{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T03:51:22Z","timestamp":1761709882486,"version":"3.37.3"},"reference-count":33,"publisher":"Wiley","license":[{"start":{"date-parts":[[2021,4,29]],"date-time":"2021-04-29T00:00:00Z","timestamp":1619654400000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Key R&D Program of China","award":["2020YFB1005500","U1836116","61872167","BK20202001"],"award-info":[{"award-number":["2020YFB1005500","U1836116","61872167","BK20202001"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2020YFB1005500","U1836116","61872167","BK20202001"],"award-info":[{"award-number":["2020YFB1005500","U1836116","61872167","BK20202001"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004608","name":"Natural Science Foundation of Jiangsu Province","doi-asserted-by":"publisher","award":["2020YFB1005500","U1836116","61872167","BK20202001"],"award-info":[{"award-number":["2020YFB1005500","U1836116","61872167","BK20202001"]}],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2021,4,29]]},"abstract":"<jats:p>Due to the growth and popularity of the internet, cyber security remains, and will continue, to be an important issue. There are many network traffic classification methods or malware identification approaches that have been proposed to solve this problem. However, the existing methods are not well suited to help security experts effectively solve this challenge due to their low accuracy and high false positive rate. To this end, we employ a machine learning-based classification approach to identify malware. The approach extracts features from network traffic and reduces the dimensionality of the features, which can effectively improve the accuracy of identification. Furthermore, we propose an improved SVM algorithm for classifying the network traffic dubbed Optimized Facile Support Vector Machine (OFSVM). The OFSVM algorithm solves the problem that the original SVM algorithm is not satisfactory for classification from two aspects, i.e., parameter optimization and kernel function selection. Therefore, in this paper, we present an approach for identifying malware in network traffic, called Network Traffic Malware Identification (NTMI). To evaluate the effectiveness of the NTMI approach proposed in this paper, we collect four real network traffic datasets and use a publicly available dataset CAIDA for our experiments. Evaluation results suggest that the NTMI approach can lead to higher accuracy while achieving a lower false positive rate compared with other identification methods. On average, the NTMI approach achieves an accuracy of 92.5% and a false positive rate of 5.527%.<\/jats:p>","DOI":"10.1155\/2021\/5518909","type":"journal-article","created":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T20:20:25Z","timestamp":1619814025000},"page":"1-14","source":"Crossref","is-referenced-by-count":4,"title":["An Approach Based on the Improved SVM Algorithm for Identifying Malware in Network Traffic"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2644-9183","authenticated-orcid":true,"given":"Bo","family":"Liu","sequence":"first","affiliation":[{"name":"School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3124-5452","authenticated-orcid":true,"given":"Jinfu","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang, China"}]},{"given":"Songling","family":"Qin","sequence":"additional","affiliation":[{"name":"School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang, China"}]},{"given":"Zufa","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang, China"}]},{"given":"Yisong","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang, China"}]},{"given":"Lingling","family":"Zhao","sequence":"additional","affiliation":[{"name":"School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang, China"}]},{"given":"Jingyi","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang, China"}]}],"member":"311","reference":[{"issue":"1","key":"1","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1023\/A:1025667309714","article-title":"Theoretical and empirical analysisof Relief F and R Relief F","volume":"53","author":"M. Robnik-\u0160ikonja","year":"2003","journal-title":"Machine Learning"},{"first-page":"2451","article-title":"Network Traffic Classification techniques and comparative analysis using Machine Learning algorithms","author":"M. Shafiq","key":"2"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1002\/nem.1962"},{"first-page":"1278","article-title":"Sample-specific SVM learning for person Re-identification","author":"Y. Zhang","key":"4"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/s10661-018-6659-6"},{"first-page":"41","article-title":"An empirical study of the naive Bayes classifier","author":"I. Rish","key":"6"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/s10100-017-0479-6"},{"issue":"3","key":"8","first-page":"90","article-title":"Network traffic classification using decision tree based on minimum partition distance","volume":"33","author":"Z. Yang","year":"2012","journal-title":"Journal of China Institute of Communications"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2010.01.001"},{"first-page":"360","article-title":"Network traffic classification using K-means clustering","author":"Y. Liu","key":"10"},{"first-page":"345","article-title":"Network traffic classification using semi-supervised approach","author":"A. Shrivastav","key":"11"},{"first-page":"439","article-title":"InFeCT - network traffic classification","author":"P. Teufl","key":"12"},{"first-page":"134","article-title":"Unknown malware detection using network traffic classification","author":"D. Bekerman","key":"13"},{"first-page":"107","article-title":"A parallelized network traffic classification based on hidden Markov model","author":"X. Mu","key":"14"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.5120\/ijca2015907284"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.2019.1800819"},{"first-page":"46","article-title":"Packet-based network traffic classification using deep learning","author":"H. Lim","key":"17"},{"year":"2020","key":"18","article-title":"NetFlow"},{"key":"19","article-title":"An architecture for describing simple network management protocol (SNMP) management frameworks","volume":"62","author":"D. Harrington","year":"2002","journal-title":"RFC3411, STD"},{"issue":"7","key":"20","first-page":"101","article-title":"Study on the method for regional traffic flow feature extraction and traffic status evaluation","volume":"22","author":"W. Guo","year":"2005","journal-title":"Journal of Highway and Transportation Research and Development"},{"first-page":"355","article-title":"A feature selection method based on information gain and genetic algorithm","author":"S. Lei","key":"21"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1613\/jair.460"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2009.02.014"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2019.03.037"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/72.991432"},{"issue":"2003","key":"26","first-page":"1157","article-title":"An introduction to variable and feature selection","volume":"3","author":"A. Elisseeff","year":"2003","journal-title":"Journal of Machine Learning Research"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/78.650102"},{"issue":"2","key":"28","first-page":"65","article-title":"A genetic algorithm tutorial","volume":"4","author":"D. Whitley","year":"2014","journal-title":"Statistics and Computing"},{"first-page":"4104","article-title":"A discrete binary version of the particle swarm algorithm","author":"J. Kennedy","key":"29"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-012-9342-2"},{"first-page":"96","article-title":"MD-Miner: behavior-based tracking of network traffic for malware-control domain detection","author":"J. H. Sun","key":"31"},{"key":"32","first-page":"4","volume-title":"Functions Ofpositive and Negativetypeand Theircommection with the Theory Ofintegral Equations","author":"J. Mercer","year":"1909"},{"year":"2020","author":"J. Caida","key":"33"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/5518909.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/5518909.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/5518909.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T20:20:40Z","timestamp":1619814040000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2021\/5518909\/"}},"subtitle":[],"editor":[{"given":"Entao","family":"Luo","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,4,29]]},"references-count":33,"alternative-id":["5518909","5518909"],"URL":"https:\/\/doi.org\/10.1155\/2021\/5518909","relation":{},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"type":"electronic","value":"1939-0122"},{"type":"print","value":"1939-0114"}],"subject":[],"published":{"date-parts":[[2021,4,29]]}}}