Statistical Analysis of Network Traffic Techniques Using ML &Deep Learning Algorithms

Authors

  • ShrawanKumar Pandey, Bhupchand Kumhar, Nishchay Kumar, Trilok Rawat, Devendra Singh Mohan

Keywords:

Network traffic, Machine learning, deep learning, anova one way

Abstract

The article is under the relationship of network traffic and using ML with deep learning for crucial for the classification of network traffic. This can help with lawful interceptions, maintain service quality, avoid identify characters. Furthermore, it exits the organization characterization strategies, for example, port-put together recognizable proof and those based with respect to profound bundle examination, factual elements related to AI, and profound learning calculations. In addition, we describe the applications, benefits, and drawbacks of these methods. Datasets used in the literature are also included in our analysis. Furthermore, we discussed about upcoming research directions as well as current and upcoming difficulties by using once way anova classification for the validity of the model.

Downloads

Download data is not yet available.

Author Biography

ShrawanKumar Pandey, Bhupchand Kumhar, Nishchay Kumar, Trilok Rawat, Devendra Singh Mohan

ShrawanKumar Pandey1, Bhupchand Kumhar2, Nishchay Kumar3, Trilok Rawat4, Devendra Singh Mohan5

1Buddha Institute of Technology, Gorakhpur   shrawan458@bit.ac.in

2IES College of Technology & Management IES University Bhopal,  bhupandra_sati09@yahoo.com

3Asia Pacific Institute of Information Technology SD India Panipat  nishchay@apiit.edu.in

4Echelon Institute of Technology, Faridabad trilokrawat@eitfaridabad.co.in

5IIMT College of Engineering Greater Noida   dev.mamo@gmail.om

 

References

S. AlDaajeh, H. Saleous, S. Alrabaee, E. Barka, F. Breitinger,K.-K. R. Choo, The role of national cybersecurity strategieson the improvement of cybersecurity education, Computers&Security(2022)102754.

A. Azab, Packing resistant solution to group malware bina-ries, International Journal of Security and Networks 15 (3)(2020)123–132.

S. Alrabaee, A stratified approach to function fingerprintingin program binaries using diverse features, Expert SystemswithApplications193(2022)116384.

S. Alrabaee, M. Debbabi, L. Wang, A survey of binary codefingerprinting approaches:Taxonomy, methodologies, andfeatures, ACM Computing Surveys (CSUR) 55 (1) (2022)1–41.

M.Finsterbusch,C.Richter, E.Rocha, J.-A.Muller,

K. Hanssgen, A survey of payload-based traffic classificationapproaches,IEEECommunicationsSurveysTutorials16(2)(2014)1135–1156.doi:10.1109/SURV.2013.100613.00161.

O. Salman, I. H. Elhajj, A. Kayssi, A. Chehab, A review on machine learning–based approaches for internet traffic classification, Annals of Telecommunications 75 (11) (2020) 673–710.

H. Tahaei, F. Afifi, A. Asemi, F. Zaki, N. B. Anuar, The rise of traffic classification in iot networks: A survey, Journal of Network and Computer Applications 154 (2020) 102538. doi:https://doi.org/10.1016/j.jnca.2020.102538.

N.Hubballi,M.Swarnkar,$bitcoding$:Networktraf-ficclassificationthroughencodedbitlevelsignatures,IEEE/ACMTrans.Netw.26(5)(2018)2334–2346.doi:10.1109/TNET.2018.2868816.

N. Hubballi, M. Swarnkar, M. Conti, Bitprob: Probabilistic bit signatures for accurate application identification, IEEE Transactions on Network and Service Management 17 (3) (2020) 1730–1741. doi:10.1109/TNSM.2020.2999856.

G. Sun, T. Chen, Y. Su, C. Li, Internet traffic classificationbased on incremental support vector machines, Mobile Net-worksandApplications23(4)(2018)789–796.

S.Dong,MulticlassSVMalgorithmwithactivelearningfornetwork traffic classification, Expert Systems with Applica-tions 176 (2021) 114885.doi:https://doi.org/10.1016/j.eswa.2021.114885.

A. Azab, The effectiveness of cost sensitive machine learningalgorithms in classifying zeus flows, Journal of InformationandComputerSecurity17(3-4)(2021)332–350,(InPress).doi:10.1504/IJICS.2020.10026851.

A.Fahad,A.Almalawi,Z.Tari,K.Alharthi,F.S.AlQahtani,

M. Cheriet, Semtra:A semi-supervised approach to trafficflow labeling with minimal human effort, Pattern Recogni-tion 91 (2019) 1–12.doi:https://doi.org/10.1016/j.patcog.2019.02.001.

M. A. Lopez,D. M. Mattos,O. C. M. Duarte,G. Pujolle,Afastunsupervisedpreprocessingmethodfornetworkmon-itoring, Annals of Telecommunications 74 (3) (2019) 139–155.

