List of Journals    /    Call For Papers    /    Subscriptions    /    Login
By Author By Title
 About CSC Journals
 CSC Journals Objectives
 List of Journals
 Call For Papers CFP
 Special Issue CFP
 Submission Guidelines
 Peer Review Process
 Helpful Hints For Getting Published
 Plagiarism Policies
 Abstracting & Indexing
 Open Access Policy
 Submit Manuscript
 Reviewer Guidelines
 Editor Guidelines
 Join Us As Editor
 Launch Special Issue
 Suggest New Journal
 Browse CSC Library
 Open Access Policy
 Conference Partnership Program (CPP)
 Abstracting & Indexing
 Discounted Packages
 Archival Subscriptions
 How to Subscribe
 Subscriptions Agents
 Order Form
Towards a Flow-based Internet Traffic Classification For Bandwidth Optimization
Full text
International Journal of Computer Science and Security (IJCSS)
Table of Contents
Download Complete Issue    PDF(1.98MB)
Volume:  3    Issue:  2
Pages:  62-153
Publication Date:   April 2009
ISSN (Online): 1985-1553
146 - 153
Sulaiman Mohd Nor - Malaysia
Published Date   
CSC Journals, Kuala Lumpur, Malaysia
Keywords   Abstract   References   Cited by   Related Articles   Collaborative Colleague
KEYWORDS:   NetFlow, machine learning, classification, accuracy, video streaming, peer to peer. 
This Manuscript is indexed in the following databases/websites:-
1. Directory Of Open Access Journals (DOAJ)
2. Docstoc
3. Scribd
5. Google Scholar
6. ScientificCommons
7. WorldCat
8. CiteSeerX
9. Academic Index
10. refSeek
11. ResearchGATE
12. Bielefeld Academic Search Engine (BASE)
13. Socol@r
14. iSEEK
15. Academic Journals Database
16. Libsearch
17. slideshare
18. Chinese Directory Of Open Access
Abstract The evolution of the Internet into a large complex service-based network has posed tremendous challenges for network monitoring and control in terms of how to collect the large amount of data in addition to the accurate classification of new emerging applications such as peer to peer, video streaming and online gaming. These applications consume bandwidth and affect the performance of the network especially in a limited bandwidth networks such as university campuses causing performance deterioration of mission critical applications. Some of these new emerging applications are designed to avoid detection by using dynamic port numbers (port hopping), port masquerading (use http port 80) and sometimes encrypted payload. Traditional identification methodologies such as port-based signature-based are not efficient for today’s traffic. In this work machine learning algorithms are used for the classification of traffic to their corresponding applications. Furthermore this paper uses our own customized made training data set collected from the campus, The effect on the amount of training data set has been considered before examining, the accuracy of various classification algorithms and selecting the best. Our findings show that random tree, IBI, IBK, random forest respectively provide the top 4 highest accuracy in classifying flow based network traffic to their corresponding application among thirty algorithms with accuracy not less than 99.33%.  
1 Daniel Roman Koller, Application Detection and Modeling using Network Traces, master thesis “swiss federal institute of technology,2007
2 /port-numbers
3 A.W.Moore and D.papagiannaki, “Toward the accurate Identification of network applications”, in poc. 6th passive active measurement. Workshop (PAM), mar 2005,vol. 3431, pp 41-54
4 Williamson, A. M. C. (2006). A Longitudinal Study of P2P Traffic Classification. Proceedings of the 2th IEEE International Symposium on (MASCOTS '06), Los Alamitos, California, IEEE. Pp 179 - 188
5 T. Karagiannis, A. B., and N. Brownlee (2004). Is P2P Dying or Just Hiding? . GLOBECOM '04. Dallas, USA, IEEE: pp:1532 - 1538 Vol.3.
6 Thomas, K., B. Andre, et al. (2004). Transport layer identification of P2P traffic. Proceedings of the 4th ACM SIGCOMM conference on Internet measurement. Taormina, Sicily, Italy, ACM: pp: 121 - 134
7 Subhabrata, S., S. Oliver, et al. (2004). Accurate, scalable in-network identification of p2p traffic using application signatures. Proceedings of the 13th international conference on World Wide Web. New York, NY, USA, ACM: pp: 512 - 521
8 Christian, D., W. Arne, et al. (2003). An analysis of Internet chat systems. Proceedings of the 3rd ACM SIGCOMM conference on Internet measurement. Miami Beach, FL, USA, ACM: pp: 51 - 64
9 Patrick, H., S. Subhabrata, et al. (2005). ACAS: automated construction of application signatures. Proceedings of the 2005 ACM SIGCOMM workshop on Mining network data. Philadelphia, Pennsylvania, USA, ACM: pp: 197 - 202
