International Research Journal of Engineering and Technology (IRJET)
e-ISSN:2395-0056
Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN:2395-0072
![]()
International Research Journal of Engineering and Technology (IRJET)
e-ISSN:2395-0056
Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN:2395-0072
1
Abstract - Accurate traffic classification is of fundamental importance to numerous network activities, from security monitoring to accounting, and from Quality of Service to providing operators with useful forecasts for long-term provisioning. The initial stage in analysing and classifying the various types of applications running via a network is network traffic classification. This method allows network operators or internet service providers to control the overall performance of a network. We apply machine learning models to categorize traffic by application. This can be done by extracting the features of the traffic. This classified data can be used to stop unnecessary traffic and allow only user required traffic. Basically we prioritize the network traffic based on the features extracted during the classification. Features related to OTT are identified and we try to restrict them in the network for reducing the traffic in the network for providing better quality of service. We intend to stop traffic from Over-the-top(OTT) platforms like Netflix, Prime Videos, etc. Hence, by this the quality of service can be improved for user required applications.
Key Words: Software-defined networks, Quality of service, Network traffic, classification, Over-the-top platforms.
Network traffic is categorized in a variety of ways of extreme interest for both internet service providers and also network operators. It helps to classify the types of dataflowingandlinkeachonetotheappsthatproduceit. This information is crucial for many purposes, including network monitoring, applications behavior and network security,andtoimproveQualityofService(QoS).
Theterm"Software-definednetworking"(SDN)referstoa method of networking where traffic on a network is controlled by application programming interfaces (APIs) or software-based controllers that communicate with the underlying hardware infrastructure This architecture is
distinct from traditional networks, which employ specialized hardware to regulate network traffic (such as switches and routers). SDN can manage traditional hardwareorcreateandmanagevirtual networksthrough software.Although software-defined networkingprovides a fresh way to control how data packets are routed through a single server, network virtualization enables organizationstosegmentdifferentvirtualnetworkswithin a single physical network or to connect devices on different physical networks to create a single virtual network. Compared to traditional networking, SDN is far more versatile since the control plane is software-based. Without adding extra hardware, it enables administrators tomanagethenetwork,alterconfigurationoptions,supply resources, and boost network capacity from a single user interface.
By providing a knowledge basis for identifying the performancelevelsrequiredbyapplications,classification is a critical mechanism for traffic treatment. Deep Packet Inspection(DPI)andport-basedclassificationarethetwo most used approaches for traffic classification. As more communication is encrypted and more apps use dynamic ports and ports for other well-known applications, these techniques are becoming outdated [1]. Machine Learning (ML), an alternate approach for traffic classification, employs the statistical characteristics of network traffic flowstoaddressthe basicissueswith DPIand port-based categorizationforencryptedflows.
Network traffic classification is a crucial component for managinginfrastructureandensuringthe QoSforvarious applications. In reality, a thorough traffic classification process enables the effective management of alreadyavailable network resources, enabling more precise and reliableresourceallocationsystems[2].
The classification of network traffic can be carried out using the features related to the OTT platforms. The featureextractionisa processofrecognisingfeaturesand
International Research Journal of Engineering and Technology (IRJET)
e-ISSN:2395-0056
Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN:2395-0072
this study was designing service flows with the goal of providing improved QoS, this technique has not been implementedonSDNcontrollers.
According to Meenaxi M Raikar et al. [3], accurate traffic classification is critical in network operations such as accountingfornetworkconsumption,securitymonitoring, and separating multiple network services' Quality of Service(QoS)components.Themanybasicnetworktraffic classification (NTC) approaches have failed to achieve consistent accuracy. The machine learning (ML) and softwaredefinednetwork(SDN)architecturetechnologies were created to solve this problem. Naive Bayes (NB),Nearest Centroid (NC), and Support Vector Machine (SVM), were three supervised learning models that are used to categorize data traffic depending on applications. TheNTCworkflowincludesdatagathering,pre-processing of data, data labeling, model construction, data validation and prediction Flow characteristics are created from the network traffic traces and provided to the classifier for prediction. The nearest centroid (NC) is 90.12%, NB is 95.99%,andtheaccuracyfortheSVMis91.4%.
