Uymin, 2023 - Google Patents
Application of machine learning in the classification of traffic in telecommunication networks: working with network modeling systemsUymin, 2023
View PDF- Document ID
- 17550083311442651063
- Author
- Uymin A
- Publication year
- Publication venue
- E3S Web of Conferences
External Links
Snippet
The issues of classification of online traffic in the framework of the work of network infrastructure modeling systems are considered. The main classifiers C4. 5 Decision Tree, Random forest Method, SVM, KNN are considered. The parameters responsible for the …
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic regulation in packet switching networks
- H04L47/10—Flow control or congestion control
- H04L47/24—Flow control or congestion control depending on the type of traffic, e.g. priority or quality of service [QoS]
- H04L47/2441—Flow classification
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing packet switching networks
- H04L43/02—Arrangements for monitoring or testing packet switching networks involving a reduction of monitoring data
- H04L43/026—Arrangements for monitoring or testing packet switching networks involving a reduction of monitoring data using flow generation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/14—Arrangements for maintenance or administration or management of packet switching networks involving network analysis or design, e.g. simulation, network model or planning
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing packet switching networks
- H04L43/06—Report generation
- H04L43/062—Report generation for traffic related reporting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/26—Monitoring arrangements; Testing arrangements
- H04L12/2602—Monitoring arrangements
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Hussain et al. | IoT DoS and DDoS attack detection using ResNet | |
Chen et al. | XGBoost classifier for DDoS attack detection and analysis in SDN-based cloud | |
Elsayed et al. | Machine-learning techniques for detecting attacks in SDN | |
Da Silva et al. | Identification and selection of flow features for accurate traffic classification in SDN | |
Robinson et al. | Ranking of machine learning algorithms based on the performance in classifying DDoS attacks | |
Scaranti et al. | Artificial immune systems and fuzzy logic to detect flooding attacks in software-defined networks | |
CN111385145B (en) | Encryption flow identification method based on ensemble learning | |
CN111064678A (en) | Network traffic classification method based on lightweight convolutional neural network | |
Lazaris et al. | An LSTM framework for modeling network traffic | |
Dehghani et al. | Real-time traffic classification based on statistical and payload content features | |
Kozik et al. | Pattern extraction algorithm for NetFlow‐based botnet activities detection | |
CN115134250A (en) | Network attack source tracing evidence obtaining method | |
Tang et al. | Low-rate dos attack detection based on two-step cluster analysis | |
CN113904795A (en) | Rapid and accurate flow detection method based on network security probe | |
Zhao et al. | Machine-learning based TCP security action prediction | |
Min et al. | Online Internet traffic identification algorithm based on multistage classifier | |
Sharma et al. | An overview of flow-based anomaly detection | |
Uymin | Application of machine learning in the classification of traffic in telecommunication networks: working with network modeling systems | |
Pinto et al. | Detecting DDoS attacks using a cascade of machine learning classifiers based on Random Forest and MLP-ANN | |
Dener et al. | RFSE-GRU: Data balanced classification model for mobile encrypted traffic in big data environment | |
Kozlowski et al. | A New Method of Testing Machine Learning Models of Detection for Targeted DDoS Attacks. | |
Protic et al. | WK-FNN design for detection of anomalies in the computer network traffic | |
Nechay et al. | Controlling false alarm/discovery rates in online internet traffic flow classification | |
Lv et al. | Network encrypted traffic classification based on secondary voting enhanced random forest | |
Patil et al. | Prediction of DDoS Flooding Attack using Machine Learning Models |