[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Uymin, 2023 - Google Patents

Application of machine learning in the classification of traffic in telecommunication networks: working with network modeling systems

Uymin, 2023

View PDF
Document ID
17550083311442651063
Author
Uymin A
Publication year
Publication venue
E3S Web of Conferences

External Links

Snippet

The issues of classification of online traffic in the framework of the work of network infrastructure modeling systems are considered. The main classifiers C4. 5 Decision Tree, Random forest Method, SVM, KNN are considered. The parameters responsible for the …
Continue reading at www.e3s-conferences.org (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic regulation in packet switching networks
    • H04L47/10Flow control or congestion control
    • H04L47/24Flow control or congestion control depending on the type of traffic, e.g. priority or quality of service [QoS]
    • H04L47/2441Flow classification
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing packet switching networks
    • H04L43/02Arrangements for monitoring or testing packet switching networks involving a reduction of monitoring data
    • H04L43/026Arrangements for monitoring or testing packet switching networks involving a reduction of monitoring data using flow generation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance or administration or management of packet switching networks
    • H04L41/14Arrangements for maintenance or administration or management of packet switching networks involving network analysis or design, e.g. simulation, network model or planning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing packet switching networks
    • H04L43/06Report generation
    • H04L43/062Report generation for traffic related reporting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/10Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/26Monitoring arrangements; Testing arrangements
    • H04L12/2602Monitoring arrangements

Similar Documents

Publication Publication Date Title
Hussain et al. IoT DoS and DDoS attack detection using ResNet
Chen et al. XGBoost classifier for DDoS attack detection and analysis in SDN-based cloud
Elsayed et al. Machine-learning techniques for detecting attacks in SDN
Da Silva et al. Identification and selection of flow features for accurate traffic classification in SDN
Robinson et al. Ranking of machine learning algorithms based on the performance in classifying DDoS attacks
Scaranti et al. Artificial immune systems and fuzzy logic to detect flooding attacks in software-defined networks
CN111385145B (en) Encryption flow identification method based on ensemble learning
CN111064678A (en) Network traffic classification method based on lightweight convolutional neural network
Lazaris et al. An LSTM framework for modeling network traffic
Dehghani et al. Real-time traffic classification based on statistical and payload content features
Kozik et al. Pattern extraction algorithm for NetFlow‐based botnet activities detection
CN115134250A (en) Network attack source tracing evidence obtaining method
Tang et al. Low-rate dos attack detection based on two-step cluster analysis
CN113904795A (en) Rapid and accurate flow detection method based on network security probe
Zhao et al. Machine-learning based TCP security action prediction
Min et al. Online Internet traffic identification algorithm based on multistage classifier
Sharma et al. An overview of flow-based anomaly detection
Uymin Application of machine learning in the classification of traffic in telecommunication networks: working with network modeling systems
Pinto et al. Detecting DDoS attacks using a cascade of machine learning classifiers based on Random Forest and MLP-ANN
Dener et al. RFSE-GRU: Data balanced classification model for mobile encrypted traffic in big data environment
Kozlowski et al. A New Method of Testing Machine Learning Models of Detection for Targeted DDoS Attacks.
Protic et al. WK-FNN design for detection of anomalies in the computer network traffic
Nechay et al. Controlling false alarm/discovery rates in online internet traffic flow classification
Lv et al. Network encrypted traffic classification based on secondary voting enhanced random forest
Patil et al. Prediction of DDoS Flooding Attack using Machine Learning Models