Increasingly researchers are turning to machine learning techniques such as artificial neural networks (ANN) to address communication network research challenges in the areas of enhanced security, quality of service, visibility and control. Central to each is the need to classify packets. Determining an effective architecture for the artificial neural network is more difficult because traditional techniques such as principal component analysis (PCA) show reduced effectiveness. Presented are the techniques for preprocessing datasets and selecting input traffic features for the multi-layer perceptron (MLP) architecture. This methodology achieves classification accuracy above 99%. An investigation into neural network architectures revealed the...
In this paper we analyzed the use of neural network for packet filtering. The neural network system...
Distributed denial of service attack classified as a structured attack to deplete server, sourced fr...
Deep learning has been applied in the field of network intrusion detection and has yielded good resu...
A classical multilayer perceptron algorithm and novel convolutional neural network payload classifyi...
Abstract – Artificial Neural Networks have for long been used for nonlinear pattern recognition and ...
International audienceInternet traffic recognition is an essential tool for access providers since r...
In this research we compare different methods to examine network packets using supervised learning t...
Abstract: In this paper we examine and evaluate different ways of classifying encrypted network tra...
Network traffic classification is the basis of many network security applications and has attracted ...
In this paper, we present concepts in artificial neural networks (ANN) to help detect intrusion atta...
Current multi-domain command and control computer networks require significant oversight to ensure a...
Abstract – Routers use lookup tables to forward packets. They also classify packets to determine whi...
Distributed Denial-of-Service (DDoS) is one of network attack technique which increased every year, ...
The research project aims to find ways to detect malicious packets inside encrypted network traffic....
Networking and distributed computing system have provided computational resources for machine learni...
In this paper we analyzed the use of neural network for packet filtering. The neural network system...
Distributed denial of service attack classified as a structured attack to deplete server, sourced fr...
Deep learning has been applied in the field of network intrusion detection and has yielded good resu...
A classical multilayer perceptron algorithm and novel convolutional neural network payload classifyi...
Abstract – Artificial Neural Networks have for long been used for nonlinear pattern recognition and ...
International audienceInternet traffic recognition is an essential tool for access providers since r...
In this research we compare different methods to examine network packets using supervised learning t...
Abstract: In this paper we examine and evaluate different ways of classifying encrypted network tra...
Network traffic classification is the basis of many network security applications and has attracted ...
In this paper, we present concepts in artificial neural networks (ANN) to help detect intrusion atta...
Current multi-domain command and control computer networks require significant oversight to ensure a...
Abstract – Routers use lookup tables to forward packets. They also classify packets to determine whi...
Distributed Denial-of-Service (DDoS) is one of network attack technique which increased every year, ...
The research project aims to find ways to detect malicious packets inside encrypted network traffic....
Networking and distributed computing system have provided computational resources for machine learni...
In this paper we analyzed the use of neural network for packet filtering. The neural network system...
Distributed denial of service attack classified as a structured attack to deplete server, sourced fr...
Deep learning has been applied in the field of network intrusion detection and has yielded good resu...