J Comput Sci Inf Secur 14(2):117 Munir S, Majeed N, Babu S, Bari I, Harry J, Masood ZA (2016) A joint port and statistical analysis based technique to detect encrypted VoIP traffic. Int J Comput Sci Inf Secur 14(2):117
3.
go back to reference Rao Z, Niu W, Zhang X, Li H (2018) Tor anonymous traffic identification based on gravitational clustering. Peer Peer Netw Appl 11(3):592–601CrossRef Rao Z, Niu W, Zhang X, Li H (2018) Tor anonymous traffic identification based on gravitational clustering. Peer Peer Netw Appl 11(3):592–601CrossRef
4.
go back to reference Bujlow T, Carela-Español V, Barlet-Ros P (2015) Independent comparison of popular DPI tools for traffic classification. Comput Netw 76:75–89CrossRef Bujlow T, Carela-Español V, Barlet-Ros P (2015) Independent comparison of popular DPI tools for traffic classification. Comput Netw 76:75–89CrossRef
5.
go back to reference Boukhtouta A, Mokhov SA, Lakhdari NE, Debbabi M, Paquet J (2016) Network malware classification comparison using DPI and flow packet headers. J Comput Virol Hacking Tech 12(2):69–100CrossRef Boukhtouta A, Mokhov SA, Lakhdari NE, Debbabi M, Paquet J (2016) Network malware classification comparison using DPI and flow packet headers. J Comput Virol Hacking Tech 12(2):69–100CrossRef
6.
go back to reference Kirubavathi G, Anitha R (2016) Botnet detection via mining of traffic flow characteristics. Comput Electr Eng 50:91–101CrossRef Kirubavathi G, Anitha R (2016) Botnet detection via mining of traffic flow characteristics. Comput Electr Eng 50:91–101CrossRef
7.
go back to reference Yuan R, Li Z, Guan X et al (2010) An SVM-based machine learning method for accurate internet traffic classification. Inf Syst Front 12(2):149–156CrossRef Yuan R, Li Z, Guan X et al (2010) An SVM-based machine learning method for accurate internet traffic classification. Inf Syst Front 12(2):149–156CrossRef
8.
go back to reference Alshammari R, Zincir-Heywood AN (2015) How robust can a machine learning approach be for classifying encrypted VoIP? J Netw Syst Manag 23(4):830–869CrossRef Alshammari R, Zincir-Heywood AN (2015) How robust can a machine learning approach be for classifying encrypted VoIP? J Netw Syst Manag 23(4):830–869CrossRef
9.
go back to reference Iliofotou M, Kim HC, Faloutsos M, Mitzenmacher M, Pappu P, Varghese G (2011) Graption: a graph-based p2p traffic classification framework for the internet backbone. Comput Netw 55(8):1909–1920CrossRef Iliofotou M, Kim HC, Faloutsos M, Mitzenmacher M, Pappu P, Varghese G (2011) Graption: a graph-based p2p traffic classification framework for the internet backbone. Comput Netw 55(8):1909–1920CrossRef
10.
go back to reference Bagui S, Fang X, Kalaimannan E, Bagui SC, Sheehan J (2017) Comparison of machine-learning algorithms for classification of VPN network traffic flow using time-related features. J Cyber Secur Technol 1(2):108–126CrossRef Bagui S, Fang X, Kalaimannan E, Bagui SC, Sheehan J (2017) Comparison of machine-learning algorithms for classification of VPN network traffic flow using time-related features. J Cyber Secur Technol 1(2):108–126CrossRef
11.
go back to reference Alshammari R, Nur Zincir-Heywood A (2015) Identification of VoIP encrypted traffic using a machine learning approach. J King Saud Univ Comput Inf Sci 27(1):77–92 Alshammari R, Nur Zincir-Heywood A (2015) Identification of VoIP encrypted traffic using a machine learning approach. J King Saud Univ Comput Inf Sci 27(1):77–92
12.
go back to reference Wang C, Zhang H, Ye Z (2015) A peer to peer traffic identification method based on wavelet and particle swarm optimization algorithm. Int J Wavelets Multiresolution Inf Process 13(06):23MathSciNetCrossRef Wang C, Zhang H, Ye Z (2015) A peer to peer traffic identification method based on wavelet and particle swarm optimization algorithm. Int J Wavelets Multiresolution Inf Process 13(06):23MathSciNetCrossRef
13.
go back to reference Santiago-Paz J, Torres-Roman D, Figueroa-Ypiña A, Argaez-Xool J (2015) Using generalized entropies and OC-SVM with Mahalanobis kernel for detection and classification of anomalies in network traffic. Entropy 17(9):6239–6257MathSciNetCrossRef Santiago-Paz J, Torres-Roman D, Figueroa-Ypiña A, Argaez-Xool J (2015) Using generalized entropies and OC-SVM with Mahalanobis kernel for detection and classification of anomalies in network traffic. Entropy 17(9):6239–6257MathSciNetCrossRef
14.
go back to reference Khan U, Schmidt-Thieme L, Nanopoulos A (2017) Collaborative SVM classification in scale-free peer-to-peer networks. Expert Syst Appl 69:74–86CrossRef Khan U, Schmidt-Thieme L, Nanopoulos A (2017) Collaborative SVM classification in scale-free peer-to-peer networks. Expert Syst Appl 69:74–86CrossRef
15.
go back to reference Feng G, Wang Y (2019) Universal tool microscope computer aided measurement system based on machine vision technology. Acta Microsc 28(4):760–769 Feng G, Wang Y (2019) Universal tool microscope computer aided measurement system based on machine vision technology. Acta Microsc 28(4):760–769
Metadata
Title
RETRACTED ARTICLE: Traffic identification and traffic analysis based on support vector machine
Authors
Youchan Zhu
Yi Zheng
Publication date
16-09-2019
Publisher
Springer London
Published in
Neural Computing and Applications / Issue 7/2020
Print ISSN: 0941-0643
Electronic ISSN: 1433-3058
DOI
https://doi.org/10.1007/s00521-019-04493-2

Other articles of this Issue 7/2020

Neural Computing and Applications 7/2020 Go to the issue

Premium Partner