期刊文献+
共找到17篇文章
< 1 >
每页显示 20 50 100
Network traffic classification:Techniques,datasets,and challenges
1
作者 Ahmad Azab Mahmoud Khasawneh +2 位作者 Saed Alrabaee Kim-Kwang Raymond Choo Maysa Sarsour 《Digital Communications and Networks》 SCIE CSCD 2024年第3期676-692,共17页
In network traffic classification,it is important to understand the correlation between network traffic and its causal application,protocol,or service group,for example,in facilitating lawful interception,ensuring the... In network traffic classification,it is important to understand the correlation between network traffic and its causal application,protocol,or service group,for example,in facilitating lawful interception,ensuring the quality of service,preventing application choke points,and facilitating malicious behavior identification.In this paper,we review existing network classification techniques,such as port-based identification and those based on deep packet inspection,statistical features in conjunction with machine learning,and deep learning algorithms.We also explain the implementations,advantages,and limitations associated with these techniques.Our review also extends to publicly available datasets used in the literature.Finally,we discuss existing and emerging challenges,as well as future research directions. 展开更多
关键词 network classification Machine learning Deep learning Deep packet inspection Traffic monitoring
下载PDF
A Network Traffic Classification Model Based on Metric Learning 被引量:3
2
作者 Mo Chen Xiaojuan Wang +3 位作者 Mingshu He Lei Jin Khalid Javeed Xiaojun Wang 《Computers, Materials & Continua》 SCIE EI 2020年第8期941-959,共19页
Attacks on websites and network servers are among the most critical threats in network security.Network behavior identification is one of the most effective ways to identify malicious network intrusions.Analyzing abno... Attacks on websites and network servers are among the most critical threats in network security.Network behavior identification is one of the most effective ways to identify malicious network intrusions.Analyzing abnormal network traffic patterns and traffic classification based on labeled network traffic data are among the most effective approaches for network behavior identification.Traditional methods for network traffic classification utilize algorithms such as Naive Bayes,Decision Tree and XGBoost.However,network traffic classification,which is required for network behavior identification,generally suffers from the problem of low accuracy even with the recently proposed deep learning models.To improve network traffic classification accuracy thus improving network intrusion detection rate,this paper proposes a new network traffic classification model,called ArcMargin,which incorporates metric learning into a convolutional neural network(CNN)to make the CNN model more discriminative.ArcMargin maps network traffic samples from the same category more closely while samples from different categories are mapped as far apart as possible.The metric learning regularization feature is called additive angular margin loss,and it is embedded in the object function of traditional CNN models.The proposed ArcMargin model is validated with three datasets and is compared with several other related algorithms.According to a set of classification indicators,the ArcMargin model is proofed to have better performances in both network traffic classification tasks and open-set tasks.Moreover,in open-set tasks,the ArcMargin model can cluster unknown data classes that do not exist in the previous training dataset. 展开更多
关键词 Metric learning ArcMargin network traffic classification CNNS
下载PDF
TDSC-Net:一种基于注意力机制与特征融合的二维恒星光谱分类模型
3
作者 李荣 曹冠龙 +4 位作者 蒲源 邱波 王晓敏 闫静 王坤 《光谱学与光谱分析》 SCIE EI CAS CSCD 北大核心 2024年第7期1968-1973,共6页
