Table of Contents Author Guidelines Submit a Manuscript
Mobile Information Systems
Volume 2017, Article ID 3146868, 22 pages
https://doi.org/10.1155/2017/3146868
Research Article

Effective Packet Number for 5G IM WeChat Application at Early Stage Traffic Classification

School of Computer Science and Technology, Harbin Institute of Technology, Harbin 150001, China

Correspondence should be addressed to Xiangzhan Yu; nc.ude.tih@nahzgnaixuy

Received 28 October 2016; Revised 29 December 2016; Accepted 15 January 2017; Published 14 February 2017

Academic Editor: Michal Choras

Copyright © 2017 Muhammad Shafiq and Xiangzhan Yu. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. A. Este, F. Gringoli, and L. Salgarelli, “Support vector machines for TCP traffic classification,” Computer Networks, vol. 53, no. 14, pp. 2476–2490, 2009. View at Publisher · View at Google Scholar · View at Scopus
  2. W. Li and A. W. Moore, “A machine learning approach for efficient traffic classification,” in Proceedings of the 15th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS '07), pp. 310–317, IEEE, Istanbul, Turkey, October 2007. View at Publisher · View at Google Scholar · View at Scopus
  3. A. W. Moore and D. Zuev, “Internet traffic classification using bayesian analysis techniques,” in Proceedings of the ACM SIGMETRICS International Conference On Measurement and Modeling of Computer Systems (SIGMETRICS '05), pp. 50–60, Alberta, Canada, June 2005. View at Publisher · View at Google Scholar · View at Scopus
  4. A. Moore, D. Zuev, and M. Crogan, Discriminators for Use in Flow-Based Classification, Department of Computer Science, Queen Mary and Westfield College, 2005.
  5. F. Palmieri and U. Fiore, “A nonlinear, recurrence-based approach to traffic classification,” Computer Networks, vol. 53, no. 6, pp. 761–773, 2009. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  6. U. Fiore, F. Palmieri, A. Castiglione, and A. De Santis, “Network anomaly detection with the restricted Boltzmann machine,” Neurocomputing, vol. 122, pp. 13–23, 2013. View at Publisher · View at Google Scholar · View at Scopus
  7. A. Dainotti, A. Pescapé, and K. C. Claffy, “Issues and future directions in traffic classification,” IEEE Network, vol. 26, no. 1, pp. 35–40, 2012. View at Publisher · View at Google Scholar · View at Scopus
  8. B. Qu, Z. Zhang, L. Guo, and D. Meng, “On accuracy of early traffic classification,” in Proceedings of the IEEE 7th International Conference on Networking, Architecture and Storage (NAS '12), pp. 348–354, Xiamen, China, June 2012. View at Publisher · View at Google Scholar · View at Scopus
  9. L. Bernaille, R. Teixeira, I. Akodkenou, A. Soule, and K. Salamatian, “Traffic classification on the fly,” ACM SIGCOMM Computer Communication Review, vol. 36, no. 2, pp. 23–26, 2006. View at Google Scholar
  10. N.-F. Huang, G.-Y. Jai, and H.-C. Chao, “Early identifying application traffic with application characteristics,” in Proceedings of the IEEE International Conference on Communications (ICC '08), pp. 5788–5792, Beijing, China, May 2008. View at Publisher · View at Google Scholar · View at Scopus
  11. N.-F. Huang, G.-Y. Jai, H.-C. Chao, Y.-J. Tzang, and H.-Y. Chang, “Application traffic classification at the early stage by characterizing application rounds,” Information Sciences, vol. 232, pp. 130–142, 2013. View at Publisher · View at Google Scholar · View at Scopus
  12. A. Este, F. Gringoli, and L. Salgarelli, “On the stability of the information carried by traffic flow features at the packet level,” SIGCOMM Computer Communication Review, vol. 39, no. 3, pp. 13–18, 2009. View at Google Scholar
