期刊文献+

一种组合式特征选择算法及其在网络流量识别中的应用 被引量:7

Application of a Hybrid Feature Selection Algorithm in Internet Traffic Identification
下载PDF
导出
摘要 当前网络流量日趋复杂,给网络管理带来许多困难.为了准确地识别出网络中的各种流量,本文以支持向量机为分类器,以流的统计学特征为分类依据,提出一种组合式特征选择算法,该算法首先快速去除和分类不相关的特征,针对余下的特征,再利用遗传算法引导特征的选择和支持向量机模型参数的寻优,最终获得了最优的特征集和最佳的支持向量机分类模型.经过实验验证,基于该算法的网络流量识别方法在识别P2P流量时能以更少的特征获得更高的分类准确率. Nowadays network traffic is increasingly complicated which brings many difficulties to network management. In order to accurately identify network traffic, this paper uses support vector machine as classifier and flow statistic features as discriminators, and proposes a hybrid feature selection algorithm. Firstly this algorithm quickly eliminates those flow features irrelevant to class, then facing to the rest features it makes use of genetic algorithm to select flow features and optimize the parameters of support vector ma- chine model, finally it outputs the best flow feature set and the optimized support vector machine model. The experimental results in- dicate that the improved accuracy and the fewer features are achieved by applying this algorithm to P2P traffic identification.
出处 《小型微型计算机系统》 CSCD 北大核心 2012年第2期325-329,共5页 Journal of Chinese Computer Systems
基金 国家"八六三"高技术研究发展计划基金项目(2009AA01A346)资助
关键词 P2P流量识别 流统计学特征 支持向量机 遗传算法 特征选择 P2P traffic identification flow statistic feature support vector machine genetic algorithm feature selection
  • 相关文献

参考文献10

  • 1Cover TM1. The best two independent measurements are not the two best [ J]. IEEE Transactions on Systems,Man, and Cybernet- ics, 1974,1:116-1171.
  • 2Hyunchul Kim, KC Claffy, Marina Fomenkov, et al. Internot traf- fic classification demystified: myths, caveats, and the best prac- tices [C]. Proceedings of the 2008 ACM CoNEXT Conference, December 09-12, 2008:1-12.
  • 3WEKA: data mining software in Java[ EB/OL]. http://www, cs. waikato, ac. nz/ml/weka/,2010-01.
  • 4Moore A W, Zuev Z. lnternet traffic classification using Bayesian analysis techniques [C]. Proceedings of ACM SIGMETRICS, Banff, Canada, June,2005:50-60.
  • 5Moore A, Zuev D, Crogan M. Discriminators for use in flow- based classification[ R ]. RR-05. 13, Department of Computer Sci- ence, University of London, 2005.
  • 6Wimams N, Zander S, Annitage G. A preHraJnary performance comparison of five machine learning algorithms for practical ip traf- fic flow classification[J]. ACM SIGCOMM CCR,October,2006, 36(5) :7-15.
  • 7Li Zhu, Yuan Rui-xi, Guan Xiao-hong. Accurate classification of the Intermet traffic based on the SVM method CC]. Proceeding of the 42th ]FEE International Cortference on Communication (ICC), Glasgow, Scfland, 2007 : 1373-1378.
  • 8Yang Yue-xiang, Wang Rui-wang, Liu Yang, et al. Solving P2P traffic identification problems via optimized support vector ma- chines [ C]. Proceeding of IEEF_/ACS International Conference on Computer Systems and Applications ( aieesa ), Amman, Jordan, 2007 : 165-171.
  • 9Zander S, Nguyen T, Armitagc G. Self-learning IP traffic classifi- cation based on statistical flow characteristics [ C ]. PAM 2005, Boston, USA, March 31-April 1, 2005.
  • 10CacheLogic[ EB/OL]. http ://www. cachelogic, corn, 2008-01.

同被引文献52

  • 1Camacho J, Padilla P, Teodoro P, et al. A generalizabledynamic flow pairing method for traffic classification [ J ].Computer Networks,2013,57(14) :2718 -2732.
  • 2Nguyen T T, Armitage G, Branch P, et al. Timely andcontinuous machine-learning-based classification for interactiveIP traffic [ J ]. IEEE/ACM Transactions on Networking(TON) ,2012,20(6) : 1880-1894.
  • 3Moore A,Zuev D,Crogan M,et al. Discriminators for use inflow-based classification [ M ]. London : Queen Mary andWestfield College Press,2005 :1 - 14.
  • 4Amiri F, Rezaei Y M,Lucas C,et al. Mutual information-based feature selection for intrusion detection systems [ J ].Journal of Network and Computer Applications, 2011, 34(4):1184 -1199.
  • 5Yang J,Ma J,Cheng G,et al. An empirical investigation offilter attribute selection techniques for high-speed networktraffic flow classification [ J ]. Wireless PersonalCommunications,2012,66(3) :541 -558.
  • 6Jain A, Zongker D. Feature selection : evaluation, application,and small sample performance [ J ]. Pattern Analysis andMachine Intelligence, 1997,19(2) : 153 - 158.
  • 7Shirazi H M, Namadchian A, Khalili T A. A combinedanomaly base intrusion detection using memetic algorithmand bayesian networksf J]. International Journal of MachineLearning and Computing,2012,2(5) :706 -710.
  • 8Bacquet C, Zincir-Heywood A N, Hey wood M I. Geneticoptimization and hierarchical clustering applied to encryptedtraffic identification [ C ] //Computational Intelligence inCyber Security(CICS). Paris:IEEE,2011 : 194 -201.
  • 9Moscato P. On evolution, search, optimization, geneticalgorithms and martial arts: towards memetic algorithms[M ]. Pasadena : Caltech Concurrent Computation Program,1989:1 -64.
  • 10Ong Y S,Keane A J. Meta-lamarckian learning in memeticalgorithms [ J ]. Evolutionary Computation,2004,8 (2) ; 99 -110.

引证文献7

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部