Search results for "Traffic classification"

showing 4 items of 4 documents

An Encrypted Traffic Classification Framework Based on Convolutional Neural Networks and Stacked Autoencoders

2020

In recent years, deep learning-based encrypted traffic classification has proven to be effective; especially, using neural networks to extract features from raw traffic to classify encrypted traffic. However, most of the neural networks need a fixed-sized input, so that the raw traffic need to be trimmed. This will cause the loss of some information; for example, we do not know the number of packets in a session. To solve these problems, a framework, which implements both a convolutional neural network (CNN) and a stacked autoencoder (SAE), is proposed in this paper. This framework uses a CNN to extract high-level features from raw network traffic and uses an SAE to encode the 26 statistica…

Artificial neural networkbusiness.industryNetwork packetComputer scienceDeep learningFeature extraction020206 networking & telecommunicationsPattern recognition02 engineering and technologyEncryptionAutoencoderConvolutional neural networkTraffic classification0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingArtificial intelligencebusiness2020 IEEE 6th International Conference on Computer and Communications (ICCC)
researchProduct

Adding Real-Time Networking and QoS Capabilities to RTLinux-GPL

2006

This paper presents an architecture to build distributed embedded real-time systems in the RTLinux-GPL platform. The architecture (built in a layered fashion) has being built around open source projects ranging from Ethernet drivers to a CORBA environment. The paper focuses on those layers that give support for QoS and real-time networking over Ethernet networks. The main ideas are: to accomplish deterministic access times by using a TDMA protocol over Ethernet and to multiplex different types of traffic in that real-time network, providing different service types (QoS) to each type of traffic without jeopardizing the a priori guarantee of the system's real-time properties. Traffic types in…

EthernetSynchronous EthernetTraffic classificationNetwork schedulerDifferentiated servicesComputer sciencebusiness.industryQuality of serviceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSLocal area networkInternet trafficbusinessComputer network2005 IEEE Conference on Emerging Technologies and Factory Automation
researchProduct

Efficient on-the-fly Web bot detection

2021

Abstract A large fraction of traffic on present-day Web servers is generated by bots — intelligent agents able to traverse the Web and execute various advanced tasks. Since bots’ activity may raise concerns about server security and performance, many studies have investigated traffic features discriminating bots from human visitors and developed methods for automated traffic classification. Very few previous works, however, aim at identifying bots on-the-fly, trying to classify active sessions as early as possible. This paper proposes a novel method for binary classification of streams of Web server requests in order to label each active session as “bot” or “human”. A machine learning appro…

Web serverInformation Systems and ManagementComputer scienceInternet robot02 engineering and technologyMachine learningcomputer.software_genreUsage dataManagement Information SystemsIntelligent agentEarly decision; Internet robot; Machine learning; Neural network; Real-time bot detection; Sequential analysis; Web botArtificial IntelligenceReal-time bot detection020204 information systemsMachine learning0202 electrical engineering electronic engineering information engineeringFalse positive paradoxSequential analysisSession (computer science)business.industryWeb botNeural networkEarly decisionTraffic classificationBinary classification020201 artificial intelligence & image processingArtificial intelligencebusinesscomputerClassifier (UML)SoftwareKnowledge-Based Systems
researchProduct

Adaptive framework for network traffic classification using dimensionality reduction and clustering

2012

Information security has become a very important topic especially during the last years. Web services are becoming more complex and dynamic. This offers new possibilities for attackers to exploit vulnerabilities by inputting malicious queries or code. However, these attack attempts are often recorded in server logs. Analyzing these logs could be a way to detect intrusions either periodically or in real time. We propose a framework that preprocesses and analyzes these log files. HTTP queries are transformed to numerical matrices using n-gram analysis. The dimensionality of these matrices is reduced using principal component analysis and diffusion map methodology. Abnormal log lines can then …

ta113Computer scienceNetwork securitybusiness.industryDimensionality reductionintrusion detectionk-meansdiffusion mapServer logcomputer.software_genreanomaly detectionTraffic classificationkoneoppiminenWeb log analysis softwareAnomaly detectionData miningWeb servicetiedonlouhintaCluster analysisbusinesscomputern-grams
researchProduct