For access to this article, please select a purchase option:

Buy chapter PDF
(plus tax if applicable)
Buy Knowledge Pack
10 chapters for $120.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Your details
Why are you recommending this title?
Select reason:
Network Classification for Traffic Management: Anomaly detection, feature selection, clustering and classification — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Network traffic classification has the potential to resolve key issues for network operators, including network management problems, quality of service provisioning, Internet accounting and charging, and lawful interception [1]. The traditional network classification techniques that rely mostly on well-known port numbers have been used to identify Internet traffic. Such an approach was successful because traditional applications used fixed port numbers; however [9,10] show that the current generations of peer-to-peer (P2P) applications try to hide their traffic by using dynamic port numbers. Consequently, applications whose port numbers are unknown cannot be identified in advance.

Chapter Contents:

  • 11 Conclusion
  • 11.1 Contribution
  • 11.2 Future work

Inspec keywords: peer-to-peer computing; Internet; telecommunication traffic; telecommunication network management; computer network management

Other keywords: lawful interception; traditional network classification techniques; traditional applications; Internet traffic; dynamic port numbers; network operators; well-known port numbers; network management problems; network traffic classification; service provisioning; peer-to-peer applications

Subjects: Information networks; Network management; Other computer networks; Computer communications; Computer networks and techniques

Preview this chapter:
Zoom in

Conclusion, Page 1 of 2

| /docserver/preview/fulltext/books/pc/pbpc032e/PBPC032E_ch11-1.gif /docserver/preview/fulltext/books/pc/pbpc032e/PBPC032E_ch11-2.gif

Related content

This is a required field
Please enter a valid email address