SlideShare a Scribd company logo
1 of 3
Download to read offline
Singh Jaskirat, Saini Kaur Harpreet, International Journal of Advance research , Ideas and Innovations in Technology.
© 2016, IJARIIT All Rights Reserved Page | 1
ISSN: 2454-132X
(Volume2, Issue5)
Available online at: www.Ijariit.com
A Review on Traffic Classification Methods in WSN
Jaskirat Singh*
Harpreet Kaur Saini**
*
Department of Electronics and
Communication Engineering, Doaba Institute
of Engineering and Technology, Ghataur
(Punjab)
**Department of Electronics and
Communication Engineering, Doaba Institute
of Engineering and Technology, Ghataur
(Punjab)
hunjan.jaskirat@gmail.com saini.kim3@gmail.com
Abstract— In a wireless network it is very important to provide the network security and quality of service. To achieve these
parameters there must be proper traffic classification in the wireless network. There are many algorithms used such as port
number, deep packet inspection as the earlier methods and now days KISS, nearest cluster based classifier (NCC), SVM
method and used to classify the traffic and improve the network security and quality of service of a network.
Keywords— Traffic classification, Network security, SVM, Deep packet inspection.
I. INTRODUCTION
In a wireless network traffic classification and unknown flow detection methods are used to solve the networking issues such as
security, congestion, intrusion detection and quality of service issues [3]. A number of supervised classification algorithms and
unsupervised clustering algorithms have been applied to network traffic classification. In supervised traffic classification the flow
classification model is learned from the labeled training samples of each predefined traffic class. But sometimes existing traffic
classification methods suffer from poor performance in the crucial situation where more and more new/unknown applications are
emerging in the cloud computing based environment [5]. In this paper, we aim to tackle the problem of unknown flows in a
WSN.This work considers very few labeled training samples and investigates flow correlation in real world network environment,
which makes it better to the previous works.
Another approach that is presented is KISS algorithm. It a novel classifier explicitly targeting UDP traffic that couples the
stochastic description of application protocols with the discrimination power of Support Vector Machines. Signatures are extracted
from a traffic stream by the means of Chi-square like test that allows application protocol format to emerge, while ignoring protocol
synchronization and semantic rules. A decision process based on Support Vector Machine is then used to classify the extracted
signatures, leading to exceptional performance. Performance of KISS has been tested in different scenarios, considering both data,
VoIP, traditional P2P applications and novel P2PTV systems [3]. This work considers very few labeled training samples and
investigates flow correlation in real world network environment, which makes it better to the previous works.
II. RELATED WORK
A. K-MEANS CLUSTERING ALGORITHM
The paper on Mining Unclassified Traffic using Automatic Clustering Techniques discusses the, several traffic classification
techniques have been proposed in the last years. In the beginning port-based approaches were mainly used; however, the
characteristics of many nowadays applications that employ randomly chosen ports, significantly reduce the effectiveness of these
approaches. Those are today abandoned in favor of deep packet inspection (DPI) or behavioral techniques. This helped us revealing
40% of the traffic that we could not classify with the previous used classifiers. Second, the algorithm can reveal the born of new
applications, as well as the changes of existing ones.
B. KISS: STOCHASTIC PACKET INSPECTION CLASSIFIER
The paper on KISS: Stochastic Packet Inspection Classifier [3] discuss about the method KISS, a novel Internet classification engine.
Singh Jaskirat, Saini Kaur Harpreet, International Journal of Advance research , Ideas and Innovations in Technology.
© 2016, IJARIIT All Rights Reserved Page | 2
Motivated by the expected raise of UDP traffic, which stems from the momentum of P2P streaming applications, a novel
classification framework which leverages on statistical characterization of payload. Statistical signatures are derived by the means of
a Chi-Square like test, which extracts the protocol “format”, but ignores the protocol “semantic” and “synchronization” rules. The
signatures feed a decision process based either on the geometric distance among samples, or on Support Vector Machines. KISS is
very accurate, and its signatures are intrinsically robust to packet sampling, reordering, and flow asymmetry, so that this algorithm
can be used on almost any network. KISS is tested in different scenarios, considering traditional client-server protocols, VoIP and
both traditional and new P2PInternet applications. The average True Positive percentage is 99.6%, and in the worst case equal 98.1%.
Fig. 1 KISS algorithm
C. SUPPORT VECTOR MACHINES (SVM) BASED TRAFFIC CLASSIFIER
The paper A Survey on Recent Traffic Classification Techniques Using Machine Learning Methods [4], an approach to traffic
classification is proposed which is based on SVM, that approach is used to solve the mutli-class problem that arises in SVM, classify