  13. A. Rizzi, S. Colabrese, and A. Baiocchi, “Low complexity, high performance neuro-fuzzy system for Internet traffic flows early classification,” in Proceedings of the 9th International Wireless Communications and Mobile Computing Conference (IWCMC '13), pp. 77–82, Sardinia, Italy, July 2013. View at Publisher · View at Google Scholar · View at Scopus
  14. T. T. T. Nguyen, G. Armitage, P. Branch, and S. Zander, “Timely and continuous machine-learning-based classification for interactive IP traffic,” IEEE/ACM Transactions on Networking, vol. 20, no. 6, pp. 1880–1894, 2012. View at Publisher · View at Google Scholar · View at Scopus
  15. A. Dainotti, A. Pescapé, and C. Sansone, “Early classification of network traffic through multi-classification,” in Proceedings of the International Workshop on Traffic Monitoring and Analysis, Springer, Vienna, Austria, April 2011.
  16. L. Peng, B. Yang, and Y. Chen, “Effective packet number for early stage internet traffic identification,” Neurocomputing, vol. 156, pp. 252–267, 2015. View at Publisher · View at Google Scholar · View at Scopus
  17. L. Bernaille, R. Teixeira, I. Akodkenou, A. Soule, and K. Salamatian, “Traffic classification on the fly,” ACM SIGCOMM Computer Communication Review, vol. 36, no. 2, pp. 23–26, 2006. View at Publisher · View at Google Scholar
  18. Y. Lim, H. Kim, J. Jeong, C. Kim, T. Kwon, and Y. Choi, “Internet traffic classification demystified: on the sources of the discriminative power,” in Proceedings of the 6th International Conference on Emerging Networking EXperiments and Technologies (Co-NEXT '10), ACM, Philadelphia, Pa, USA, 2010.
  19. More than 300 million users engage, http://www.chinadaily.com.cn/cndy/2013-01/17/content_16128915.htm.
  20. By the numbers: 50+ Amazing WeChat Statistics, http://expandedramblings.com/index.php/wechat-statistics/.
  21. Q. Huang, P. P. C. Lee, C. He, J. Qian, and C. He, “Fine-grained dissection of WeChat in cellular networks,” in Proceedings of the 23rd IEEE International Symposium on Quality of Service (IWQoS '15), pp. 309–318, Portland, Ore, USA, June 2015. View at Publisher · View at Google Scholar · View at Scopus
  22. K. Church and R. De Oliveira, “What's up with whatsapp?: comparing mobile instant messaging behaviors with traditional SMS,” in Proceedings of the 15th International Conference on Human-Computer Interaction with Mobile Devices and Services (MobileHCI '13), pp. 352–361, ACM, Munich, Germany, August 2013. View at Publisher · View at Google Scholar · View at Scopus
  23. K. P. O'Hara, M. Massimi, R. Harper, S. Rubens, and J. Morris, “Everyday dwelling with whatsApp,” in Proceedings of the 17th ACM Conference on Computer Supported Cooperative Work & Social Computing (CSCW '14), 1142, p. 1131, ACM, Baltimore, Md, USA, February 2014. View at Publisher · View at Google Scholar
  24. P. Fiadino, M. Schiavone, and P. Casas, “Vivisecting whatsapp through large-scale measurements in mobile networks,” ACM SIGCOMM Computer Communication Review, vol. 44, no. 4, pp. 133–134, 2014. View at Publisher · View at Google Scholar
  25. Y. Liu and L. Guo, “An empirical study of video messaging services on smartphones,” in Proceedings of the 24th ACM Workshop on Network and Operating Systems Support for Digital Audio and Video (NOSSDAV '14), pp. 79–84, March 2014. View at Publisher · View at Google Scholar · View at Scopus
  26. M. Shafiq, X. Yu, and A. A. Laghari, “WeChat text messages service flow traffic classification using machine learning technique,” in Proceedings of the 6th International Conference on IT Convergence and Security (ICITCS '16), pp. 1–5, Prague, Czech Republic, September 2016. View at Publisher · View at Google Scholar
  27. Wireshark, http://www.wireshark.org/.