Yoshinobu Yamada et al. [4] have conducted a traffic prediction, which may be loosely divided into two categories: time-series analysis and machine learning(ML). They implemented a prioritizing technique for predicting mobile traffic [29] that enables us to use less traffic log data while retaining a satisfactory level of accuracy. The "important" traffic log data collects each basestationand provides morecrucial informationtothe server witha greater priorityusingthismethod.Both the prediction approach and the mechanism for determining the significance of each data entry were done using RandomForest. Thisstudy'sdisadvantage wasthelack of use of additional machine learning (ML) techniques like DNNtoincreasepredictionaccuracy.
Kourosh Ahmadi et al. [5] have conducted an SDN controller that incorporates a fuzzy logic control system (FLCS)[30]to enhance QoS for variousserviceflows.The path weight for a specific communication line is determined by the FLE-SDN controller using a fuzzy logic control mechanism after it continually gathers all communication's QoS measurements channels between different networks. The process ends with the determination of the best path for a specific service flow, after which forwarding devices are given instructions to modify their flow forwarding strategies. Particularly for real-time applications like audio and video, the FLE-SDN approach has a proven track record of assisting SDN controllersintryingtoimprovethearchitectureofvarious service flowsand providing greater QoS. Thelimitation of
RajatChaudharyetal. [6]havedevelopedanSDN-based QoS-aware traffic flow management system. The plan is brokendownintothreeparts,eachofwhichaimstospeed up reaction time for incoming traffic. To eliminate interpacket dependence, the incoming packets are first arrangedlinearly.Bydoingthis,thepacketswon'thaveto wait at their destination. The sorted packets are then classified in the second stage based on the application type,packetsize,andpriority.Thethirdstepestablishesa priority-based queuing system to control packet waiting times. This queuing model also incorporates queue migration and priority shifting algorithms to solve the issues of congestion and starvation. The obtained results clearly show the effectiveness of the suggested system with regard to several QoS criteria. The limitation of this study was compared to previous methods, the suggested plandisplayslessdelay.
Thomas Favale et al. [7] analyzed modifications to the traffic patterns coming from the Politecnico di Torino (PoliTO) campus, where the Italian university is located. They focus on usage of the collaborative and remote working platforms, the acceptance of online learning, and campus traffic while also keeping an eye out for any changes in undesired or harmful communications. For all ofthesecondsemester'sclasses,whichwereduetobegin on March 2, PoliTO decided to create an internal elearningsolutionbasedontheBigBlueButtonframework.. During the first week of March, the platform was created, set up, and tested before going live the following week to kick off the online semester. We take advantage of this special vantage point to monitor alterations in campus trafficandservices.
Yang peng et al. [8] researched a reliable and effective technique for detecting network traffic anomalies. They start by creating an all-encompassing architecture that spells out how each stage, from data gathering to finalize the detection of anomaly and application, should work. Next, motivated by the preciseand effective identification of large amounts of data, They propose a parallel subagging GRU-based method for detecting network trafficanomalies.TheyemploySparkplatformtoincrease detection effectiveness, utilizing GA to enhance the trainingprocessandGRUtohandlethelong-termreliance that traffic data inevitably entails. They also seamlessly integrate subagging into GRU to lower the MSE and varianceofeveryordertermandbroadentheapplicability of their model. They carry out numerous rounds of comparison trials to confirm the effectiveness of their
International Research Journal of Engineering and Technology (IRJET)
e-ISSN:2395-0056
Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN:2395-0072
suggested strategy. The experiment's findings demonstrate that PSB-MSE GRU's is enhanced and that it outperforms RNN approaches in terms of detection accuracy, reaching a level of up to about 99.8%. In addition, PSB-GRU provides larger efficiency gains as comparedtothenonparallelapproach.
