期刊文献+

一种基于用户行为状态特征的流量识别方法 被引量:4

Traffic classification based on analysis to users' activities status
下载PDF
导出
摘要 针对当前业务流量的分类方式过于简略、识别结果不够确切的问题,提出基于状态特征的分类识别方法以精确识别流量数据中的用户行为。定义了网络通信中的用户行为并分析其特征,通过矢量量化技术结合主题模型方法从流量序列中提取行为状态特征,利用机器学习算法对状态特征建模,并按照用户行为的分类对流量进行识别。实验结果显示按照行为分类能更加详细地描述流量特点。在相同机器学习算法下,基于状态特征的行为识别方法准确度优于传统方法。 General traffic classification methodologies cannot describe the detail information of network communication. This paper proposed a novel method based on users' online activities to classify traffic. This method described different traffic with characteristics of activity status, and combined vector quantization with topic model to extract characteristics of activity status from traffic. Then it built classification model and identified traffic with these characteristics by some machine learning algorithms. The experimental results show that category of users' activities give a more elaborate scheme to traffic classification. And with the same machine learning algorithm, the recognition rate of classification based on characteristics of activity status is better than traditional ways' rate.
出处 《计算机应用研究》 CSCD 北大核心 2015年第2期560-564,578,共6页 Application Research of Computers
关键词 流量识别 用户行为 行为状态特征 主题模型 traffic classification user activity characteristics of activity status topic model
  • 相关文献

参考文献18

  • 1ERMAN J, MAHANTI A, ARL1TY M. Qrp05-4 : Internet traffic identi- fication using machine learning[ C ]//Proc of Global Telecommunica- tions Conference. [ S. 1. ] : IEEE Press ,2006 : 1-6.
  • 2ERMAN J, ARLIrI M, MAHANT! A. Traffic classification using clus- tering algorithms[ C]//Proc of SIGCOMM Workshop on Mining Net- work Data. [ S. 1. ] :ACM Press,2006:281-286.
  • 3ZHANG Fan, HE Wen-bo, XUE Liu, et al. Inferring users' online ac- tivities through traffic analysis [ C ]//Proc of the 4th ACM Conference on Wireless Network Security. [ S. 1. ] :ACM Press,2011:59-70.
  • 4MOORE A W,ZUEV D. Internet traffic classification using Bayesian analysis techniques [ C]//Proc of ACM SIGMETRICS Performance Evaluation Review. [ S. 1. ] :ACM Press,2005 :$0-60.
  • 5XU Kuai,ZHANG Zhi-li, BHATFACHARYYA S. Internet traffic be- havior profiling for network security monitoring [ J ]. IEEE/ACM Trans on Networking,2008,16(6) :1241-1252.
  • 6SUH K, FIGUEIREDO D R, KUROSE J F, et al. Characterizing and detecting skype-relayed traffic [ C ]//Proc of INFOCOM. 2006 : 1-12.
  • 7KARAGIANNIS T, PAPAGIANNAKI K, FALOUTSOS M. BLINC : multilevel traffic classification in the dark [ C ]//Proc of SIGCOMM. 2005:229-240.
  • 8MARQUES N H T,ALMEIDA J M,ROCHA L C D,et al. A character- ization of broadband user behavior and their e-business activities[ J]. ACM SIGMETRICS Performance Evaluation Review, 2004,32 (3) :3-13.
  • 9MARQUES N H T,ROCHA L C D,GUERRA P H C,et al. Character- izing broadband user behavior[ C ]//Proc of ACM Workshop on Next- generation Residential Broadband Challenges. [ S. 1. ] : ACM Press, 2004 : 11-18.
  • 10张震,汪斌强,陈鸿昶,马海龙.互联网中基于用户连接图的流量分类机制[J].电子与信息学报,2013,35(4):958-964. 被引量:8

二级参考文献45

  • 1SEN S, WANG J. Analyzing peer-to-peer traffic across large net- works[A]. Proceedings of ACM SIGCOMM Intemet Measurement Workshop[C]. Marseilles, France, 2002.
  • 2MOORE D, KEYS K, KOGA R, et al. The CoralReef software suite as a tool for system and network administrators[A]. Proceedings of the 15th USENIX Conference on Systems Administration[C]. San Diego: USENIX Association, 2001.
  • 3KARAGIANNIS T, BROIDO A, BROWNLEE N, et al. Is P2P dying or just hiding[A]. Proceedings of the IEEE Globecom 2004[C]. Dallas, Texas, 2004.
  • 4MOORE A W, PAPAGIANNAKI K. Toward the accurate identifica- tion of network applications[A]. Proceedings of the 6th Passive and Active Measurement Workshop[C]. Berlin, 2005.
  • 5SEN S, SPATSCHECK O, WANG D. Accurate, scalable in-network identification of P2P traffic using application signatures[A]. The 13th International Conference on World Wide Web[C]. New York, 2004.
  • 6MENA A, HEIDEMANN J. An empirical study of real audio traf- tic[A]. Proceedings of IEEE INFOCOM 2000[C]. Israel, 2000.
  • 7MCGREGOR A, HALL M, LORIER P, et al. Flow clustering using machine learning techniques[J]. Lecture Notes in Computer Science, 2004, 3015: 205-214.
  • 8ROUGHAN M, SEN S, SPATSCHECK O, et al. Class-of-service mapping for QoS: a statistical signature-based approach to IP traffic classification[A]. SIGCOMM 2004[C]. Italy, 2004.
  • 9ZANDER S, NGUYEN T, ARMITAGE G. Self-learning IP traffic classification based on statistical flow characteristics[A]. Proceedings of the 6th International Workshop on Passive and Active Network Measurement[C]. Boston, Masschusetts: Springer-Verlag Berlin, 2005.
  • 10ZANDER S, NGUYEN T, ARMITAGE G Automated traffic classifi- cation and application identification using machine learning[A]. Pro- ceedings of the IEEE 30th Conference on Local Computer Net- works[C]. Washington, DC, 2005.

共引文献17

同被引文献42

引证文献4

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部