面对信噪比较低的天体,传统一维光谱的分类效果很差。因此,从二维光谱出发,提出了结合注意力机制的特征融合模型TDSC-Net(two-dimensional spectra classification network)用于恒星分类。TDSC-Net通过完全相同的特征提取层分别对恒星... 面对信噪比较低的天体,传统一维光谱的分类效果很差。因此,从二维光谱出发,提出了结合注意力机制的特征融合模型TDSC-Net(two-dimensional spectra classification network)用于恒星分类。TDSC-Net通过完全相同的特征提取层分别对恒星蓝端和红端的二维光谱图像进行特征提取,之后针对这些特征进行融合,然后进行分类。本文实验中的恒星光谱数据选自LAMOST(the large sky area multi-object fiber spectroscopic telescope)数据库,预处理采用Z-score进行光谱归一化,以减少由于光谱流量值差别大造成的模型收敛困难问题。使用精确率(Precision)、召回率(Recall)、F1-score和准确率(Accuracy)四个指标来评估模型性能。实验包括:第一部分利用TDSC-Net进行A、F、G、K、M型恒星分类,以验证利用二维光谱对恒星多分类的可靠性;第二部分将二维光谱按照不同的信噪比区间进行分类,以探究信噪比对分类准确率的影响。第一部分的结果表明,进行五分类总的准确率达到84.3%。其中,A、F、G、K、M各自的分类精度分别为87.0%,84.6%,81.2%,87.4%,89.7%,均优于自行抽谱后的一维光谱分类结果。第二部分的结果表明,即使在SNR<30的低信噪比区间,二维光谱分类准确率仍然可以达到78.9%;而当SNR>30之后,信噪比对光谱分类的影响就不明显了。由此证明了低信噪比时使用二维光谱分类的重要性以及TDSC-Net对恒星光谱分类的有效性。 展开更多
关键词 恒星分类 卷积神经网络 注意力机制 Two-dimensional spectra classification network
下载PDF
Network Traffic Signature Generation Mechanism Using Principal Component Analysis
4
作者 牟澄 黄小红 +1 位作者 吴军 马严 《China Communications》 SCIE CSCD 2013年第11期95-106,共12页
The Deep Packet Inspection(DPI)method is a popular method that can accurately identify the flow data and its corresponding application.Currently,the DPI method is widely used in common network management systems.Howev... The Deep Packet Inspection(DPI)method is a popular method that can accurately identify the flow data and its corresponding application.Currently,the DPI method is widely used in common network management systems.However,the major limitation of DPI systems is that their signature library is mainly extracted manually,which makes it hard to efficiently obtain the signature of new applications.Hence,in this paper,we propose an automatic signature extraction mechanism using Principal Component Analysis(PCA)technology,which is able to extract the signature automatically.In the proposed method,the signatures are expressed in the form of serial consistent sequences constructed by principal components instead of normally separated substrings in the original data extracted from the traditional methods.Extensive experiments based on numerous sets of data have been carried out to evaluate the performance of the proposed scheme,and the results prove that the newly proposed method can achieve good performance in terms of accuracy and efficiency. 展开更多
关键词 network traffic classification aut-omatic signature generation deep packet in-spection principal component analysis
下载PDF
Performance of Object Classification Using Zernike Moment
5
作者 Ariffuddin Joret Mohammad Faiz Liew Abdullah +2 位作者 Muhammad Suhaimi Sulong Asmarashid Ponniran Siti Zuraidah Zainudin 《Journal of Electronic Science and Technology》 CAS 2014年第1期90-94,共5页
Moments have been used in all sorts of object classification systems based on image. There are lots of moments studied by many researchers in the area of object classification and one of the most preference moments is... Moments have been used in all sorts of object classification systems based on image. There are lots of moments studied by many researchers in the area of object classification and one of the most preference moments is the Zernike moment. In this paper, the performance of object classification using the Zernike moment has been explored. The classifier based on neural networks has been used in this study. The results indicate the best performance in identifying the aggregate is at 91.4% with a ten orders of the Zernike moment. This encouraging result has shown that the Zernike moment is a suitable moment to be used as a feature of object classification systems. 展开更多
关键词 Features extraction neural network object classification Zernike moment.
