Digital Investigation of Network Traffic Using Machine Learning

被引:0
|
作者
Chatterjee, Saswati [1 ]
Satpathy, Suneeta [2 ]
Nibedita, Arpita [3 ]
机构
[1] Sri Sri Univ, Fac Emerging Technol, Cuttack, Odisha, India
[2] SOA Univ, Ctr AI & ML, Bhubaneswar, Odisha, India
[3] Trident Acad Technol, CSE, Bhubaneswar, Odisha, India
关键词
KDD; Hybrid Machine learning; Network forensics; DDoS; INTRUSION DETECTION SYSTEM; ANOMALY DETECTION;
D O I
10.4108/eetsis.4055
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this study, an intelligent system that can gather and process network packets is built. Machine learning techniques are used to create a traffic classifier that divides packets into hazardous and non-malicious categories. The system utilizing resources was previously classified using a number of conventional techniques; however, this strategy adds machine learning., a study area that is currently active and has so far yielded promising results. The major aims of this paper are to monitor traffic, analyze incursions, and control them. The flow of data collection is used to develop a traffic classification system based on features of observed internet packets. This classification will aid IT managers in recognizing the vague assault that is becoming more common in the IT industry The suggested methods described in this research help gather network data and detect which threat was launched in a specific network to distinguish between malicious and benign packets. This paper's major goal is to create a proactive system for detecting network attacks using classifiers based on machine learning that can recognize new packets and distinguish between hostile and benign network packets using rules from the KDD dataset. The algorithm is trained to employ the characteristics of the NSL-KDD dataset.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] IoT Network Traffic Classification Using Machine Learning Algorithms: An Experimental Analysis
    Kumar, Rakesh
    Swarnkar, Mayank
    Singal, Gaurav
    Kumar, Neeraj
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (02) : 989 - 1008
  • [32] Anomaly detection in NetFlow network traffic using supervised machine learning algorithms
    Fosic, Igor
    Zagar, Drago
    Grgic, Kresimir
    Krizanovic, Visnja
    JOURNAL OF INDUSTRIAL INFORMATION INTEGRATION, 2023, 33
  • [33] Software Defined Network Traffic Classification for QoS Optimization Using Machine Learning
    Serag, Rehab H.
    Abdalzaher, Mohamed S.
    Elsayed, Hussein Abd El Atty
    Sobh, M.
    JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2025, 33 (02)
  • [34] Traffic Class Prediction and Prioritization on a Diversified IP Network using Machine Learning
    Brand, Christiaan
    Wolhuter, Riaan
    2009 IEEE GLOBECOM WORKSHOPS, 2009, : 133 - 138
  • [35] Network traffic analysis using machine learning: an unsupervised approach to understand and slice your network
    Aouedi, Ons
    Piamrat, Kandaraj
    Hamma, Salima
    Perera, J. K. Menuka
    ANNALS OF TELECOMMUNICATIONS, 2022, 77 (5-6) : 297 - 309
  • [36] Network traffic analysis using machine learning: an unsupervised approach to understand and slice your network
    Ons Aouedi
    Kandaraj Piamrat
    Salima Hamma
    J. K. Menuka Perera
    Annals of Telecommunications, 2022, 77 : 297 - 309
  • [37] Network Traffic Data Collection for Machine Learning Analysis
    Chao, James
    Rodriguez, Ramiro
    SPIE FUTURE SENSING TECHNOLOGIES 2023, 2023, 12327
  • [38] Machine learning based network traffic classification: a survey
    Shen, Y. (shenyi_1979@njau.edu.cn), 2012, Binary Information Press, Flat F 8th Floor, Block 3, Tanner Garden, 18 Tanner Road, Hong Kong (09):
  • [39] Encrypted network traffic classification based on machine learning
    Elmaghraby, Reham T.
    Aziem, Nada M. Abdel
    Sobh, Mohammed A.
    Bahaa-Eldin, Ayman M.
    AIN SHAMS ENGINEERING JOURNAL, 2024, 15 (02)
  • [40] Network Traffic Obfuscation: An Adversarial Machine Learning Approach
    Verma, Gunjan
    Ciftcioglu, Ertugrul
    Sheatsley, Ryan
    Chan, Kevin
    Scott, Lisa
    2018 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2018), 2018, : 413 - 418