Yanan Wanget al. [9] put forward a model for predicting networktrafficbasedonintuitionisticfuzzytimeseries.In the realm of traffic forecasting, intuitionistic fuzzy time series models are utilized because of the abundance of complex and dynamic variables found in network traffic. The IFTS theory does a good job of describing the cloudy and unpredictable nature of data flow in networks. It is established what a long-term intuitionistic fuzzy time series is. (p−q) A model for forecasting an intuitionistic fuzzy time series with many inputs and outputs is called IFTS. This model significantly reduces the computational complexity. IFCM clustering is a technique that is enhanced during the training phase, and the clustering centroid similarity measure method is proposed. In place oftheconventionalabsoluteclustercentroiddistance, the vector distance of the fuzzy time series with intuition is employed.Theclusteringcentroidoftheirmodelhasbeen demonstrated.Thismodelisimplementedonfourdistinct timescalesusingtrafficinformationgatheredbytheWIDE project's MAWI working group from the Pacific Ocean backbone. To mimic trace flow collecting, the Wireshark network traffic analysis programme is used. The experiment shows that this model is more accurate, as evidenced by its reduced RMSE and AFER compared to otherpertinentmodels.TheLT-IFTSmodelisausefuland efficienttoolforpredictingnetworktraffic.
Ren-hung Hwang et al. [10] introduced the D-PACK framework,aninnovativeearlyhazardoustrafficdetection system based on traffic auto-profiling (CNN), traffic sampling, and an unsupervised DL model (autoencoder).Their system can drastically minimize the amount of traffic that has to be processed by focusing on reviewing the fewest packets and most bytes from each packet. The evaluation's findings demonstrate that, even with only two packets from each flow and 80 bytes from eachpacketbeingassessed,D-PACKcanidentifymalicious traffic with an accuracy rate of 99%+ and less than 1% FNR and FPR. Furthermore, because fewer packets and bytes are being examined, it is expected to take significantly less time than earlier efforts to pre-process anddetectflows.So,thisframework'smainbenefitisthat itmakesdetectionquicker.
Damian Jankowski et al. [11] recognized malicious activities in software defined networks by using flow features. They processed flow features for the effective
classificationofthetraffic.Itwasconsideredthatinorder to achieve an adequate degree of malicious traffic detection, extra and basic flow characteristics must be integrated with data of the application layer. The feature and its corresponding weight are used to recognize the maliciousattack.
In the process to increase the Quality of Service for a network, M.A.Ridwan et al. [12] suggests two Machine Learning based predictive routing algorithms that use classification and regression techniques. Their research compares the network performance of the routing algorithms based on regression and classification, respectively, known as RgRoute and ClassRoute. They suggested regression-based routing, according to their simulation findings, reduces the time approximately by 52% when compared with approach based on classification.
Yuyang Zhou et al. [13] introduced a novel intrusion detection system that is centered on ensemble learning and feature selection approaches. In the first stage, a heuristic strategy named CFS(Clustered File System)-BA fordimensionalityreductionispresentedwhichselectsan optimal subset which relies on correlation among the extracted features. Afterwards, they developed an ensemblemethodthatintegratestheRandomForest,C4.5 andForestbyPenalizingAttributesalgorithms.Finally,the votingmechanismwasutilizedformergingtheprobability distributions of training sets for the recognition of the attack. Their experimental findings for the dataset(NSLKDD) is remarkable, with accuracy in classification of 99.81%,0.08%FARand99.8%DR alongwithaccuracyin classification of 99.52% and 0.15% FAR for the subsets consistingonly10and8featuresrespectively.