下载PDF
Robust signal recognition algorithm based on machine learning in heterogeneous networks
6
作者 Xiaokai Liu Rong Li +1 位作者 Chenglin Zhao Pengbiao Wang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2016年第2期333-342,共10页
There are various heterogeneous networks for terminals to deliver a better quality of service. Signal system recognition and classification contribute a lot to the process. However, in low signal to noise ratio(SNR)... There are various heterogeneous networks for terminals to deliver a better quality of service. Signal system recognition and classification contribute a lot to the process. However, in low signal to noise ratio(SNR) circumstances or under time-varying multipath channels, the majority of the existing algorithms for signal recognition are already facing limitations. In this series, we present a robust signal recognition method based upon the original and latest updated version of the extreme learning machine(ELM) to help users to switch between networks. The ELM utilizes signal characteristics to distinguish systems. The superiority of this algorithm lies in the random choices of hidden nodes and in the fact that it determines the output weights analytically, which result in lower complexity. Theoretically, the algorithm tends to offer a good generalization performance at an extremely fast speed of learning. Moreover, we implement the GSM/WCDMA/LTE models in the Matlab environment by using the Simulink tools. The simulations reveal that the signals can be recognized successfully to achieve a 95% accuracy in a low SNR(0 dB) environment in the time-varying multipath Rayleigh fading channel. 展开更多
关键词 heterogeneous networks automatic signal classification extreme learning machine(ELM) features-extracted Rayleigh fading channel
下载PDF
An Efficient Cyber Security and Intrusion Detection System Using CRSR with PXORP-ECC and LTH-CNN
7
作者 Nouf Saeed Alotaibi 《Computers, Materials & Continua》 SCIE EI 2023年第8期2061-2078,共18页
Intrusion Detection System(IDS)is a network security mechanism that analyses all users’and applications’traffic and detectsmalicious activities in real-time.The existing IDSmethods suffer fromlower accuracy and lack... Intrusion Detection System(IDS)is a network security mechanism that analyses all users’and applications’traffic and detectsmalicious activities in real-time.The existing IDSmethods suffer fromlower accuracy and lack the required level of security to prevent sophisticated attacks.This problem can result in the system being vulnerable to attacks,which can lead to the loss of sensitive data and potential system failure.Therefore,this paper proposes an Intrusion Detection System using Logistic Tanh-based Convolutional Neural Network Classification(LTH-CNN).Here,the Correlation Coefficient based Mayfly Optimization(CC-MA)algorithm is used to extract the input characteristics for the IDS from the input data.Then,the optimized features are utilized by the LTH-CNN,which returns the attacked and non-attacked data.After that,the attacked data is stored in the log file and non-attacked data is mapped to the cyber security and data security phases.To prevent the system from cyber-attack,the Source and Destination IP address is converted into a complex binary format named 1’s Complement Reverse Shift Right(CRSR),where,in the data security phase the sensed data is converted into an encrypted format using Senders Public key Exclusive OR Receivers Public Key-Elliptic Curve Cryptography(PXORP-ECC)Algorithm to improve the data security.TheNetwork Security Laboratory-Knowledge Discovery inDatabases(NSLKDD)dataset and real-time sensor are used to train and evaluate the proposed LTH-CNN.The suggested model is evaluated based on accuracy,sensitivity,and specificity,which outperformed the existing IDS methods,according to the results of the experiments. 展开更多
关键词 Intrusion detection system logistic tanh-based convolutional neural network classification(LTH-CNN) correlation coefficient based mayfly optimization(CC-MA) cyber security
下载PDF
Case study on the extraction of land cover information from the SAR image of a coal mining area 被引量:11
8
作者 HU Zhao-ling LI Hai-quan DU Pei-jun 《Mining Science and Technology》 EI CAS 2009年第6期829-834,共6页
In this study,analyses are conducted on the information features of a construction site,a cornfield and subsidence seeper land in a coal mining area with a synthetic aperture radar (SAR) image of medium resolution. Ba... In this study,analyses are conducted on the information features of a construction site,a cornfield and subsidence seeper land in a coal mining area with a synthetic aperture radar (SAR) image of medium resolution. Based on features of land cover of the coal mining area,on texture feature extraction and a selection method of a gray-level co-occurrence matrix (GLCM) of the SAR image,we propose in this study that the optimum window size for computing the GLCM is an appropriate sized window that can effectively distinguish different types of land cover. Next,a band combination was carried out over the text feature images and the band-filtered SAR image to secure a new multi-band image. After the transformation of the new image with principal component analysis,a classification is conducted selectively on three principal component bands with the most information. Finally,through training and experimenting with the samples,a better three-layered BP neural network was established to classify the SAR image. The results show that,assisted by texture information,the neural network classification improved the accuracy of SAR image classification by 14.6%,compared with a classification by maximum likelihood estimation without texture information. 展开更多