10 Feldman, R. S. a. A. "An IDS Using NetFlow Data." Retrieved march 2008.
11 Jeffrey, E., A. Martin, et al. (2006). Traffic classification using clustering algorithms. Proceedings of the 2006 SIGCOMM workshop on Mining network data. Pisa, Italy, ACM: pp: 281 - 286
12 Thomas, K., P. Konstantina, et al. (2005). BLINC: multilevel traffic classification in the dark. Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications. Philadelphia, Pennsylvania, USA, ACM: pp: 229 - 240
13 Fivos Constantinou, Panayiotis Mavrommatis, “Identifying Known and Unknown Peer-to- Peer Traffic “, Fifth IEEE International Symposium on Network Computing and Applications (NCA'06) 0-7695-2640-3/06 $20.00 © 2006 IEEE
14 Nigel, W., Z. Sebastian, et al. (2006). "A preliminary performance comparison of five machine learning algorithms for practical IP traffic flow classification." SIGCOMM Comput. Commun. Rev. 36(5): 5-16.
15 Hongbo, J., W. M. Andrew, et al. (2007). Lightweight application classification for network management. Proceedings of the 2007 SIGCOMM workshop on Internet network management. Kyoto, Japan, ACM: pp: 299 - 304
16 Rui Wang1, Y. L., Yuexiang Yang3, Xiaoyong Zhou4 (16-18 October 2006). Solving the App- Level Classification Problem of P2P Traffic via Optimized Support Vector Machines. Proceedings of the Sixth International Conference on Intelligent Systems
1 D. Shukla , V. K. Tiwari , S. Thakur and A. K. Deshmukh, “Share Loss Analysis of Internet Traffic Distribution in Computer Networks”, International Journal of Computer Science and Security (IJCSS), 3(5), pp. 414 – 426, 2009.
2 D. Shukla, V. K. Tiwari, S. Thakur and M. Tiwari, “A Comparison of Methods for Internet Traffic Sharing in Computer Network”, Int. J. of Advanced Networking and Applications, 1(3), pp. 164-169, 2009.
3 A. Y. Dahab , A. M. Said and H. Hasbullah“Applications of Extreme Value Theory to Burst Predictions”. Signal Processing: An International Journal, 3 (4), pp. 55 – 63, 2009.
4 J. Barker, P. Hannay and P. Szewczyk, "Using Traffic Analysis to Identify the Second Generation Onion Router," in Proceedings, 9th International Conference on Embedded and Ubiquitous Computing, Melbourne, Victoria Australia, October 24- 26, 2011, pp.72-78.
5 A. B. Mohammed and S. M. Nor, “Near Real Time Online Flow-Based Internet Traffic Classification Using Machine Learning (C4.5)”, International Journal of Engineering (IJE), 3(4), pp. 370 – 379, 2009.
6 C. McCarthy, A.N. Z. Heywood, “An Investigation on Identifying SSL Traffic”, in Proceedings Computational Intelligence for Security and Defense Applications (CISDA), 2011 IEEE Symposium , Paris, 11-15 April 2011, pp. 115-122.
7 V. J. Vivek , N. Chandrasekar and Y. Srinivas, “Improving Seismic Monitoring System for Small to Intermediate Earthquake Detection”, International Journal of Computer Science and Security (IJCSS), 4(3), pp. 308 – 315, 2010.
8 J. Barker, P. Hannay and C. Bolan, “Using Traffic Analysis to Identify Tor Usage – A Proposed Study”, in Proceedings of the International Conference on Security & Management, Las Vegas, Nevada, USA. 2010, pp. 620-623.
1 TechRepublic
3 ZDNet
6 ZDNet
Sulaiman Mohd Nor : Colleagues
Abuagla Babiker Mohd : Colleagues  
  Untitled Document
Copyrights (c) 2012 Computer Science Journals. All rights reserved.
Best viewed at 1152 x 864 resolution. Microsoft Internet Explorer.
Copyrights & Usage: Articles published by CSC Journals are Open Access. Permission to copy and distribute any other content, images, animation and other parts of this website is prohibited. CSC Journals has the rights to take action against individual/group if they are found victim of copying these parts of the website.