MuhammadShafiqetal.[14]suggestedafeatureselection metric method which was termed as CorrAUC, and then they developed and designed Corrauc, which is a new algorithm for feature selection that depends on the wrapper strategy to properly filter the features and pick up useful features from Bot-IoT dataset for the chosen MachineLearning algorithm by utilizing AUC(Area Under roc Curve) metric. Then, using a bijective soft set as a foundation, they combined TOPSIS and Shannon entropy for evaluating a set of characteristics for detecting fraudulenttrafficinanIoTnetwork.Theyused4different ML algorithms and experimental findings showed the proposed method is effective and may often provide outcomesof>96%.
Gianni D’Angelo et al. [15]suggested a model that begins withstatisticalcharacteristics(basicfeatures),takenfrom traffic flows over a predetermined time period, and
International Research Journal of Engineering and Technology (IRJET)
e-ISSN:2395-0056
Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN:2395-0072
creates additional features that explain the correlations betweenthefeatures(spatialfeatures),aswellaschanges in those features over time (temporal features). They suggestedadeeparchitecturemadeupofneuralnetworks basedonautoencoders(AEs). Theautoencoder'sencodedecode function contains various combinations of recurrent and convolutional network layers in order to extract such information. The following combinations werelookedinto:CNN,LSTM,ConvLSTM,CNN-LSTM,and Stacked-CNN-LSTM. The LSTM recurrent network was usedtoextracttemporal features,whiletheconvolutional networkwasutilizedtoextractspatialfeatures.
A model that utilizes a novel strategy for relaxing the hypothesis of independence between the Naive Bayes algorithm'sattributeswasputoutbyKlenilmarLopesDias et al. [16]. Their report claims that by 2022, video streaming apps would account for more than 60% of all Internet traffic, with predictions that this percentage will continue to rise. But very few studies make an effort to comprehend the network properties of this traffic. These studies [18] include one that looks into the network properties of the two most widely used streaming services,NetflixandYouTube.
DmitriBekermanetal.[17]putforthasupervisedend-toend method foridentifying malwareusing network traffic analysis. The suggested technique pulls 972 behavioral characteristicsfromvariousnetworklevelsandprotocols. The most important characteristics are then determined, andthedata dimensionality isdecreasedtoa manageable level using a feature selection approach. To identify malicious network traffic and find new risks, multiple supervised algorithms are assessed. their analysis of the timeline reveals that several cases of unknown malware might have been discovered at least one month earlier their static criteria were added to Snort or Suricata systems.
Shi Dong et al. [19] introduced the cost-sensitive Support VectorMachine(CMSVM)method,anupgradedversionof the support vector machine technique, to address the imbalance issue in network traffic detection. CMSVM uses an active learning multi-class SVM algorithm that dynamically weights applications. Models of various learningmethodsweredevelopedandtheirperformances were compared using the MOORE SET and NOC SET datasets. The suggested algorithm's effectiveness in comparisontotheotherthreealgorithmsisdemonstrated by performance analysis using the SVM, ROS, and RUS algorithms.
Pedro Amaral et al. [20] In this paper control plane software wasimplemented in SoftwareDefinedNetworks
along with implementing the OpenFlow method's built-in data collecting techniques for the applications under machine learning control. They said something about a straightforward architecture used in a corporate network which uses the OpenFlow protocol to acquire traffic statistics. Their results demonstrate that supervised learning techniques could be utilized with such an architecture and indeed the data it gathers with high degreesofaccuracyforclassification.
Deep-Full-Range, developed by Yi Zeng et al. [21], is a lightweight system for classified encrypted communication and intrusion detection (DFR). They introduced the Deep-Full-Range (DFR) framework, which combines three deep learning algorithms: Convolutional Neural Network [22], Stacked Auto-Encoder (SAE) [24] and Long Short-Term Memory (LSTM) [23] to classify network encrypted traffic and identify intrusions. They employed CNN to extract characteristics from the raw traffic's spatial distribution. The time-related aspect's propertiesarelearnedusingLSTM.