关键词 SAR image gray-level co-occurrence matrix texture feature neural network classification coal mining area
下载PDF
National Comprehensive Cancer Network (NCCN) riSK classification in predicting biochemical recurrence after radical prostatectomy: a retrospective cohort study in Chinese prostate cancer patients 被引量:6
9
作者 Hua Xu Yao Zhu +1 位作者 Bo Dai Ding-Wei Ye 《Asian Journal of Andrology》 SCIE CAS CSCD 2018年第6期551-554,共4页
This study aimed to assess the role of the National Comprehensive Cancer Network (NCCN) risk classification in predicting biochemical recurrence (BCR) after radical prostatectomy (RP) in Chinese prostate cancer ... This study aimed to assess the role of the National Comprehensive Cancer Network (NCCN) risk classification in predicting biochemical recurrence (BCR) after radical prostatectomy (RP) in Chinese prostate cancer patients. We included a consecutive cohort of 385 patients with prostate cancer who underwent RP at Fudan University Shanghai Cancer Center (Shanghai, China) from March 2011 to December 2014. Gleason grade groups were applied at analysis according to the 2014 International Society of Urological Pathology Consensus. Risk groups were stratified according to the NCCN Clinical Practice Guidelines in Oncology: Prostate Cancer version 1, 2017. All 385 patients were divided into BCR and non-BCR groups. The clinicopathological characteristics were compared using an independent sample t-test, Chi-squared test, and Fisher's exact test. BCR-free survival was compared using the log-rank test and multivariable Cox proportional hazard analysis. During median follow-up of 48 months (range: 1-78 months), 31 (8.05%) patients experienced BCR. The BCR group had higher prostate-specific antigen level at diagnosis (46.54 ± 39.58 ng m1-1 vs 21.02 ± 21.06 ng ml-1, P= 0.001), more advanced pT stage (P= 0.002), and higher pN1 rate (P〈 0.001). NCCN risk classification was a significant predictor of BCR {P = 0.0006) and BCR-free survival (P = 0.003) after RP. As NCCN risk level increased, there was a significant decreasing trend in BCR-free survival rate (Ptrend = 0.0002). This study confirmed and validated that NCCN risk classification was a significant predictor of BCR and BCR-free survival after RP. 展开更多
关键词 biochemical recurrence prostate cancer radical prostatectomy National Comprehensive Cancer network risk classification
原文传递
RECOGNITION OF WEAR PARTICLES IN LUBRICATING OIL USING LVQ NEURAL CLASSIFIER
10
作者 王大东 杨德斌 徐金梧 《International Journal of Minerals,Metallurgy and Materials》 SCIE EI CAS CSCD 1996年第1期30+26-30,共6页
A technique for wear particle identification using computer vision system is described. The computer vision system employs LVQ Neural Networks as classifier to recognize the surface texture of wear particles in lubric... A technique for wear particle identification using computer vision system is described. The computer vision system employs LVQ Neural Networks as classifier to recognize the surface texture of wear particles in lubricating oil and determine the conditions of machines. The recognition process includes four stages:(1)capturing image from ferrographies containing wear particles;(2) digitising the image and extracting features;(3) learning the training data selected from the feature data set;(4) identifying the wear particles and generating the result report of machine condition classification. To verify the technique proposed here, the recognition results of several typical classes of wear particles generated at the sliding and rolling surfaces in a diesel engine are presented. 展开更多
关键词 computer vision wear particles ferrographic techniques neural networks texture classification
下载PDF
End-to-end encrypted network traffic classification method based on deep learning 被引量:2
11
作者 Tian Shiming Gong Feixiang +3 位作者 Mo Shuang Li Meng Wu Wenrui Xiao Ding 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2020年第3期21-30,共10页
Network traffic classification,which matches network traffic for a specific class of different granularities,plays a vital role in the domain of network administration and cyber security.With the rapid development of ... Network traffic classification,which matches network traffic for a specific class of different granularities,plays a vital role in the domain of network administration and cyber security.With the rapid development of network communication techniques,more and more network applications adopt encryption techniques during communication,which brings significant challenges to traditional network traffic classification methods.On the one hand,traditional methods mainly depend on matching features on the application layer of the ISO/OSI reference model,which leads to the failure of classifying encrypted traffic.On the other hand,machine learning-based methods require human-made features from network traffic data by human experts,which renders it difficult for them to deal with complex network protocols.In this paper,the convolution attention network(CAT)is proposed to overcom those difficulties.As an end-to-end model,CAT takes raw data as input and returns classification results automatically,with engineering by human experts.In CAT,firstly,the importance of different bytes with an attention mechanism of network traffic is achieved.Then,convolution neural network(CNN)is used to learn features automatically and feed the output into a softmax function to get classification results.It enables CAT to learn enough information from network traffic data and ensure the classified accuracy.Extensive experiments on the public encrypted network traffic dataset ISCX2016 demonstrate the effectiveness of the proposed model. 展开更多
