Real-time traffic classification based on cosine similarity using sub-application vectors

Cihangir Beşiktaş*, Haci Ali Mantar

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

4 Citations (Scopus)

Abstract

Internet traffic classification has a critical role on network monitoring, quality of service, intrusion detection, network security and trend analysis. The conventional port-based method is ineffective due to dynamic port usage and masquerading techniques. Besides, payload-based method suffers from heavy load and encryption. Due to these facts, machine learning based statistical approaches have become the new trend for the network measurement community. In this short paper, we propose a new statistical approach based on DBSCAN clustering and weighted cosine similarity. Our experimental test results show that the proposed approach achieves very high accuracy.

Original languageEnglish
Title of host publicationTraffic Monitoring and Analysis - 4th International Workshop, TMA 2012, Proceedings
Pages89-92
Number of pages4
DOIs
Publication statusPublished - 2012
Externally publishedYes
Event4th International Workshop on Traffic Monitoring and Analysis, TMA 2012 - Vienna, Austria
Duration: 12 Mar 201212 Mar 2012

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7189 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference4th International Workshop on Traffic Monitoring and Analysis, TMA 2012
Country/TerritoryAustria
CityVienna
Period12/03/1212/03/12

Funding

This work has been supported by Inforcept Networks corporation.

FundersFunder number
Inforcept Networks corporation

    Keywords

    • cosine similarity
    • DBSCAN
    • packet inspection
    • Traffic classification

    Fingerprint

    Dive into the research topics of 'Real-time traffic classification based on cosine similarity using sub-application vectors'. Together they form a unique fingerprint.

    Cite this