Data mining and machine learning methods for sustainable smart cities traffic classification: A survey

被引:165
作者
Shafiq, Survey Muhammad [1 ]
Tian, Zhihong [1 ]
Bashir, Ali Kashif [2 ]
Jolfaei, Alireza [3 ]
Yu, Xiangzhan [4 ]
机构
[1] GuangZhou Univ, Dept Cyberspace, Inst Adv Technol, Guangzhou 510006, Peoples R China
[2] Manchester Metropolitan Univ, Dept Comp & Math, Manchester, Lancs, England
[3] Macquarie Univ, Dept Comp, Sydney, NSW 2113, Australia
[4] Harbin Inst Technol, Sch Comp Sci & Technol, Harbin, Peoples R China
关键词
Sustainable smart cities; Security; Traffic; Classification; Data marling; Machine learning; A survey; EARLY-STAGE; FEATURE-SELECTION; PERFORMANCE EVALUATION; NEURAL-NETWORKS; INTERNET; IDENTIFICATION; FUTURE; SYSTEM; ISSUES; IOT;
D O I
10.1016/j.scs.2020.102177
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
This survey paper describes the significant literature survey of Sustainable Smart Cities (SSC), Machine Learning (ML), Data Mining (DM), datasets, feature extraction and selection for network traffic classification. Considering relevance and most cited methods and datasets of features were identified, read and summarized. As data and data features are essential in Internet traffic classification using machine learning techniques, some well-known and most used datasets with details statistical features are described. Different classification techniques for SSC network traffic classification are presented with more information. The complexity of data set, features extraction and machine learning methods are addressed. In the end, challenges and recommendations for SSC network traffic classification with the dataset of features are presented.
引用
收藏
页数:23
相关论文
共 147 条
[31]  
Datir Harshal N., 2019, Data Management, Analytics and Innovation. Proceedings of ICDMAI 2018. Advances in Intelligent Systems and Computing (AISC 808), P291, DOI 10.1007/978-981-13-1402-5_22
[32]   An Intelligent Outlier Detection Method With One Class Support Tucker Machine and Genetic Algorithm Toward Big Sensor Data in Internet of Things [J].
Deng, Xiaowu ;
Jiang, Peng ;
Peng, Xiaoning ;
Mi, Chunqiao .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2019, 66 (06) :4672-4683
[33]   A machine learning based intrusion detection scheme for data fusion in mobile clouds involving heterogeneous client networks [J].
Dey, Saurabh ;
Ye, Qiang ;
Sampalli, Srinivas .
INFORMATION FUSION, 2019, 49 :205-215
[34]   A survey on feature extraction for pattern recognition [J].
Ding, Shifei ;
Zhu, Hong ;
Jia, Weikuan ;
Su, Chunyang .
ARTIFICIAL INTELLIGENCE REVIEW, 2012, 37 (03) :169-180
[35]   RETRACTED: Flow online identification method for the encrypted Skype (Retracted article. See vol. 161, 2020) [J].
Dong, Shi ;
Jain, Raj .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 132 :75-85
[36]  
DUPUY A, 1991, INTEGRATED NETWORK MANAGEMENT, II, P639
[37]  
Erman J., 2007, P 3 ANN ACM WORKSHOP, P35
[38]   On the Stability of the Information Carried by Traffic Flow Features at the Packet Level [J].
Este, Alice ;
Gringoli, Francesco ;
Salgarelli, Luca .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2009, 39 (03) :13-18
[39]   Support Vector Machines for TCP traffic classification [J].
Este, Alice ;
Gringoli, Francesco ;
Salgarelli, Luca .
COMPUTER NETWORKS, 2009, 53 (14) :2476-2490
[40]   The KDD process for extracting useful knowledge from volumes of data [J].
Fayyad, U ;
PiatetskyShapiro, G ;
Smyth, P .
COMMUNICATIONS OF THE ACM, 1996, 39 (11) :27-34