关键词 network traffic classification convolution neural network attention mechanism network management cyber security
原文传递
Method of data cleaning for network traffic classification 被引量:1
12
作者 WANG Ruo-yu LIU Zhen ZHANG Ling 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2014年第3期35-45,共11页
Network traffic classification aims at identifying the application types of network packets. It is important for Internet service providers (ISPs) to manage bandwidth resources and ensure the quality of service for ... Network traffic classification aims at identifying the application types of network packets. It is important for Internet service providers (ISPs) to manage bandwidth resources and ensure the quality of service for different network applications However, most classification techniques using machine learning only focus on high flow accuracy and ignore byte accuracy. The classifier would obtain low classification performance for elephant flows as the imbalance between elephant flows and mice flows on Internet. The elephant flows, however, consume much more bandwidth than mice flows. When the classifier is deployed for traffic policing, the network management system cannot penalize elephant flows and avoid network congestion effectively. This article explores the factors related to low byte accuracy, and secondly, it presents a new traffic classification method to improve byte accuracy at the aid of data cleaning. Experiments are carried out on three groups of real-world traffic datasets, and the method is compared with existing work on the performance of improving byte accuracy. Experiment shows that byte accuracy increased by about 22.31% on average. The method outperforms the existing one in most cases. 展开更多
关键词 network traffic classification byte accuracy elephant flow mice flow machine learning
原文传递
Application of a multilayer feedforward network to voiced-unvoiced-silence classifications of speech
13
作者 QI Yingyong(Department of Speech and Hearing Sciences, University of Arizona , Tucson . Arizona 85721) 《Chinese Journal of Acoustics》 1992年第2期167-178,共12页
A procedure has been developed for making voiced, unvoiced, and silence classifications of speech by using a multilayer feedforward net -work. Speech signals were analyzed sequentially and a feature vector was obtaine... A procedure has been developed for making voiced, unvoiced, and silence classifications of speech by using a multilayer feedforward net -work. Speech signals were analyzed sequentially and a feature vector was obtained for each segment . The feature vector served as input to a 3-layer feedforward network in which voiced, unvoiced, and silence classification was made. The network had a 6-12-3 node architecture and was trained using the generalized delta rule for back propagation of error . The performance of the network was evaluated using speech samples from 3 male and 3 female speakers . A speaker-dependent classification rate of 94.7% and speaker-independent classification rate of 94.3% were obtained. It is concluded that the voiced, unvoiced , and silence classification of speech can be effectively accomplished using a multilayer feedforward network. 展开更多
关键词 work IEEE net Application of a multilayer feedforward network to voiced-unvoiced-silence classifications of speech
原文传递
Two-level hierarchical feature learning for image classification 被引量:3
14
作者 Guang-hui SONG Xiao-gang JIN +1 位作者 Gen-lang CHEN Yan NIE 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2016年第9期897-906,共10页
In some image classification tasks, similarities among different categories are different and the samples are usually misclassified as highly similar categories. To distinguish highly similar categories, more specific... In some image classification tasks, similarities among different categories are different and the samples are usually misclassified as highly similar categories. To distinguish highly similar categories, more specific features are required so that the classifier can improve the classification performance. In this paper, we propose a novel two-level hierarchical feature learning framework based on the deep convolutional neural network(CNN), which is simple and effective. First, the deep feature extractors of different levels are trained using the transfer learning method that fine-tunes the pre-trained deep CNN model toward the new target dataset. Second, the general feature extracted from all the categories and the specific feature extracted from highly similar categories are fused into a feature vector. Then the final feature representation is fed into a linear classifier. Finally, experiments using the Caltech-256, Oxford Flower-102, and Tasmania Coral Point Count(CPC) datasets demonstrate that the expression ability of the deep features resulting from two-level hierarchical feature learning is powerful. Our proposed method effectively increases the classification accuracy in comparison with flat multiple classification methods. 展开更多