Anderson Santos da Silva et al. [25] presented an architecture in this study to gather, expand, and choose flow characteristics for traffic classification in networks based on OpenFlow. It provides a wide range of flow characteristics that may be examined, improved, and evaluated to discover the best subset of information to categorize various traffic flow patterns. As comparing to classification accuracy achieved with the whole collection of flow characteristics, the subset of flow features identified either by the PCA(Principal Component Analysis) or GA(Genetic algorithm) provides for a much more accurate traffic categorization in all circumstances. The experiment results of their idea reveals that several aspects stand out as significant and take the top spots for the categorization of various experimental scenarios' uniqueflows.
To categorize network traffic, Isadora P. Possebon el al. [26] presented a comparison of individual classifiers and meta learning strategies. They looked into and assessed severalmetalearningstrategies,suchasboosting,bagging, stacking, and voting. Based on real-world tools and data, meta-learning algorithms clearly outperformed their base classifiers,primarilyduetothebaseclassifiershavinglow correlation. The frequency of false positives was decreased because of the ensemble learners, excluding stacking because of the information it gains on its initial level.
International Research Journal of Engineering and Technology (IRJET)
e-ISSN:2395-0056
Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN:2395-0072
This section provides specifics on the suggested method for building a network classifier that can exploit the features specific to OTT platforms [31]. The feature extraction is the paramount section of the project. It can be done by extracting the features related to OTT platforms.
A helpful tool for file analysis and network traffic monitoring is packet capture (PCAP). Utilizing tools for packet collection, like Wireshark, you may capture network traffic and transform it into a format that is readable by humans. For a variety of reasons, networks are viewed by PCAP [32]. Some of the most typical ones include tracking bandwidth use, identifying malicious DHCP servers, spotting malware, DNS resolution, and incident response. In order to study the network properties,PCAPfilesareutilized.Byusingthesequalities, features that will be utilized for categorization will be extracted. By utilizing their unique qualities, we hope to identify network traffic coming from OTT services. In comparison to earlier articles, we intend to employ more featuresforclassifications. Thisresultsinhigheraccuracy rates.
The bulk of the known models employ convolutional neural networks, long-short term neural networks, and other machine learning techniques like Naive Bayes, Random Forest, Forest PA, C4.5, Support Vector Machine, etc. We suggest an ensemble model for classification. An ensemble model is an approach that combines more than one machine learning model in the classification process. We intend to use Random Forest, C4.5 and SVM(Support VectorMachine)toformanensemblemodel.
After classifying network traffic to its application, in the deployment state, traffic from OTT platforms will be restrictedand weprioritize the network traffic specific to theapplication.Weprioritizethenetworktrafficbasedon the features extracted during the classification. Features relatedtoOTTareidentifiedandwetrytorestrictthemin the network for reducing the traffic in the network for providingbetterqualityofservice.
Inthisstudy,weconductedextensiveresearchonnetwork classificationandexaminednumerous researchpaperson various classification models. Many papers presented feature extraction algorithms for classifying network traffic to its application. A significant amount of work is required to extractspecificfeaturesof OTTplatforms. We
intendtorestrictnetworktrafficfromOTTplatforms.This lessenstrafficandraisesqualityofserviceasaresult.
[1] H. Shi, H. Li, D. Zhang, C. Cheng, W. Wu, Efficient and robust feature extraction and selection for traffic classification,Comput.Netw.119(2017)1–16.
