Active Learning for Network Traffic Classification: A Technical Study
نویسندگان
چکیده
Network Traffic Classification (NTC) has become an important feature in various network management operations, e.g., Quality of Service (QoS) provisioning and security services. Machine Learning (ML) algorithms as a popular approach for NTC can promise reasonable accuracy classification deal with encrypted traffic. However, ML-based techniques suffer from the shortage labeled traffic data which is case many real-world applications. This study investigates applicability active form ML, called Active (AL), NTC. AL reduces need large number examples by actively choosing instances that should be labeled. The first provides overview its fundamental challenges along surveying literature on methods. Then, it introduces concepts AL, discusses context NTC, review this field. Further, open issues AL-based are discussed. Moreover, technical survey, some experiments conducted to show broad simulation results achieve high small amount data.
منابع مشابه
FLIP: Active Learning for Relational Network Classification
Active learning in relational networks has gained popularity in recent years, especially for scenarios when the costs of obtaining training samples are very high. We investigate the problem of active learning for both singleand multi-labeled relational network classification in the absence of node features during training. The problem becomes harder when the number of labeled nodes available fo...
متن کاملActive Build-Model Random Forest Method for Network Traffic Classification
Network traffic classification continues to be an interesting subject among numerous networking communities. This method introduces multi-beneficial solutions in different avenues, such as network security, network management, anomaly detection, and quality-of-service. In this paper, we propose a supervised machine learning method that efficiently classifies different types of applications usin...
متن کاملMachine Learning Classification of Malicious Network Traffic
1.1. Intrusion Detection Systems. In our society, information systems are everywhere. They are used by corporations to store proprietary and other sensitive data, by families to store financial and personal information, by universities to keep research data and ideas, and by governments to store defense and security information. It is very important that the information systems that house this ...
متن کاملAutomatic Network Traffic Classification
.......................................................................................................... I Table of
متن کاملA Multi-Objective Method for Network Reconfiguration (TECHNICAL NOTE)
This paper presents an algorithm based on multi-objective approach for network reconfiguration. Multiple objectives are considered for reduction in the system power loss, deviations of the nodes voltage and transformers loading imbalance, while subject to a radial network structure in which all the loads must be energized and no branch current constraint is violated. These three objectives are ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Cognitive Communications and Networking
سال: 2022
ISSN: ['2332-7731', '2372-2045']
DOI: https://doi.org/10.1109/tccn.2021.3119062