http://iet.metastore.ingenta.com
1887

## Introduction

• Author(s):
• DOI:

$16.00 (plus tax if applicable) ##### Buy Knowledge Pack 10 chapters for$120.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:

Network Classification for Traffic Management: Anomaly detection, feature selection, clustering and classification — Recommend this title to your library

## Thank you

In recent years, knowing what information is passing through the networks is rapidly becoming more and more complex due to the ever-growing list of applications shaping today's Internet traffic. Consequently, traffic monitoring and analysis have become crucial for tasks ranging from intrusion detection, traffic engineering to capacity planning. Network traffic classification is the process of analyzing the nature of the traffic flows on the networks, and it classifies these flows mainly on the basis of protocols (e.g., TCP, UDP, and IMAP) orby different classes of applications (e.g., HTTP, peer-to-peer (P2P), and Games). Network traffic classification has the capability to address fundamentals to numerous network-management activities for Internet Service Providers (ISPs) and their equipment vendors for better quality of service (QoS) treatment. In particular, network operators need an accurate and efficient classification of traffic for effective network planning and design, applications prioritization, traffic shaping/policing, and security control. It is essential that network operators understand the trends in their networks so that they can react quickly to support their business goals. Traffic classification can also be a part of intrusion detection systems (IDS), where the main goal of such systems is to detect a wide range of unusual or anomalous events and to block unwanted traffic.

Chapter Contents:

• 1.1 Importance of network traffic classification
• 1.2 Limitations of existing solutions
• 1.3 Research challenges
• 1.4 Suggested solutions
• 1.5 Book organization

Preview this chapter:

Introduction, Page 1 of 2

| /docserver/preview/fulltext/books/pc/pbpc032e/PBPC032E_ch1-1.gif /docserver/preview/fulltext/books/pc/pbpc032e/PBPC032E_ch1-2.gif

### Related content

content/books/10.1049/pbpc032e_ch1
pub_keyword,iet_inspecKeyword,pub_concept
6
6
This is a required field