G. Aceto, D. Ciuonzo, A. Montieri, A. Pescapè, Mimetic:Mobileencryptedtrafficclassificationusingmultimodaldeeplearning,Computernetworks165(2019)106944.

G.Aceto,D.Ciuonzo,A.Montieri,A.Pescapé,To-wardeffectivemobileencryptedtrafficclassificationthroughdeeplearning,Neurocomputing409(2020)306–315.doi:https://doi.org/10.1016/j.neucom.2020.05.036.

G. Aceto, D. Ciuonzo, A. Montieri, A. Pescapè, Mimetic:Mobileencryptedtrafficclassificationusingmultimodaldeeplearning,ComputerNetworks165(2019)106944.doi:https://doi.org/10.1016/j.comnet.2019.106944.

Kumar, V. and Kumar, R., 2015. An adaptive approach for detection of blackhole attack in mobile ad hoc network. Procedia Computer Science, 48, pp.472-479.

Kumar, V. and Kumar, R., 2015, April. Detection of phishing attack using visual cryptography in ad hoc network. In 2015 International Conference on Communications and Signal Processing (ICCSP) (pp. 1021-1025). IEEE.

Kumar, V. and Kumar, R., 2015. An optimal authentication protocol using certificateless ID-based signature in MANET. In Security in Computing and Communications: Third International Symposium, SSCC 2015, Kochi, India, August 10-13, 2015. Proceedings 3 (pp. 110-121). Springer International Publishing.

Kumar, Vimal, and Rakesh Kumar. "A cooperative black hole node detection and mitigation approach for MANETs." In Innovative Security Solutions for Information Technology and Communications: 8th International Conference, SECITC 2015, Bucharest, Romania, June 11-12, 2015. Revised Selected Papers 8, pp. 171-183. Springer International Publishing, 2015.

Kumar, V., Shankar, M., Tripathi, A.M., Yadav, V., Rai, A.K., Khan, U. and Rahul, M., 2022. Prevention of Blackhole Attack in MANET using Certificateless Signature Scheme. Journal of Scientific & Industrial Research, 81(10), pp.1061-1072.

Pentyala, S., Liu, M., & Dreyer, M. (2019). Multi-task networks with universe, group, and task feature learning. arXiv preprint arXiv:1907.01791.

Srivastava, Swapnita, and P. K. Singh. "Proof of Optimality based on Greedy Algorithm for Offline Cache Replacement Algorithm." International Journal of Next-Generation Computing 13.3 (2022).

Smiti, Puja, Swapnita Srivastava, and Nitin Rakesh. "Video and audio streaming issues in multimedia application." 2018 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence). IEEE, 2018.

Srivastava, Swapnita, and P. K. Singh. "HCIP: Hybrid Short Long History Table-based Cache Instruction Prefetcher." International Journal of Next-Generation Computing 13.3 (2022).

Srivastava, Swapnita, and Shilpi Sharma. "Analysis of cyber related issues by implementing data mining Algorithm." 2019 9th International Conference on Cloud Computing, Data Science & Engineering (Confluence). IEEE, 2019.

P Mall and P. Singh, “Credence-Net: a semi-supervised deep learning approach for medical images,” Int. J. Nanotechnol., vol. 20, 2022.

Narayan, Vipul, et al. "Deep Learning Approaches for Human Gait Recognition: A Review." 2023 International Conference on Artificial Intelligence and Smart Communication (AISC). IEEE, 2023.

Narayan, Vipul, et al. "FuzzyNet: Medical Image Classification based on GLCM Texture Feature." 2023 International Conference on Artificial Intelligence and Smart Communication (AISC). IEEE, 2023.

"Keyboard invariant biometric authentication." 2018 4th International Conference on Computational Intelligence & Communication Technology (CICT). IEEE, 2018.

Mall, Pawan Kumar, et al. "Early Warning Signs Of Parkinson’s Disease Prediction Using Machine Learning Technique." Journal of Pharmaceutical Negative Results (2023): 2607-2615.

Pentyala, S., Liu, M., & Dreyer, M. (2019). Multi-task networks with universe, group, and task feature learning. arXiv preprint arXiv:1907.01791.

Choudhary, Shubham, et al. "Fuzzy approach-based stable energy-efficient AODV routing protocol in mobile ad hoc networks." Software Defined Networking for Ad Hoc Networks. Cham: Springer International Publishing, 2022. 125-139.

The structure of maximum pooling model

Downloads

Published

16.04.2023

How to Cite

ShrawanKumar Pandey, Bhupchand Kumhar, Nishchay Kumar, Trilok Rawat, Devendra Singh Mohan. (2023). Statistical Analysis of Network Traffic Techniques Using ML &Deep Learning Algorithms. International Journal of Intelligent Systems and Applications in Engineering, 11(5s), 273–279. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/2775