Network Transmission Flags Data Affinity-based Classification by K-Nearest Neighbor

被引:5
作者
Aljojo, Nahla [1 ]
机构
[1] Univ Jeddah, Coll Comp Sci & Engn, Dept Informat Syst & Technol, Jeddah, Saudi Arabia
来源
ARO-THE SCIENTIFIC JOURNAL OF KOYA UNIVERSITY | 2022年 / 10卷 / 01期
关键词
Transmission control protocol flags; K-nearest neighbors; Investment; Financial risk; Deep learning;
D O I
10.14500/aro.10880
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
This research is concerned with the data generated during a network transmission session to understand how to extract value from the data generated and be able to conduct tasks. Instead of comparing all of the transmission flags for a transmission session at the same time to conduct any analysis, this paper conceptualized the influence of each transmission flag on network-aware applications by comparing the flags one by one on their impact to the application during the transmission session, rather than comparing all of the transmission flags at the same time. The K-nearest neighbor (KNN) type classification was used because it is a simple distance-based learning algorithm that remembers earlier training samples and is suitable for taking various flags with their effect on application protocols by comparing each new sample with the K-nearest points to make a decision. We used transmission session datasets received from Kaggle for IP flow with 87 features and 3.577.296 instances. We picked 13 features from the datasets and ran them through KNN. RapidMiner w as used for the study, and the results of the experiments revealed that the KNN-based model was not only significantly more accurate in categorizing data, but it was also significantly more efficient due to the decreased processing costs.
引用
收藏
页码:35 / 43
页数:9
相关论文
共 27 条
[1]   A Review of the Advances in Cyber Security Benchmark Datasets for Evaluating Data-Driven based Intrusion Detection Systems [J].
Abubakar, Adamu I. ;
Chiroma, Haruna ;
Muaz, Sanah Abdullahi ;
Ila, Libabatu Baballe .
PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND SOFTWARE ENGINEERING (SCSE'15), 2015, 62 :221-227
[2]   The monarch butterfly optimization algorithm for solving feature selection problems [J].
Alweshah, Mohammed ;
Al Khalaileh, Saleh ;
Gupta, Brij B. ;
Almomani, Ammar ;
Hammouri, Abdelaziz, I ;
Al-Betar, Mohammed Azmi .
NEURAL COMPUTING & APPLICATIONS, 2022, 34 (14) :11267-11281
[3]   Detection and Classification of Malicious Flows in Software-Defined Networks Using Data Mining Techniques [J].
Amanowicz, Marek ;
Jankowski, Damian .
SENSORS, 2021, 21 (09)
[4]  
Atan F.M., 1933, J PHYS C SERIES
[5]  
Chow J, 2017, 2017 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), P25, DOI 10.1109/ISI.2017.8004869
[6]   Darknet Traffic Big-Data Analysis and Network Management for Real-Time Automating of the Malicious Intent Detection Process by a Weight Agnostic Neural Networks Framework [J].
Demertzis, Konstantinos ;
Tsiknas, Konstantinos ;
Takezis, Dimitrios ;
Skianis, Charalabos ;
Iliadis, Lazaros .
ELECTRONICS, 2021, 10 (07)
[7]  
Dini Pierpaolo, 2021, Designs, DOI 10.3390/designs5010009
[8]  
Dsouza J., 2020, 2020 ADV SCI ENG TEC, P1
[9]  
Gital AY, 2016, INT CONF INFORM COMM, P118, DOI [10.1109/ICT4M.2016.034, 10.1109/ICT4M.2016.30]
[10]  
Gordon H., 2021, ARXIV, V2021