skip to main content
10.1145/3097766.3097771acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
short-paper
Free Access

A Meta-Analysis Approach for Feature Selection in Network Traffic Research

Published:11 August 2017Publication History

ABSTRACT

The selection of features for network traffic analysis and anomaly detection is a challenge for experts who aim to build systems that discover traffic patterns, characterize networks, and improve security. There are no major guidelines or best practices for feature selection in the field. The literature is full of different proposals that ultimately depend on feature availability, types of known traffic, tool limitations, specific goals, and, fundamentally, the experts' knowledge and intuition. In this work we have revisited 71 principal publications in the field of network traffic analysis from 2005 to 2017. Relevant information has been curated according to formalized data structures and stored in JSON format, creating a database for the smart retrieval of network traffic analysis researches. Meta-analysis performed upon the explored publications disclosed a set of main features that are common in a considerable volume of works and could be used as a baseline for future research. Additionally, aiming for validation and generalization in network traffic research, the creation of such meta-analysis environments is highly valuable. It allows homogenizing and joining criteria for the design of experiments, thus avoiding getting lost or becoming irrelevant due to the high complexity and variability that network traffic analysis involves.

Skip Supplemental Material Section

Supplemental Material

ametaanalysisapproachforfeatureselectioninnetworktrafficresearch.webm

webm

66.1 MB

References

  1. Maristella Agosti, Giorgio Maria Di Nunzio, and Nicola Ferro. 2007. The Importance of Scientific Data Curation for Evaluation Campaigns. Springer Berlin Heidelberg, Berlin, Heidelberg, 157--166. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Michael Borenstein, Larry V. Hedges, Julian P. T. Higgins, and Hannah R. Roth-stein. 2009. Introduction to Meta-Analysis. John Wiley & Sons, Ltd. 409--414 pages.Google ScholarGoogle Scholar
  3. T. Bray. 2014. RFC 7159: The JavaScript Object Notation (JSON) Data Interchange Format. Technical Report. Internet Engineering Task Force (IETF).Google ScholarGoogle Scholar
  4. A. Callado, C. Kamienski, G. Szabo, B. P. Gero, J. Kelner, S. Fernandes, and D. Sadok. 2009. A Survey on Internet Traffic Identification. IEEE Communications Surveys Tutorials 11, 3 (2009), 37--52. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. B. Claise and B. Trammell. 2013. RFC 7012: Information Model for IP Flow Information Export (IPFIX). Technical Report. Internet Engineering Task Force (IETF). https://www.iana.org/assignments/ipfix/ipfix.xhtmlGoogle ScholarGoogle Scholar
  6. Félix Iglesias and Tanja Zseby. 2015. Analysis of network traffic features for anomaly detection. Machine Learning 101, 1 (2015), 59--84. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Hyunchul Kim, KC Claffy, Marina Fomenkov, Dhiman Barman, Michalis Faloutsos, and KiYoung Lee. 2008. Internet Traffic Classification Demystified: Myths, Caveats, and the Best Practices. In Proceedings of the 2008 ACM CoNEXT Conference (CoNEXT '08). ACM, New York, NY, USA, Article 11, 12 pages. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. TU Wien CN Group. 2017. Network Traffic Analysis Database. (2017). https://www.cn.tuwien.ac.at/metaGoogle ScholarGoogle Scholar
  9. Tanja Zseby, Felix Iglesias Vazquez, Alistair King, and K.C. Claffy. 2015. Teaching Network Security With IP Darkspace Data. IEEE Transactions on Education 59, 1 (2015), 1--7. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A Meta-Analysis Approach for Feature Selection in Network Traffic Research

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Conferences
              Reproducibility '17: Proceedings of the Reproducibility Workshop
              August 2017
              31 pages
              ISBN:9781450350600
              DOI:10.1145/3097766

              Copyright © 2017 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 11 August 2017

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • short-paper
              • Research
              • Refereed limited

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader