Network traffic policy verification is the analysis of network traffic to determine if the observed traffic is in compliance or violation of the applied policy. An intuitive approach is the use of machine learning techniques based on specific network traffic characteristics. These traffic characteristics are also known as features, which have to be extracted and selected carefully to build robust and accurate learning models. Thus, finding the best possible learning model in combination with extracting the best possible feature-set is a necessary requirement to design accurate traffic classification models. While feature selection can be automated to find the best subset of a given set of features, there are no known mechanisms to solve the problem of feature extraction. Thus, extracting the best possible features has to be done empirically. In this work we present a framework to simplify the empirical model selection and feature extraction process.
%0 Conference Paper
%1 1396600
%A Teufl, Peter
%A Payer, Udo
%A Amling, Michael
%A Godec, Martin
%A Ruff, Stefan
%A Scheikl, Gerhard
%A Walzl, Gernot
%B ICN '08: Proceedings of the Seventh International Conference on Networking (icn 2008)
%C Washington, DC, USA
%D 2008
%I IEEE Computer Society
%K Classification Network Traffic
%P 439--444
%R http://dx.doi.org/10.1109/ICN.2008.42
%T InFeCT - Network Traffic Classification
%U http://portal.acm.org/citation.cfm?id=1396381.1396600&coll=&dl=
%X Network traffic policy verification is the analysis of network traffic to determine if the observed traffic is in compliance or violation of the applied policy. An intuitive approach is the use of machine learning techniques based on specific network traffic characteristics. These traffic characteristics are also known as features, which have to be extracted and selected carefully to build robust and accurate learning models. Thus, finding the best possible learning model in combination with extracting the best possible feature-set is a necessary requirement to design accurate traffic classification models. While feature selection can be automated to find the best subset of a given set of features, there are no known mechanisms to solve the problem of feature extraction. Thus, extracting the best possible features has to be done empirically. In this work we present a framework to simplify the empirical model selection and feature extraction process.
%@ 978-0-7695-3106-9
@inproceedings{1396600,
abstract = {Network traffic policy verification is the analysis of network traffic to determine if the observed traffic is in compliance or violation of the applied policy. An intuitive approach is the use of machine learning techniques based on specific network traffic characteristics. These traffic characteristics are also known as features, which have to be extracted and selected carefully to build robust and accurate learning models. Thus, finding the best possible learning model in combination with extracting the best possible feature-set is a necessary requirement to design accurate traffic classification models. While feature selection can be automated to find the best subset of a given set of features, there are no known mechanisms to solve the problem of feature extraction. Thus, extracting the best possible features has to be done empirically. In this work we present a framework to simplify the empirical model selection and feature extraction process.},
added-at = {2009-02-13T07:20:45.000+0100},
address = {Washington, DC, USA},
author = {Teufl, Peter and Payer, Udo and Amling, Michael and Godec, Martin and Ruff, Stefan and Scheikl, Gerhard and Walzl, Gernot},
biburl = {https://www.bibsonomy.org/bibtex/2dc1e8d9662b379ede9bc7f9006e020e4/flykeysky},
booktitle = {ICN '08: Proceedings of the Seventh International Conference on Networking (icn 2008)},
description = {InFeCT - Network Traffic Classification},
doi = {http://dx.doi.org/10.1109/ICN.2008.42},
interhash = {e5eacc11013194f269bfb89e5f58ebae},
intrahash = {dc1e8d9662b379ede9bc7f9006e020e4},
isbn = {978-0-7695-3106-9},
keywords = {Classification Network Traffic},
pages = {439--444},
publisher = {IEEE Computer Society},
timestamp = {2009-02-13T07:20:46.000+0100},
title = {InFeCT - Network Traffic Classification},
url = {http://portal.acm.org/citation.cfm?id=1396381.1396600&coll=&dl=},
year = 2008
}