Skip to main content

Traffic Classification Approach Based on Support Vector Machine and Statistic Signature

  • Conference paper
  • 3306 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 8121))

Abstract

As network traffic is dramatically increasing, classification of application traffic becomes important for the effective use of network resources. Classification of network traffic using port-based or payload-based analysis is becoming increasingly difficult because of many peer-to-peer (P2P) applications using dynamic port numbers, masquerading techniques, and encryption. An alternative approach is to classify traffic by exploiting the distinctive characteristics of applications. In this paper, we propose a classification method of application traffic using statistic signatures based on SVM (Support Vector Machine). The statistic signatures, defined as a directional sequence of packet size in a flow, are collected for each application, and applications are classified by SVM mechanism.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bernaille, L., Teixeira, R., Akodkenou, I., Soule, A., Salamantian, K.: Traffic Classification On The Fly. ACM SIGCOMM Computer Communication Review 36(2), 23–26 (2006)

    Article  Google Scholar 

  2. Karagiannis, T., Broido, A., Brownlee, N., Claffy, K., Faloutsos, M.: Is P2P dying or just hiding? In: IEEE Globecom (2004)

    Google Scholar 

  3. Roughan, M., Sen, S., Spatscheck, O., Duffield, N.: Class-of-service mapping for QoS: A statistical signature-based approach to IP traffic classification. In: Internet Measurement Conference (2004)

    Google Scholar 

  4. Moore, A., Zuev, D.: Internet traffic classification using bayesian analysis. In: ACM SIGMETRICS (2005)

    Google Scholar 

  5. Karagiannis, T., Papagiannaki, D., Faloutsos, M.: BLINC: Multilevel traffic classification in the dark. In: ACM SIGCOMM (2005)

    Google Scholar 

  6. Bernaille, L., Teixeira, R., Salamantian, K.: Early Application Identification. In: Second Conference on Future Networking Technologies (December 2006)

    Google Scholar 

  7. Callado, A., Kamienski, C., Szabó, G., Gerő, B.P., Kelner, J., Fernandes, S., Sadok, D.: A Survey on Internet Traffic Identification. IEEE Communications Surveys & Tutorials 11(3) (Third quarter 2009)

    Google Scholar 

  8. Vapnik, V.: The Nature of Statistical Learning Theory. Springer, NewYork (1995)

    Book  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hwang, S., Cho, K., Kim, J., Baek, Y., Yun, J., Han, K. (2013). Traffic Classification Approach Based on Support Vector Machine and Statistic Signature. In: Balandin, S., Andreev, S., Koucheryavy, Y. (eds) Internet of Things, Smart Spaces, and Next Generation Networking. ruSMART NEW2AN 2013 2013. Lecture Notes in Computer Science, vol 8121. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40316-3_29

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-40316-3_29

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-40315-6

  • Online ISBN: 978-3-642-40316-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics