首页> 外文会议>Privacy, Security, Trust and the Management of e-Business, 2009. CONGRESS '09 >Performance Comparison of Four Rule Sets: An Example for Encrypted Traffic Classification
【24h】

Performance Comparison of Four Rule Sets: An Example for Encrypted Traffic Classification

机译:四个规则集的性能比较:加密流量分类的示例

获取原文

摘要

The objective of this work is the classification of encrypted traffic where SSH is taken as an example application. To this end, four learning algorithms AdaBoost, RIPPER, C4.5 and Rough Set are evaluated using flow based features to extract the minimum features/rules set required to classify SSH traffic. Results indicate that C4.5 based classifier performs better than the other three. However, we have also identified 15 features that are important to classify encrypted traffic, namely SSH.
机译:这项工作的目的是对加密流量进行分类,其中以SSH为例。为此,使用基于流的功能对四种学习算法AdaBoost,RIPPER,C4.5和Rough Set进行评估,以提取对SSH流量进行分类所需的最小功能/规则集。结果表明,基于C4.5的分类器的性能优于其他三个。但是,我们还确定了15个对分类加密流量很重要的功能,即SSH。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号