For access to this article, please select a purchase option:

Buy chapter PDF
(plus tax if applicable)
Buy Knowledge Pack
10 chapters for $120.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Your details
Why are you recommending this title?
Select reason:
Network Classification for Traffic Management: Anomaly detection, feature selection, clustering and classification — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

In recent years, knowing what information is passing through the networks is rapidly becoming more and more complex due to the ever-growing list of applications shaping today's Internet traffic. Consequently, traffic monitoring and analysis have become crucial for tasks ranging from intrusion detection, traffic engineering to capacity planning. Network traffic classification is the process of analyzing the nature of the traffic flows on the networks, and it classifies these flows mainly on the basis of protocols (e.g., TCP, UDP, and IMAP) orby different classes of applications (e.g., HTTP, peer-to-peer (P2P), and Games). Network traffic classification has the capability to address fundamentals to numerous network-management activities for Internet Service Providers (ISPs) and their equipment vendors for better quality of service (QoS) treatment. In particular, network operators need an accurate and efficient classification of traffic for effective network planning and design, applications prioritization, traffic shaping/policing, and security control. It is essential that network operators understand the trends in their networks so that they can react quickly to support their business goals. Traffic classification can also be a part of intrusion detection systems (IDS), where the main goal of such systems is to detect a wide range of unusual or anomalous events and to block unwanted traffic.

Chapter Contents:

  • 1.1 Importance of network traffic classification
  • 1.2 Limitations of existing solutions
  • 1.3 Research challenges
  • 1.4 Suggested solutions
  • 1.5 Book organization

Inspec keywords: telecommunication traffic; transport protocols; computer network security; quality of service; telecommunication network planning; peer-to-peer computing; computer network management; Internet; pattern classification

Other keywords: network traffic classification; network-management activities; traffic engineering; Internet Service Providers; Internet traffic; effective network planning; network operators; traffic monitoring; unwanted traffic; traffic flows

Subjects: Data security; Network management; Computer communications; Protocols; Communication network design, planning and routing; Other computer networks; Protocols

Preview this chapter:
Zoom in

Introduction, Page 1 of 2

| /docserver/preview/fulltext/books/pc/pbpc032e/PBPC032E_ch1-1.gif /docserver/preview/fulltext/books/pc/pbpc032e/PBPC032E_ch1-2.gif

Related content

This is a required field
Please enter a valid email address