network traffic and apply optimization algorithm to make classifier perform properly even with a bad training set for hundreds of
samples. It is one of the most promising ML tools, a binary classifier suitable for solving high dimensional feature space and small
training set size problems. This approach uses flow representation that describes the statistical characteristics of application protocol
through monitoring node whose duty is to assign flows to the concerned application classes it was trained with or with unknown class.
It considers bidirectional flows only, which follows proper TCP three way handshakes and proper termination. After packets are
captured, each flow is mapped to feature values which are based on packet’s length to determine which application the packet belongs
to. The main feature of this proposed classifier is based on packet size as it is being captured on the application layer. By the use of
this classifier accuracy is very good with True Positive of 90%.
Fig 2 Support Vector Machines (SVM) based traffic classifier
D. NAIVE BAYESIAN AND BAYESIAN NEURAL NETWORK BASED TRAFFIC CLASSIFICATION
It is a traffic classifier that can achieve a high accuracy across a range of application types without any source or destination Host-
address or port information can be designed using supervised machine learning based on a Bayesian trained neural network. Bayesian
neural network (NN) based traffic classifier [6] can produce more accurate results compared to naïve Bayesian traffic classifier. The
Bayesian framework using a neural network model allows identification of traffic without using any port or host information. A
Singh Jaskirat, Saini Kaur Harpreet, International Journal of Advance research , Ideas and Innovations in Technology.
© 2016, IJARIIT All Rights Reserved Page | 3
classification accuracy of over 99% can be achieved when training and testing on homogeneous traffic from the same site on the same
day.
E. EFFICIENT FLOW BASED NETWORK TRAFFIC CLASSIFICATION USING MACHINE LEARNING
Traffic classification based on their generation applications has a very important role to play in network security and management.
The port-based prediction methods and payload-based deep inspection methods comes under Traditional methods. The standard
strategies in current network environment suffer from variety of privacy issues, dynamic ports and encrypted applications. Recent
research efforts are focused on traffic classification and Machine Learning Techniques are used for classification. This paper conducts
a flow based traffic classification and comparison on the various Machine Learning (ML) techniques such as C4.5, Naïve Bayes,
Nearest Neighbor, and RBF for IP traffic classification. From this C4.5 Decision Tree gives 93.33% accuracy compare with other
algorithms. The two methods are used Full Feature selection and reduced feature set for classification. From this classification the
reduced feature selection gives good result.
III.OBJECTIVES
We are aiming to find a novel approach for traffic classification, which can improve the classification performance effectively. The
problem at hand is to detect the malicious traffic flow in the network and work out a new route which is free from the faulty nodes. In
the beginning we have to design a network that contains nodes (some good nodes and some bad nodes). Then we have to make a flow
from one point to the point. In this way with the help of previous used methods we will try to get better results and more accuracy
then the earlier used methods.
IV.PLANNING OF WORK
In the planning firstly we have to design a network that contains the sensor nodes in the particular described area. Then we have to
find that how many among then are proper and how many of them have some issues due to which they will be unable to participate
during the transmission/ requirement time. Then to develop a path that follows the shortest path and ignore the sensor nodes that are
not participating. As well as shortest path we have to achieve the maximum efficiency during this traffic classification.
V. ACKNOWLEGEMENT
The authors are thankful to Mrs. Maninder kaur, M.tech coordinator, DIET and her staff for providing the necessary facilities for the
preparation of the paper. Without the proper guidance of them it is not possible to learn about latest technologies and research works.
REFERENCES
[1]J. Zhang, Y. Xiang, Y. Wang,W. Zhou, Y. Xiang, and Y. Guan, “Network traffic classification using correlation information,” IEEE Trans. Parallel
Distributed. Syst., vol. 24, no. 1, pp. 104–117, Jan. 2013.
[2] A. Finamore, M. Mellia, and M. Meo, “Mining unclassified traffic using automatic clustering techniques,” in Proc. 2011 TMA International Workshop
on Traffic Monitoring and Analysis, pp. 150–163.
[3] A. Finamore, M. Mellia, M. Meo, and D. Rossi, “KISS: stochastic packet inspection classifier for UDP traffic,” IEEE/ACM Trans. Netw., vol. 18, no. 5,
pp. 1505–1515, Oct. 2010.
[4] T. T. Nguyen and G. Armitage, “A survey of techniques for internet traffic classification using machine learning,” IEEE Common. Surveys& Tutorials,
vol. 10, no. 4, pp. 56–76, Fourth Quarter 2008.
[5] J. Erman, A. Mahanti, and M. Arlitt, “Internet traffic identification using machine learning,” in Proc. 2006 IEEE Global Telecommunications Conference,
pp. 1–6.
[6] A. W. Moore and D. Zuev, “Internet traffic classification using Bayesian analysis techniques,” SIGMETRICS Perform. Eval. Rev., vol. 33, pp. 50–60,
June 2005.

More Related Content

What's hot

Deterministic AODV Routing Protocol for Vehicular Ad-Hoc Network
Deterministic AODV Routing Protocol for Vehicular Ad-Hoc NetworkDeterministic AODV Routing Protocol for Vehicular Ad-Hoc Network
Deterministic AODV Routing Protocol for Vehicular Ad-Hoc Network
paperpublications3
 
Volume 2-issue-6-1987-1992
Volume 2-issue-6-1987-1992Volume 2-issue-6-1987-1992
Volume 2-issue-6-1987-1992
Editor IJARCET
 

What's hot (20)

M phil-computer-science-networking-projects
M phil-computer-science-networking-projectsM phil-computer-science-networking-projects
M phil-computer-science-networking-projects
 
M phil-computer-science-network-security-projects
M phil-computer-science-network-security-projectsM phil-computer-science-network-security-projects
M phil-computer-science-network-security-projects
 
IEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsIEEE 2015 NS2 Projects
IEEE 2015 NS2 Projects
 
M.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing ProjectsM.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing Projects
 
IEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsIEEE 2015 NS2 Projects
IEEE 2015 NS2 Projects
 
A vertical handover decision approaches in next generation wireless networks ...
A vertical handover decision approaches in next generation wireless networks ...A vertical handover decision approaches in next generation wireless networks ...
A vertical handover decision approaches in next generation wireless networks ...
 
Deterministic AODV Routing Protocol for Vehicular Ad-Hoc Network
Deterministic AODV Routing Protocol for Vehicular Ad-Hoc NetworkDeterministic AODV Routing Protocol for Vehicular Ad-Hoc Network
Deterministic AODV Routing Protocol for Vehicular Ad-Hoc Network
 
Reliable and Efficient Routing in WLAN
Reliable and Efficient Routing in WLANReliable and Efficient Routing in WLAN
Reliable and Efficient Routing in WLAN
 
Maximizing Efficiency Of multiple–Path Source Routing in Presence of Jammer
Maximizing Efficiency Of multiple–Path Source Routing in Presence of JammerMaximizing Efficiency Of multiple–Path Source Routing in Presence of Jammer
Maximizing Efficiency Of multiple–Path Source Routing in Presence of Jammer
 
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloud
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with CloudEfficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloud
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloud
 
Java and .net IEEE 2012
Java and .net IEEE 2012Java and .net IEEE 2012
Java and .net IEEE 2012
 
Vol 11 No 1 - March 2014
Vol 11 No 1 - March 2014Vol 11 No 1 - March 2014
Vol 11 No 1 - March 2014
 
Communication cost minimization in wireless sensor and actor networks for roa...
Communication cost minimization in wireless sensor and actor networks for roa...Communication cost minimization in wireless sensor and actor networks for roa...
Communication cost minimization in wireless sensor and actor networks for roa...
 
Modified PREQ in HWMP for Congestion Avoidance in Wireless Mesh Network
Modified PREQ in HWMP for Congestion Avoidance in Wireless Mesh NetworkModified PREQ in HWMP for Congestion Avoidance in Wireless Mesh Network
Modified PREQ in HWMP for Congestion Avoidance in Wireless Mesh Network
 
Volume 2-issue-6-1987-1992
Volume 2-issue-6-1987-1992Volume 2-issue-6-1987-1992
Volume 2-issue-6-1987-1992
 
An effective transmit packet coding with trust-based relay nodes in VANETs
An effective transmit packet coding with trust-based relay nodes in VANETsAn effective transmit packet coding with trust-based relay nodes in VANETs
An effective transmit packet coding with trust-based relay nodes in VANETs
 
M.Phil Computer Science Mobile Computing Projects
M.Phil Computer Science Mobile Computing ProjectsM.Phil Computer Science Mobile Computing Projects
M.Phil Computer Science Mobile Computing Projects
 
A Generic Open Source Framework for Auto Generation of Data Manipulation Comm...
A Generic Open Source Framework for Auto Generation of Data Manipulation Comm...A Generic Open Source Framework for Auto Generation of Data Manipulation Comm...
A Generic Open Source Framework for Auto Generation of Data Manipulation Comm...
 
Hybrid Periodical Flooding in Unstructured Peer-to-Peer Networks
Hybrid Periodical Flooding in Unstructured Peer-to-Peer NetworksHybrid Periodical Flooding in Unstructured Peer-to-Peer Networks
Hybrid Periodical Flooding in Unstructured Peer-to-Peer Networks
 
Security based Clock Synchronization technique in Wireless Sensor Network for...
Security based Clock Synchronization technique in Wireless Sensor Network for...Security based Clock Synchronization technique in Wireless Sensor Network for...
Security based Clock Synchronization technique in Wireless Sensor Network for...
 

Viewers also liked

Postroenie kompleksnoj sistemy obespechenija informacionnoj bezopasnosti v vi...
Postroenie kompleksnoj sistemy obespechenija informacionnoj bezopasnosti v vi...Postroenie kompleksnoj sistemy obespechenija informacionnoj bezopasnosti v vi...
Postroenie kompleksnoj sistemy obespechenija informacionnoj bezopasnosti v vi...
vGate R2
 
Презентация с Форума ИБ Директоров 16 апреля 2012г. "Безопасность инфраструкт...
Презентация с Форума ИБ Директоров 16 апреля 2012г. "Безопасность инфраструкт...Презентация с Форума ИБ Директоров 16 апреля 2012г. "Безопасность инфраструкт...
Презентация с Форума ИБ Директоров 16 апреля 2012г. "Безопасность инфраструкт...
Максим Федотенко
 
Безопасность ЦОД-часть 1
Безопасность ЦОД-часть 1Безопасность ЦОД-часть 1
Безопасность ЦОД-часть 1
Cisco Russia
 
Hypervisor and VDI security
Hypervisor and VDI securityHypervisor and VDI security
Hypervisor and VDI security
Denis Gundarev
 

Viewers also liked (12)

V center configuration manager customer facing technical presentation
V center configuration manager   customer facing technical presentationV center configuration manager   customer facing technical presentation
V center configuration manager customer facing technical presentation
 
Postroenie kompleksnoj sistemy obespechenija informacionnoj bezopasnosti v vi...
Postroenie kompleksnoj sistemy obespechenija informacionnoj bezopasnosti v vi...Postroenie kompleksnoj sistemy obespechenija informacionnoj bezopasnosti v vi...
Postroenie kompleksnoj sistemy obespechenija informacionnoj bezopasnosti v vi...
 
Automation Compliance Checks
Automation Compliance ChecksAutomation Compliance Checks
Automation Compliance Checks
 
Презентация с Форума ИБ Директоров 16 апреля 2012г. "Безопасность инфраструкт...
Презентация с Форума ИБ Директоров 16 апреля 2012г. "Безопасность инфраструкт...Презентация с Форума ИБ Директоров 16 апреля 2012г. "Безопасность инфраструкт...
Презентация с Форума ИБ Директоров 16 апреля 2012г. "Безопасность инфраструкт...
 
VMware vSphere 4.1 Security Hardening Guide Revision A
VMware vSphere 4.1 Security Hardening Guide Revision AVMware vSphere 4.1 Security Hardening Guide Revision A
VMware vSphere 4.1 Security Hardening Guide Revision A
 
Cis critical security controls. контроль 3 безопасная конфигурация устройств
Cis critical security controls. контроль 3   безопасная конфигурация устройствCis critical security controls. контроль 3   безопасная конфигурация устройств
Cis critical security controls. контроль 3 безопасная конфигурация устройств
 
Безопасность ЦОД-часть 1
Безопасность ЦОД-часть 1Безопасность ЦОД-часть 1
Безопасность ЦОД-часть 1
 
этичный хакинг и тестирование на проникновение (Publ)
этичный хакинг и тестирование на проникновение (Publ)этичный хакинг и тестирование на проникновение (Publ)
этичный хакинг и тестирование на проникновение (Publ)
 
Hypervisor and VDI security
Hypervisor and VDI securityHypervisor and VDI security
Hypervisor and VDI security
 
Data Centers Security
Data Centers SecurityData Centers Security
Data Centers Security
 
Security Code vGate: Lowering Virtualization Security Risks with ROI 02/03/2011
Security Code vGate: Lowering Virtualization Security Risks with ROI 02/03/2011Security Code vGate: Lowering Virtualization Security Risks with ROI 02/03/2011
Security Code vGate: Lowering Virtualization Security Risks with ROI 02/03/2011
 
Зачем CIO становится поставщиком облачных услуг
Зачем CIO становится поставщиком облачных услугЗачем CIO становится поставщиком облачных услуг
Зачем CIO становится поставщиком облачных услуг
 

Similar to A Review on Traffic Classification Methods in WSN

Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN NetworksCall Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
IJARIIT
 
Back-Bone Assisted HOP Greedy Routing for VANET
Back-Bone Assisted HOP Greedy Routing for VANETBack-Bone Assisted HOP Greedy Routing for VANET
Back-Bone Assisted HOP Greedy Routing for VANET
ijsrd.com
 
Traffic Control System by Incorporating Message Forwarding Approach
Traffic Control System by Incorporating Message Forwarding ApproachTraffic Control System by Incorporating Message Forwarding Approach
Traffic Control System by Incorporating Message Forwarding Approach
CSCJournals
 
Analysis Of Wireless Sensor Network Routing Protocols
Analysis Of Wireless Sensor Network Routing ProtocolsAnalysis Of Wireless Sensor Network Routing Protocols
Analysis Of Wireless Sensor Network Routing Protocols
Amanda Brady
 
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...
Editor IJCATR
 

Similar to A Review on Traffic Classification Methods in WSN (20)

Jd2516161623
Jd2516161623Jd2516161623
Jd2516161623
 
Jd2516161623
Jd2516161623Jd2516161623
Jd2516161623
 
Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN NetworksCall Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
 
Reduce the False Positive and False Negative from Real Traffic with Intrusion...
Reduce the False Positive and False Negative from Real Traffic with Intrusion...Reduce the False Positive and False Negative from Real Traffic with Intrusion...
Reduce the False Positive and False Negative from Real Traffic with Intrusion...
 
VANET Clustering
VANET ClusteringVANET Clustering
VANET Clustering
 
Non Path-Based Mutual Anonymity Protocol for Decentralized P2P System
Non Path-Based Mutual Anonymity Protocol for Decentralized P2P SystemNon Path-Based Mutual Anonymity Protocol for Decentralized P2P System
Non Path-Based Mutual Anonymity Protocol for Decentralized P2P System
 
REUSABILITY-AWARE ROUTING WITH ENHANCED SECURE DATA TRANSMISSION USING HOP-BY...
REUSABILITY-AWARE ROUTING WITH ENHANCED SECURE DATA TRANSMISSION USING HOP-BY...REUSABILITY-AWARE ROUTING WITH ENHANCED SECURE DATA TRANSMISSION USING HOP-BY...
REUSABILITY-AWARE ROUTING WITH ENHANCED SECURE DATA TRANSMISSION USING HOP-BY...
 
Preprint-IC3I2022 - 14-16 Dec 2022.pdf
Preprint-IC3I2022 - 14-16 Dec 2022.pdfPreprint-IC3I2022 - 14-16 Dec 2022.pdf
Preprint-IC3I2022 - 14-16 Dec 2022.pdf
 
THE DEVELOPMENT AND STUDY OF THE METHODS AND ALGORITHMS FOR THE CLASSIFICATIO...
THE DEVELOPMENT AND STUDY OF THE METHODS AND ALGORITHMS FOR THE CLASSIFICATIO...THE DEVELOPMENT AND STUDY OF THE METHODS AND ALGORITHMS FOR THE CLASSIFICATIO...
THE DEVELOPMENT AND STUDY OF THE METHODS AND ALGORITHMS FOR THE CLASSIFICATIO...
 
Automated Traffic Classification And Application Identification Using Machine...
Automated Traffic Classification And Application Identification Using Machine...Automated Traffic Classification And Application Identification Using Machine...
Automated Traffic Classification And Application Identification Using Machine...
 
Back-Bone Assisted HOP Greedy Routing for VANET
Back-Bone Assisted HOP Greedy Routing for VANETBack-Bone Assisted HOP Greedy Routing for VANET
Back-Bone Assisted HOP Greedy Routing for VANET
 
Traffic Control System by Incorporating Message Forwarding Approach
Traffic Control System by Incorporating Message Forwarding ApproachTraffic Control System by Incorporating Message Forwarding Approach
Traffic Control System by Incorporating Message Forwarding Approach
 
Preprint-CSAE,China,21-23 October 2022.pdf
Preprint-CSAE,China,21-23 October 2022.pdfPreprint-CSAE,China,21-23 October 2022.pdf
Preprint-CSAE,China,21-23 October 2022.pdf
 
Call for Papers- Special Session: Contemporary Innovations in Data Sciences, ...
Call for Papers- Special Session: Contemporary Innovations in Data Sciences, ...Call for Papers- Special Session: Contemporary Innovations in Data Sciences, ...
Call for Papers- Special Session: Contemporary Innovations in Data Sciences, ...
 
D1102031727
D1102031727D1102031727
D1102031727
 
Analysis Of Wireless Sensor Network Routing Protocols
Analysis Of Wireless Sensor Network Routing ProtocolsAnalysis Of Wireless Sensor Network Routing Protocols
Analysis Of Wireless Sensor Network Routing Protocols
 
Performance Evaluation of Efficient Data Dissemination Approach For QoS Enha...
 Performance Evaluation of Efficient Data Dissemination Approach For QoS Enha... Performance Evaluation of Efficient Data Dissemination Approach For QoS Enha...
Performance Evaluation of Efficient Data Dissemination Approach For QoS Enha...
 
Analysis of service-oriented traffic classification with imperfect traffic cl...
Analysis of service-oriented traffic classification with imperfect traffic cl...Analysis of service-oriented traffic classification with imperfect traffic cl...
Analysis of service-oriented traffic classification with imperfect traffic cl...
 
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...
 
A MARKOVIAN MODEL FOR INTERNET OF THINGS APPLICATION
A MARKOVIAN MODEL FOR INTERNET OF THINGS APPLICATIONA MARKOVIAN MODEL FOR INTERNET OF THINGS APPLICATION
A MARKOVIAN MODEL FOR INTERNET OF THINGS APPLICATION
 

Recently uploaded

Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 

Recently uploaded (20)

Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
 
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptx
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth Reinforcement
 
Electromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxElectromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptx
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .ppt
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 

