{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,5]],"date-time":"2025-08-05T12:27:52Z","timestamp":1754396872859},"publisher-location":"Singapore","reference-count":27,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811526923"},{"type":"electronic","value":"9789811526930"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-2693-0_12","type":"book-chapter","created":{"date-parts":[[2020,1,16]],"date-time":"2020-01-16T12:29:03Z","timestamp":1579177743000},"page":"168-181","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Performance Evaluation for Four Supervised Classifiers in Internet Traffic Classification"],"prefix":"10.1007","author":[{"given":"Alhamza","family":"Munther","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Imad J.","family":"Mohammed","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mohammed","family":"Anbar","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Anwer Mustafa","family":"Hilal","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2020,1,17]]},"reference":[{"issue":"3","key":"12_CR1","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1109\/SURV.2009.090304","volume":"11","author":"Arthur Callado","year":"2009","unstructured":"Callado, A., Kamienski, C., Fernandes, S., Sadok, D.: A survey on internet traffic identification and classification (2009)","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"2","key":"12_CR2","first-page":"796","volume":"6","author":"A Munther","year":"2014","unstructured":"Munther, A., et al.: Active build-model random forest method for network traffic classification. Int. J. Eng. Technol. (IJET) 6(2), 796\u2013804 (2014)","journal-title":"Int. J. Eng. Technol. (IJET)"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Karagiannis, T., Broido, A., Faloutsos, M.: Transport layer identification of P2P traffic. In: Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement, pp. 121\u2013134 (2004)","DOI":"10.1145\/1028788.1028804"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Munther, A., et al.: Network traffic classification\u2014a comparative study of two common decision tree methods: C4.5 and random forest. In: 2014 2nd International Conference on Electronic Design (ICED). IEEE (2014)","DOI":"10.1109\/ICED.2014.7015800"},{"key":"12_CR5","series-title":"Lecture Notes in Electrical Engineering","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/978-981-10-0557-2_32","volume-title":"Information Science and Applications (ICISA) 2016","author":"A Munther","year":"2016","unstructured":"Munther, A., Othman, R.R., Alsaadi, A.S., Anbar, M.: A performance study of hidden Markov model and random forest in internet traffic classification. In: Kim, K., Joukov, N. (eds.) Information Science and Applications (ICISA) 2016. LNEE, vol. 376, pp. 319\u2013329. Springer, Singapore (2016). \nhttps:\/\/doi.org\/10.1007\/978-981-10-0557-2_32"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Sen, S., Spatscheck, O., Wang, D.: Accurate, scalable in-network identification of P2P traffic using application signatures. In: Proceedings of the 13th International Conference on World Wide Web, pp. 512\u2013521 (2004)","DOI":"10.1145\/988672.988742"},{"key":"12_CR7","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/1163593.1163596","volume":"36","author":"N Williams","year":"2006","unstructured":"Williams, N., Zander, S., Armitage, G.: A preliminary performance comparison of five machine learning algorithms for practical IP traffic flow classification. ACM SIGCOMM Comput. Commun. Rev. 36, 5\u201316 (2006)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"issue":"1","key":"12_CR8","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/1071690.1064220","volume":"33","author":"Andrew W. Moore","year":"2005","unstructured":"Moore, A.W., Zuev, D.: Internet traffic classification using bayesian analysis techniques. In: ACM SIGMETRICS Performance Evaluation Review, pp. 50\u201360 (2005)","journal-title":"ACM SIGMETRICS Performance Evaluation Review"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Liu, Y., Li, W., Li, Y.: Network traffic classification using k-means clustering. In: Second International Multi-Symposiums on Computer and Computational Sciences, IMSCCS 2007, pp. 360\u2013365 (2007)","DOI":"10.1109\/IMSCCS.2007.52"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Li, Z., Yuan, R., Guan, X.: Accurate classification of the internet traffic based on the svm method. In: IEEE International Conference on Communications, ICC 2007, pp. 1373\u20131378 (2007)","DOI":"10.1109\/ICC.2007.231"},{"key":"12_CR11","unstructured":"Fu, L., Tang, B., Yuan, D.: The study of traffic classification methods based on C4.5 algorithm (2012)"},{"key":"12_CR12","unstructured":"IANA: Internet Assigned Numbers Authority"},{"key":"12_CR13","unstructured":"Dreger, H., Feldmann, A., Mai, M., Paxson, V., Sommer, R.: Dynamic application-layer protocol analysis for network intrusion detection. In: USENIX Security Symposium, pp. 257\u2013272 (2006)"},{"key":"12_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/978-3-540-31966-5_4","volume-title":"Passive