Open Access   Article Go Back

A Survey on: Finding Network Traffic Classification Methods based on C5.0 Machine Learning Algorithm

Amit Kumar1 , Daya Shankar Pandey2 , Varsha Namdeo3

Section:Survey Paper, Product Type: Journal Paper
Volume-7 , Issue-4 , Page no. 788-791, Apr-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i4.788791

Online published on Apr 30, 2019

Copyright © Amit Kumar, Daya Shankar Pandey, Varsha Namdeo . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Amit Kumar, Daya Shankar Pandey, Varsha Namdeo, “A Survey on: Finding Network Traffic Classification Methods based on C5.0 Machine Learning Algorithm,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.788-791, 2019.

MLA Style Citation: Amit Kumar, Daya Shankar Pandey, Varsha Namdeo "A Survey on: Finding Network Traffic Classification Methods based on C5.0 Machine Learning Algorithm." International Journal of Computer Sciences and Engineering 7.4 (2019): 788-791.

APA Style Citation: Amit Kumar, Daya Shankar Pandey, Varsha Namdeo, (2019). A Survey on: Finding Network Traffic Classification Methods based on C5.0 Machine Learning Algorithm. International Journal of Computer Sciences and Engineering, 7(4), 788-791.

BibTex Style Citation:
@article{Kumar_2019,
author = {Amit Kumar, Daya Shankar Pandey, Varsha Namdeo},
title = {A Survey on: Finding Network Traffic Classification Methods based on C5.0 Machine Learning Algorithm},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2019},
volume = {7},
Issue = {4},
month = {4},
year = {2019},
issn = {2347-2693},
pages = {788-791},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4117},
doi = {https://doi.org/10.26438/ijcse/v7i4.788791}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i4.788791}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4117
TI - A Survey on: Finding Network Traffic Classification Methods based on C5.0 Machine Learning Algorithm
T2 - International Journal of Computer Sciences and Engineering
AU - Amit Kumar, Daya Shankar Pandey, Varsha Namdeo
PY - 2019
DA - 2019/04/30
PB - IJCSE, Indore, INDIA
SP - 788-791
IS - 4
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
274 199 downloads 129 downloads
  
  
           

Abstract

Classifying traffic in a residential area is always a challenging task in the high-speed network. The analysis and quality of service require more specific network control, which generates network traffic. The existing network has many disadvantages because of that the network was unable to detect the traffic in a network. This survey is based on the machine learning algorithm which will work accordingly to the generated traffic information that will be get from the client for that the boosted classifier contain high accuracy has been generated. So, this network will be used for the classification of the applications like- FTP, Skype, TCP etc. , This type of paper demonstrates that the Machine Learning Algorithm and the use of this algorithm are used to classify network traffic.

Key-Words / Index Term

Traffic Classification, Computer Networks, C5.0, Machine Learning Algorithms (MLAs), Performance Monitoring

References

[1]. A. Vlăduţu, D. Comăneci, and C. Dobre, ‘‘Internet traffic classification based on flows’ statistical properties with machine learning,’’ Int. J. Netw. Manage., vol. 27, no. 3, p. e1929, May 2017.
[2]. Y. Yu, J. Long, and Z. Cai, ‘‘Session-based network intrusion detection using a deep learning architecture,’’ in Modeling Decisions for Artificial Intelligence. V. Torra, Y. Narukawa, A. Honda, and S. Inoue, Eds. Cham, Switzerland: Springer, 2017, pp. 144–155.
[3]. D. J. Weller-Fahy, B. J. Borghetti, and A. A. Sodemann, ‘‘A survey of distance and similarity measures used within network intrusion anomaly detection,’’ IEEE Commun. Surveys Tuts., vol. 17, no. 1, pp. 70–91, Jan. 2015.
[4]. M. Ahmed, A. N. Mahmood, and J. Hu, ‘‘A survey of network anomaly detection techniques,’’ J. Netw. Comput. Appl., vol. 60, pp. 19–31, Jan. 2016.
[5]. Y. Li, R. Yu, C. Shahabi, and Y. Liu, “Diffusion convolutional recurrent neural network: Data-driven traffic forecasting,” 2018.
[6]. R. Alvizu, S. Troia, G. Maier, and A. Pattavina, “Matheuristic with machine-learning-based prediction for software-defined mobile metrocore networks,” Journal of Optical Communications and Networking, vol. 9, no. 9, pp. D19–D30, 2017.
[7]. A. Azzouni and et al, “Neutm: A neural network-based framework for traffic matrix prediction in sdn,” CoRR, vol. abs/1710.06799, 2017.
[8]. Y. Liu and et al, “Short-term traffic flow prediction with conv-lstm,” in Wireless Communications and Signal Processing (WCSP), 2017. IEEE, 2017, pp. 1–6.
[9]. M. Wang, Y. Cui, X. Wang, S. Xiao, and J. Jiang, “Machine Learning for Networking: Workflow, Advances and Opportunities,” IEEE Network, vol. 32, no. 2, pp. 92–99, Mar. 2018.
[10]. “Fault Tolerance in TCAM-limited Software Defined Networks,” Computer Networks, vol. 116, no. C, pp. 47–62, Apr. 2017.
[11]. D. Kreutz, F. M. Ramos, P. E. Verissimo, C. E. Rothenberg, S. Azodolmolky, and S. Uhlig, “Software-defined Networking: A Comprehensive Survey,” Proceedings of the IEEE, vol. 103, no. 1, pp. 14–76, 2015
[12]. Y.-D. Lin, H.-Y. Teng, C.-R. Hsu, C.-C. Liao, and Y.-C. Lai, “Fast Failover and Switchover for Link Failures and Congestion in Software Defined Networks,” in IEEE ICC 2016, KL, Malaysia, May 2016.
[13]. I. Butun and S. Morgera, “A Survey of Intrusion Detection Systems in Wireless Sensor Networks,” IEEE, 2014.
[14]. Janice Ca˜nedo, Anthony Skjellum, “Using machine learning to secure IoT systems,” IEEE International Conference on Privacy, Security and Trust (PST), 2016.
[15]. Information on See5/C5.0 - RuleQuest Research Data Mining Tools, 2011. [Online]. Accessible: http://www.rulequest.com/see5-info.html
[16]. Anshul Vishwakarma1* , Amit Khare2, “Vehicle Detection and Tracking for Traffic Surveillance Applications: A Review Paper”, Vol.-6, Issue-7, July 2018 E-ISSN: 2347-2693.
[17]. K. Thyagarajan 1* , N. Vaishnavi 2, “Performance Study on Malicious Program Prediction Using Classification Techniques”, Vol.-6, Issue-5, May 2018 E-ISSN: 2347-2693.