A Review on Traffic Classification Methods in WSN

  • 1. Singh Jaskirat, Saini Kaur Harpreet, International Journal of Advance research , Ideas and Innovations in Technology. © 2016, IJARIIT All Rights Reserved Page | 1 ISSN: 2454-132X (Volume2, Issue5) Available online at: www.Ijariit.com A Review on Traffic Classification Methods in WSN Jaskirat Singh* Harpreet Kaur Saini** * Department of Electronics and Communication Engineering, Doaba Institute of Engineering and Technology, Ghataur (Punjab) **Department of Electronics and Communication Engineering, Doaba Institute of Engineering and Technology, Ghataur (Punjab) hunjan.jaskirat@gmail.com saini.kim3@gmail.com Abstract— In a wireless network it is very important to provide the network security and quality of service. To achieve these parameters there must be proper traffic classification in the wireless network. There are many algorithms used such as port number, deep packet inspection as the earlier methods and now days KISS, nearest cluster based classifier (NCC), SVM method and used to classify the traffic and improve the network security and quality of service of a network. Keywords— Traffic classification, Network security, SVM, Deep packet inspection. I. INTRODUCTION In a wireless network traffic classification and unknown flow detection methods are used to solve the networking issues such as security, congestion, intrusion detection and quality of service issues [3]. A number of supervised classification algorithms and unsupervised clustering algorithms have been applied to network traffic classification. In supervised traffic classification the flow classification model is learned from the labeled training samples of each predefined traffic class. But sometimes existing traffic classification methods suffer from poor performance in the crucial situation where more and more new/unknown applications are emerging in the cloud computing based environment [5]. In this paper, we aim to tackle the problem of unknown flows in a WSN.This work considers very few labeled training samples and investigates flow correlation in real world network environment, which makes it better to the previous works. Another approach that is presented is KISS algorithm. It a novel classifier explicitly targeting UDP traffic that couples the stochastic description of application protocols with the discrimination power of Support Vector Machines. Signatures are extracted from a traffic stream by the means of Chi-square like test that allows application protocol format to emerge, while ignoring protocol synchronization and semantic rules. A decision process based on Support Vector Machine is then used to classify the extracted signatures, leading to exceptional performance. Performance of KISS has been tested in different scenarios, considering both data, VoIP, traditional P2P applications and novel P2PTV systems [3]. This work considers very few labeled training samples and investigates flow correlation in real world network environment, which makes it better to the previous works. II. RELATED WORK A. K-MEANS CLUSTERING ALGORITHM The paper on Mining Unclassified Traffic using Automatic Clustering Techniques discusses the, several traffic classification techniques have been proposed in the last years. In the beginning port-based approaches were mainly used; however, the characteristics of many nowadays applications that employ randomly chosen ports, significantly reduce the effectiveness of these approaches. Those are today abandoned in favor of deep packet inspection (DPI) or behavioral techniques. This helped us revealing 40% of the traffic that we could not classify with the previous used classifiers. Second, the algorithm can reveal the born of new applications, as well as the changes of existing ones. B. KISS: STOCHASTIC PACKET INSPECTION CLASSIFIER The paper on KISS: Stochastic Packet Inspection Classifier [3] discuss about the method KISS, a novel Internet classification engine.
  • 2. Singh Jaskirat, Saini Kaur Harpreet, International Journal of Advance research , Ideas and Innovations in Technology. © 2016, IJARIIT All Rights Reserved Page | 2 Motivated by the expected raise of UDP traffic, which stems from the momentum of P2P streaming applications, a novel classification framework which leverages on statistical characterization of payload. Statistical signatures are derived by the means of a Chi-Square like test, which extracts the protocol “format”, but ignores the protocol “semantic” and “synchronization” rules. The signatures feed a decision process based either on the geometric distance among samples, or on Support Vector Machines. KISS is very accurate, and its signatures are intrinsically robust to packet sampling, reordering, and flow asymmetry, so that this algorithm can be used on almost any network. KISS is tested in different scenarios, considering traditional client-server protocols, VoIP and both traditional and new P2PInternet applications. The average True Positive percentage is 99.6%, and in the worst case equal 98.1%. Fig. 1 KISS algorithm C. SUPPORT VECTOR MACHINES (SVM) BASED TRAFFIC CLASSIFIER The paper A Survey on Recent Traffic Classification Techniques Using Machine Learning Methods [4], an approach to traffic classification is proposed which is based on SVM, that approach is used to solve the mutli-class problem that arises in SVM, classify network traffic and apply optimization algorithm to make