and Active Network Measurement","author":"AW Moore","year":"2005","unstructured":"Moore, A.W., Papagiannaki, K.: Toward the accurate identification of network applications. In: Dovrolis, C. (ed.) PAM 2005. LNCS, vol. 3431, pp. 41\u201354. Springer, Heidelberg (2005). \nhttps:\/\/doi.org\/10.1007\/978-3-540-31966-5_4"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Erman, J., Mahanti, A., Arlitt, M.: Qrp05-4: internet traffic identification using machine learning. In: Global Telecommunications Conference, GLOBECOM 2006, pp. 1\u20136. IEEE (2006)","DOI":"10.1109\/GLOCOM.2006.443"},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"Li, W., Moore, A.W.: A machine learning approach for efficient traffic classification. In: 15th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems, MASCOTS 2007, pp. 310\u2013317 (2007)","DOI":"10.1109\/MASCOTS.2007.2"},{"key":"12_CR17","unstructured":"Hao, S., et al.: Improved SVM method for internet traffic classification based on feature weight learning. In: 2015 International Conference on Control, Automation and Information Sciences (ICCAIS). IEEE (2015)"},{"issue":"3","key":"12_CR18","first-page":"187","volume":"6","author":"A Sivaprasad","year":"2018","unstructured":"Sivaprasad, A., et al.: Machine learning based traffic classification using statistical analysis. Int. J. Recent Innov. Trends Comput. Commun. 6(3), 187\u2013191 (2018)","journal-title":"Int. J. Recent Innov. Trends Comput. Commun."},{"key":"12_CR19","doi-asserted-by":"crossref","unstructured":"Kim, H., Claffy, K.C., Fomenkov, M., Barman, D., Faloutsos, M., Lee, K.: Internet traffic classification demystified: myths, caveats, and the best practices. In: Proceedings of the 2008 ACM CoNEXT Conference, p. 11 (2008)","DOI":"10.1145\/1544012.1544023"},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Haffner, P., Sen, S., Spatscheck, O., Wang, D.: ACAS: automated construction of application signatures. In: Proceedings of the 2005 ACM SIGCOMM Workshop on Mining Network Data, pp. 197\u2013202 (2005)","DOI":"10.1145\/1080173.1080183"},{"key":"12_CR21","doi-asserted-by":"crossref","unstructured":"Ma, J., Levchenko, K., Kreibich, C., Savage, S., Voelker, G.M.: Unexpected means of protocol inference. In: Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement, pp. 313\u2013326 (2006)","DOI":"10.1145\/1177080.1177123"},{"issue":"4","key":"12_CR22","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1145\/1090191.1080119","volume":"35","author":"Thomas Karagiannis","year":"2005","unstructured":"Karagiannis, T., Papagiannaki, K., Faloutsos, M.: BLINC: multilevel traffic classification in the dark. In: ACM SIGCOMM Computer Communication Review, pp. 229\u2013240 (2005)","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"12_CR23","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-98135-2","volume-title":"Principles and Theory for Data Mining and Machine Learning","author":"BS Clarke","year":"2009","unstructured":"Clarke, B.S., Fokoue, E., Zhang, H.H.: Principles and Theory for Data Mining and Machine Learning. Springer, Heidelberg (2009). \nhttps:\/\/doi.org\/10.1007\/978-0-387-98135-2"},{"key":"12_CR24","series-title":"WCB","volume-title":"Machine Learning","author":"TM Mitchell","year":"1997","unstructured":"Mitchell, T.M.: Machine Learning. WCB. McGraw-Hill, Boston (1997)"},{"key":"12_CR25","first-page":"257","volume":"293","author":"TJ Fagan","year":"1975","unstructured":"Fagan, T.J.: Letter: nomogram for Bayes theorem. New Engl. J. Med. 293, 257 (1975)","journal-title":"New Engl. J. Med."},{"key":"12_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/380995.380999","volume":"2","author":"KP Bennett","year":"2000","unstructured":"Bennett, K.P., Campbell, C.: Support vector machines: hype or hallelujah? ACM SIGKDD Explor. Newsl. 2, 1\u201313 (2000)","journal-title":"ACM SIGKDD Explor. Newsl."},{"key":"12_CR27","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Mach. Learn. 45, 5\u201332 (2001)","journal-title":"Mach. Learn."}],"container-title":["Communications in Computer and Information Science","Advances in Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-2693-0_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,16]],"date-time":"2020-01-16T12:40:05Z","timestamp":1579178405000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-2693-0_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789811526923","9789811526930"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-2693-0_12","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"17 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACeS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advances in Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Penang","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Malaysia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 August 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aces2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/aces.usm.my\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}