[2] M. Finsterbusch, C. Richter, E. Rocha, J.-A. Muller, K. Hanssgen, A survey of payload-based traffic classificationapproaches,IEEECommun.Surv.Tut.16(2) (2014) 1135–1156 doi: https://doi.org/10.1016/j.media.2020.101813
[3] Meenaxi M Raikara, Meena S Mb, Mohammed Moin Mullac, Nagashree S Shetty, Meghana Karanandie,Data TrafficClassificationin SoftwareDefined Networks (SDN) using supervised-learning,ScienceDirect 171(2020)2750–2759
[4] Yoshinobu Yamada, Ryoichi Shinkuma, Takehiro Sato, and Eiji Oki Graduate School of Informatics, Kyoto University Yoshida-honmachi,Sakyo-ku,Kyoto, 606-8501, Japan, Feature-selection based data prioritization in mobile traffic prediction using machine learning , 978-15386-4727-1/18/$31.00©2018IEEE
[5] Amirhossein Moravejosharieh ,Kourosh Ahmadi ,Saghir Ahmad , A Fuzzy Logic Approach To Increase Quality of Service in Software Defined Networking, Communication Control and Networking (ICCC 2018)
[6] Gagangeet Singh Aujla,Rajat Chaudhary,Neeraj Kumar,AnEnsembledSchemeforQoS-awareTrafficFlow Management in Software Defined Networks, 978-1-53863180-5/18/$31.00 ©2018 IEEE
[7] Thomas Favale, Francesca Soroa , Martino Trevisana,IdilioDragob,MarcoMellia,Campustrafficand e-Learning during COVID-19 pandemic.Computer Networks176(2020)107290.
[8] Xiaoling Tao, Yang Peng, Feng Zhao, Changsong Yang, Baohua Qiang, Yufeng Wang, Zuobin Xiong, Gated recurrent unit-based parallel network traffic anomaly detection using subagging ensembles.Ad Hoc Networks 116(2021)102465.
[9] Xiaoshi Fana, Yanan Wang , Mengyu Zhang. Network traffic forecasting model based on long-term intuitionistic fuzzy time series Information Sciences 506 (2020)131–147.
International Research Journal of Engineering and Technology (IRJET) e-ISSN:2395-0056 Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN:2395-0072
[10] REN-HUNGHWANG,(SeniorMember,IEEE),MINCHUN PENG, CHIEN-WEI HUANG, PO-CHING LIN, AND VAN-LINH NGUYEN, (Member, IEEE). An Unsupervised Deep Learning Model for Early Network Traffic Anomaly Detection.Digital Object Identifier 10.1109/ACCESS.2020.2973023
[11] D.JankowskiandM.Amanowicz,"Astudyonflow features selection for malicious activities detection in software defined networks," 2018 International Conference on Military Communications and Information Systems (ICMCIS), 2018, pp. 1-9, doi: 10.1109/ICMCIS.2018.8398697.
[12] Ridwana, M. A., N. A. M. Radzib, and F. Abdullah. "Quality-of-Service Performance Comparison: Machine Learning Regression and Classification-Based Predictive Routing Algorithm." Turkish Journal of Computer and MathematicsEducation(TURCOMAT)12.14(2021):28082817.
[13] Yuyang Zhou, Guang Cheng, Shanqing Jiang, Mian Dai,Building an efficient intrusion detection system based on feature selection and ensemble classifier,Computer Networks,Volume 174,2020,107247,ISSN1389-1286, https://doi.org/10.1016/j.comnet.2020.107247.
[14] M. Shafiq, Z. Tian, A. K. Bashir, X. Du and M. Guizani, "CorrAUC: A Malicious Bot-IoT Traffic Detection Method in IoT Network Using Machine-Learning Techniques,"inIEEEInternetofThingsJournal,vol.8, no. 5, pp. 3242-3254, 1 March 1, 2021, doi: 10.1109/JIOT.2020.3002255.
[15] Gianni D’Angelo, Francesco Palmieri, Network traffic classification using deep convolutional recurrent autoencoder neural networks for spatial–temporal features extraction, Journal of Network and Computer Applications,Volume173,2021,102890,ISSN1084-8045, https://doi.org/10.1016/j.jnca.2020.102890
[16] KlenilmarLopesDias,MateusAlmeidaPongelupe, WalmirMatosCaminhas,LucianodeErrico,Aninnovative approach for real-time network traffic classification, Computer Networks, Volume 158, 2019, Pages 143-157, ISSN 1389-1286, https://doi.org/10.1016/j.comnet.2019.04.004
[17] D. Bekerman, B. Shapira, L. Rokach and A. Bar, "Unknown malware detection using network traffic classification," 2015 IEEE Conference on Communications and Network Security (CNS), 2015, pp. 134-142, doi: 10.1109/CNS.2015.7346821.
