scholarly journals Retraction Note to: Traffic identification and traffic analysis based on support vector machine

Author(s):  
Youchan Zhu ◽  
Yi Zheng
2021 ◽  
Vol 9 (4) ◽  
pp. 0-0

Internet of things devices are not very intelligent and resource-constrained; thus, they are vulnerable to cyber threats. Cyber threats would become potentially harmful and lead to infecting the machines, disrupting the network topologies, and denying services to their legitimate users. Artificial intelligence-driven methods and advanced machine learning-based network investigation prevent the network from malicious traffics. In this research, a support vector machine learning technique was used to classify normal and abnormal traffic. Network traffic analysis has been done to detect and prevent the network from malicious traffic. Static and dynamic analysis of malware has been done. Mininet emulator was selected for network design, VMware fusion for creating a virtual environment, hosting OS was Ubuntu Linux, network topology was a tree topology. Wireshark was used to open an existing pcap file that contains network traffic. The support vector machine classifier demonstrated the best performance with 99% accuracy.


2014 ◽  
Vol 602-605 ◽  
pp. 1933-1937
Author(s):  
Lian Fa Wu

In recent years, Internet traffic classification using machine learning is a hot topic, and supervised learning methods which contain Support Vector Machine were used to identify Internet traffic in many papers. The supervised learning methods need many instances which have been labeled to train classifying model, but it is difficult to label the instances because many traffic have been encrypted. Labeled instances and unlabeled instances can be used by semi-supervised learning methods to train the classifying model, so that it is very fit for p2p traffic identification. Transductive support vector machine is one of the typical semi-supervised learning methods. Based on theoretic analyzing and experiment, we compared the accuracy of TSVM and SVM. The experiment results show that the semi-supervised methods have some advantages on identification of p2p traffic.


Sign in / Sign up

Export Citation Format

Share Document