关键词 Transfer learning Feature learning Deep convolutional neural network Hierarchical classification Spectral clustering
原文传递
Prediction and analysis of process failures by ANN classification during wire-EDM of Inconel 718
15
作者 Abhilash P.M. Chakradhar D. 《Advances in Manufacturing》 SCIE EI CAS CSCD 2020年第4期519-536,共18页
Wire breakages and spark absence are two typical machining failures that occur during wire electric discharge machining(wire-EDM),if appropriate parameter settings are not maintained.Even after several attempts to opt... Wire breakages and spark absence are two typical machining failures that occur during wire electric discharge machining(wire-EDM),if appropriate parameter settings are not maintained.Even after several attempts to optimize the process,machining failures cannot be eliminated completely.A n offline classification model is presented herein to predict machining failures.The aim of the current study is to develop a multiclass classification model using an artificial neural network(ANN).The training dataset comprises 81 full factorial experiments with three levels of pulse-on time,pulse-off time,servo voltage,and wire feed rate as input parameters.The classes are labeled as normal machining,spark absence,and wire breakage.The model accuracy is tested by conducting 20 confirmation experiments,and the model is discovered to be 95%accurate in classifying the machining outcomes.The effects of process parameters on the process failures are discussed and analyzed.A microstructural analysis of the machined surface and worn wire surface is conducted.The developed model proved to be an easy and fast solution for verifying and eliminating process failures. 展开更多
关键词 Wire electric discharge machining(wire-EDM) Process failure Spark absence Wire breakage Artificial neural network(ANN)classification Failure prediction
原文传递
Network-based naive Bayes model for social network
16
作者 Danyang Huang Guoyu Guan +1 位作者 Jing Zhou Hansheng Wang 《Science China Mathematics》 SCIE CSCD 2018年第4期627-640,共14页
Naive Bayes(NB) is one of the most popular classification methods. It is particularly useful when the dimension of the predictor is high and data are generated independently. In the meanwhile, social network data are ... Naive Bayes(NB) is one of the most popular classification methods. It is particularly useful when the dimension of the predictor is high and data are generated independently. In the meanwhile, social network data are becoming increasingly accessible, due to the fast development of various social network services and websites. By contrast, data generated by a social network are most likely to be dependent. The dependency is mainly determined by their social network relationships. Then, how to extend the classical NB method to social network data becomes a problem of great interest. To this end, we propose here a network-based naive Bayes(NNB) method, which generalizes the classical NB model to social network data. The key advantage of the NNB method is that it takes the network relationships into consideration. The computational efficiency makes the NNB method even feasible in large scale social networks. The statistical properties of the NNB model are theoretically investigated. Simulation studies have been conducted to demonstrate its finite sample performance.A real data example is also analyzed for illustration purpose. 展开更多
关键词 classification naive Bayes Sina Weibo social network data
原文传递
Identifying online traffic based on property of TCP flow 被引量:3
17
作者 HONG Min-huo,GU Ren-tao,WANG Hong-xiang,SUN Yong-mei,JI Yue-feng Key Laboratory of Optical Communications and Lightwave Technologies,Beijing University of Posts and Telecommunications,Beijing 100876,China 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2009年第3期84-88,共5页
Classification of network traffic using port-based or payload-based analysis is becoming increasingly difficult when many applications use dynamic port numbers, masquerading techniques, and encryption to avoid detecti... Classification of network traffic using port-based or payload-based analysis is becoming increasingly difficult when many applications use dynamic port numbers, masquerading techniques, and encryption to avoid detection. In this article, an approach is presented for online traffic classification relying on the observation of the first n packets of a transmission control protocol (TCP) connection. Its key idea is to utilize the properties of the observed first ten packets of a TCP connection and Bayesian network method to build a classifier. This classifier can classify TCP flows dynamically as packets pass through it by deciding whether a TCP flow belongs to a given application. The experimental results show that the proposed approach performs well in online Internet traffic classification and that it is superior to naive Bayesian method. 展开更多
关键词 network traffic classification inter-arrival time TCP flow Bayesian network
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部