On the Validation of Traffic Classification Algorithms

Author(s):  
Géza Szabó ◽  
Dániel Orincsay ◽  
Szabolcs Malomsoky ◽  
István Szabó
2020 ◽  
Vol 3 (1) ◽  
pp. 64-74
Author(s):  
Ahmed A. Elsherif ◽  
Arwa A. Aldaej

One of the major challenges that faces the acceptance and growth rate of business and governmental sites is a Botnet-based DDoS attack. A flooding DDoS strikes a victim machine by means of sending a vast amount of malicious traffic, causing a significant drop in the service quality (QoS) in IoT devices. Nonetheless, it is not that easy to detect and tackle flooding DDoS attacks, owing to the significant number of attacking machines, the usage of source-address spoofing, and the common areas shared between legitimate and malicious traffic. New kinds of attacks are identified daily, and some remain undiscovered, accordingly, this paper aims to improve the traffic classification algorithm of network traffic, that hackers use to try to be ambiguous or misleading. A recorded simulated traffic was used for both samples; normal and DDoS attack traffic, approximately 104.000 cases of each, where both datasets -which were created for this study- represent the input data in order to create a classification model, to be used as a tool to mitigate the risk of being attacked. The next step is putting datasets in a format suitable for classification. This process is done through preprocessing techniques, to convert categorical data into numerical data. A classification process is applied to capture datasets, to create a classification model, by using five classification algorithms which are; Decision Tree, Support Vector Machine, Naive Bayes, K-Neighbours and Random Forest. The core code used for classification is the python code, which is controlled by a user interface. The highest prediction, precision and accuracy are obtained using the Decision Tree and Random Forest classification algorithms, which also have the lowest processing time.


Classification network traffic are becoming ever more relevant in understanding and addressing security issues inInternet applications. Virtual Private Networks (VPNs) have become one famous communication forms on the Internet. In this study, a new model for traffic classification into VPN or non-VPN is proposed. XGBoost algorithm is used to rank features and to build the classification model. The proposed model overwhelmed other classification algorithms. The proposed model achieved 91.6% accuracy which is the highest registered accuracy for the selected dataset. To illustrate the merit of the proposed model, a comparison was made with sixteen different classification algorithms


2000 ◽  
Vol 14 (3) ◽  
pp. 151-158 ◽  
Author(s):  
José Luis Cantero ◽  
Mercedes Atienza

Abstract High-resolution frequency methods were used to describe the spectral and topographic microstructure of human spontaneous alpha activity in the drowsiness (DR) period at sleep onset and during REM sleep. Electroencephalographic (EEG), electrooculographic (EOG), and electromyographic (EMG) measurements were obtained during sleep in 10 healthy volunteer subjects. Spectral microstructure of alpha activity during DR showed a significant maximum power with respect to REM-alpha bursts for the components in the 9.7-10.9 Hz range, whereas REM-alpha bursts reached their maximum statistical differentiation from the sleep onset alpha activity at the components between 7.8 and 8.6 Hz. Furthermore, the maximum energy over occipital regions appeared in a different spectral component in each brain activation state, namely, 10.1 Hz in drowsiness and 8.6 Hz in REM sleep. These results provide quantitative information for differentiating the drowsiness alpha activity and REM-alpha by studying their microstructural properties. On the other hand, these data suggest that the spectral microstructure of alpha activity during sleep onset and REM sleep could be a useful index to implement in automatic classification algorithms in order to improve the differentiation between the two brain states.


Author(s):  
Y.A. Hamad ◽  
K.V. Simonov ◽  
A.S. Kents

The paper considers general approaches to image processing, analysis of visual data and computer vision. The main methods for detecting features and edges associated with these approaches are presented. A brief description of modern edge detection and classification algorithms suitable for isolating and characterizing the type of pathology in the lungs in medical images is also given.


Sign in / Sign up

Export Citation Format

Share Document