[18] A.Rao,A.Legout,Y.-s.Lim,D.Towsley,C.Barakat, W. Dabbous, Network characteristics of video streaming traffic, in: Proceedings of the Seventh Conference on Emerging Networking Experiments and Technologies, ACM,2011,pp.1–12
[19] Shi Dong, Multi class SVM algorithm with active learning for network traffic classification, Expert Systems withApplications,Volume176,2021,114885,ISSN09574174,https://doi.org/10.1016/j.eswa.2021.114885
[20] P.Amaral,J.Dinis,P.Pinto,L.Bernardo,J.Tavares andH.S.Mamede,"MachineLearninginSoftwareDefined Networks: Data collection and traffic classification," 2016 IEEE24thInternationalConferenceonNetwork Protocols (ICNP), 2016, pp. 1-5, doi: 10.1109/ICNP.2016.7785327.
[21] Y.Zeng,H.Gu,W.WeiandY.Guo,"Deep-Full-Range:A Deep Learning Based Network Encrypted Traffic Classification and Intrusion Detection Framework," in IEEE Access, vol. 7, pp. 45182-45190, 2019, doi: 10.1109/ACCESS.2019.2908225.
[22] A. Krizhevsky, I. Sutskever, and G. E. Hinton, “Imagenet classification with deep convolutional neural networks,” in Advances in neural information processing systems,2012,pp.1097–1105.
[23] S. Hochreiter and J. Schmidhuber, “Long shortterm memory,” Neural computation, vol. 9, no. 8, pp. 1735–1780,1997.
[24] P. Vincent, H. Larochelle, I. Lajoie, Y. Bengio, and P.-A. Manzagol, “Stacked denoising autoencoders: Learning useful representations in a deep network with a local denoising criterion,” Journal of machine learning research,vol.11,no.12,pp.3371–3408,2010.
[25] A. Santos Da Silva, C. C. Machado, R. V. Bisol, L. Z. Granville and A. Schaeffer-Filho, "Identification and Selection of Flow Features for Accurate Traffic Classification in SDN," 2015 IEEE 14th International Symposium on Network Computing and Applications, 2015,pp.134-141,doi:10.1109/NCA.2015.12.
[26] Erman, Jeffrey & Arlitt, Martin & Mahanti, Anirban. (2006). Traffic Classification Using Clustering Algorithms.Proceedingsofthe2006SIGCOMM Workshop on Mining Network Data, MineNet'06. 2006. 281-286. 10.1145/1162678.1162679.
[27] Li, Wei & Moore, Andrew. (2007). A Machine LearningApproachforEfficientTrafficClassification.310317.10.1109/MASCOTS.2007.2.
International Research Journal of Engineering and Technology (IRJET) e-ISSN:2395-0056
Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN:2395-0072
[28] I. P. Possebon, A. S. Silva, L. Z. Granville, A. Schaeffer-Filho and A. Marnerides, "Improved Network Traffic Classification Using Ensemble Learning," 2019 IEEE Symposium on Computers and Communications (ISCC), 2019, pp. 1-6, doi: 10.1109/ISCC47284.2019.8969637.
[29] Diala Naboulsi, Student Member, IEEE, Marco Fiore, Member, IEEE, Stephane Ribot, Razvan Stanica, Member, IEEE ,Large-scale Mobile Traffic Analysis: a Survey,1553-877X (c) 2015 IEEE
[30] D. A. Rutherford and G. A. Carter , Fuzzy Logic in Control Systems: Fuzzy Logic Controller, 00189472/90/0300-0404$01.002019IEEE
[31] Syazwina Binti Alias, Selvakumar Manickam, Mohammed M. Kadhum, A Study on Packet Capture Mechanisms in Real Time Network Traffic, 978-1-47992758-6/13 $31.00 © 2013 IEEEDOI 10.1109/ACSAT.2013.95