classifier perform properly even with a bad training set for hundreds of samples. It is one of the most promising ML tools, a binary classifier suitable for solving high dimensional feature space and small training set size problems. This approach uses flow representation that describes the statistical characteristics of application protocol through monitoring node whose duty is to assign flows to the concerned application classes it was trained with or with unknown class. It considers bidirectional flows only, which follows proper TCP three way handshakes and proper termination. After packets are captured, each flow is mapped to feature values which are based on packet’s length to determine which application the packet belongs to. The main feature of this proposed classifier is based on packet size as it is being captured on the application layer. By the use of this classifier accuracy is very good with True Positive of 90%. Fig 2 Support Vector Machines (SVM) based traffic classifier D. NAIVE BAYESIAN AND BAYESIAN NEURAL NETWORK BASED TRAFFIC CLASSIFICATION It is a traffic classifier that can achieve a high accuracy across a range of application types without any source or destination Host- address or port information can be designed using supervised machine learning based on a Bayesian trained neural network. Bayesian neural network (NN) based traffic classifier [6] can produce more accurate results compared to naïve Bayesian traffic classifier. The Bayesian framework using a neural network model allows identification of traffic without using any port or host information. A
  • 3. Singh Jaskirat, Saini Kaur Harpreet, International Journal of Advance research , Ideas and Innovations in Technology. © 2016, IJARIIT All Rights Reserved Page | 3 classification accuracy of over 99% can be achieved when training and testing on homogeneous traffic from the same site on the same day. E. EFFICIENT FLOW BASED NETWORK TRAFFIC CLASSIFICATION USING MACHINE LEARNING Traffic classification based on their generation applications has a very important role to play in network security and management. The port-based prediction methods and payload-based deep inspection methods comes under Traditional methods. The standard strategies in current network environment suffer from variety of privacy issues, dynamic ports and encrypted applications. Recent research efforts are focused on traffic classification and Machine Learning Techniques are used for classification. This paper conducts a flow based traffic classification and comparison on the various Machine Learning (ML) techniques such as C4.5, Naïve Bayes, Nearest Neighbor, and RBF for IP traffic classification. From this C4.5 Decision Tree gives 93.33% accuracy compare with other algorithms. The two methods are used Full Feature selection and reduced feature set for classification. From this classification the reduced feature selection gives good result. III.OBJECTIVES We are aiming to find a novel approach for traffic classification, which can improve the classification performance effectively. The problem at hand is to detect the malicious traffic flow in the network and work out a new route which is free from the faulty nodes. In the beginning we have to design a network that contains nodes (some good nodes and some bad nodes). Then we have to make a flow from one point to the point. In this way with the help of previous used methods we will try to get better results and more accuracy then the earlier used methods. IV.PLANNING OF WORK In the planning firstly we have to design a network that contains the sensor nodes in the particular described area. Then we have to find that how many among then are proper and how many of them have some issues due to which they will be unable to participate during the transmission/ requirement time. Then to develop a path that follows the shortest path and ignore the sensor nodes that are not participating. As well as shortest path we have to achieve the maximum efficiency during this traffic classification. V. ACKNOWLEGEMENT The authors are thankful to Mrs. Maninder kaur, M.tech coordinator, DIET and her staff for providing the necessary facilities for the preparation of the paper. Without the proper guidance of them it is not possible to learn about latest technologies and research works. REFERENCES [1]J. Zhang, Y. Xiang, Y. Wang,W. Zhou, Y. Xiang, and Y. Guan, “Network traffic classification using correlation information,” IEEE Trans. Parallel Distributed. Syst., vol. 24, no. 1, pp. 104–117, Jan. 2013. [2] A. Finamore, M. Mellia, and M. Meo, “Mining unclassified traffic using automatic clustering techniques,” in Proc. 2011 TMA International Workshop on Traffic Monitoring and Analysis, pp. 150–163. [3] A. Finamore, M. Mellia, M. Meo, and D. Rossi, “KISS: stochastic packet inspection classifier for UDP traffic,” IEEE/ACM Trans. Netw., vol. 18, no. 5, pp. 1505–1515, Oct. 2010. [4] T. T. Nguyen and G. Armitage, “A survey of techniques for internet traffic classification using machine learning,” IEEE Common. Surveys& Tutorials, vol. 10, no. 4, pp. 56–76, Fourth Quarter 2008. [5] J. Erman, A. Mahanti, and M. Arlitt, “Internet traffic identification using machine learning,” in Proc. 2006 IEEE Global Telecommunications Conference, pp. 1–6. [6] A. W. Moore and D. Zuev, “Internet traffic classification using Bayesian analysis techniques,” SIGMETRICS Perform. Eval. Rev., vol. 33, pp. 50–60, June 2005.