  28. A. Este, F. Gringoli, and L. Salgarelli, “On the stability of the information carried by traffic flow features at the packet level,” ACM SIGCOMM Computer Communication Review, vol. 39, no. 3, pp. 13–18, 2009. View at Google Scholar
  29. H. Peng, F. Long, and C. Ding, “Feature selection based on mutual information: criteria of max-dependency, max-relevance, and min-redundancy,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 27, no. 8, pp. 1226–1238, 2005. View at Publisher · View at Google Scholar · View at Scopus
  30. F. Maes, A. Collignon, D. Vandermeulen, G. Marchal, and P. Suetens, “Multimodality image registration by maximization of mutual information,” IEEE Transactions on Medical Imaging, vol. 16, no. 2, pp. 187–198, 1997. View at Publisher · View at Google Scholar · View at Scopus
  31. L. R. Bahl, P. Brown, P. de Souza, and R. Mercer, “Maximum mutual information estimation of hidden Markov model parameters for speech recognition,” in Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '86), Tokyo, Japan, April 1986. View at Publisher · View at Google Scholar
  32. L. R. Bahl, P. F. Brown, P. V. de Souza, and R. L. Mercer, “Maximum mutual information estimation of hidden Markov model parameters for speech recognition,” in Proceedings of the IEEE-IECEJ-ASJ International Conference on Acoustics, Speech, and Signal Processing (ICASSP '86), vol. 86, pp. 49–52, Tokyo, Japan, April 1986. View at Scopus
  33. H. Peng, Mutual information Matlab toolbox, http://www.mathworks.com/matlabcentral/fileexchange/14888-mutual-information-computation.
  34. “Weka 3: Data Mining Software in Java,” http://www.cs.waikato.ac.nz/ml/weka/.
  35. L. Peng, B. Yang, Y. Chen, and Z. Chen, “Effectiveness of statistical features for early stage internet traffic identification,” International Journal of Parallel Programming, vol. 44, no. 1, pp. 181–197, 2016. View at Publisher · View at Google Scholar · View at Scopus
  36. N. Friedman, D. Geiger, and M. Goldszmidt, “Bayesian network classifiers,” Machine Learning, vol. 29, no. 2-3, pp. 131–163, 1997. View at Publisher · View at Google Scholar · View at Scopus
  37. P. Domingos and M. Pazzani, “On the optimality of the simple Bayesian classifier under zero-one loss,” Machine Learning, vol. 29, no. 2-3, pp. 103–130, 1997. View at Publisher · View at Google Scholar · View at Scopus
  38. M. E. Maron, “Automatic indexing: an experimental inquiry,” Journal of the ACM (JACM), vol. 8, no. 3, pp. 404–417, 1961. View at Publisher · View at Google Scholar · View at Scopus
  39. L. Breiman, “Bagging predictors,” Machine Learning, vol. 24, no. 2, pp. 123–140, 1996. View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  40. Y. Freund and R. E. Schapire, “A desicion-theoretic generalization of on-line learning and an application to boosting,” in Proceedings of the 2nd Eropean Conference on Computational Learning Theory (EuroCOLT '95), Springer, Barcelona, Spain, 1995.
  41. R. C. Holte, “Very simple classification rules perform well on most commonly used datasets,” Machine Learning, vol. 11, no. 1, pp. 63–90, 1993. View at Publisher · View at Google Scholar · View at Scopus
  42. E. Frank and I. H. Witten, “Generating accurate rule sets without global optimization,” in Proceedings of the 15th International Conference on Machine Learning, July 1998.
  43. R. C. Quinlan, 4.5: Programs for Machine Learning, Morgan Kaufmann Publishers Inc, San Francisco, Calif, USA, 1993.
  44. R. Kohavi, “Scaling up the accuracy of naive-bayes classifiers: a decision-tree hybrid,” in Proceedings of the 2nd International Conference on Knowledge Discovery and Data Mining (KDD '96), pp. 202–207, Portland, Ore, USA, August 1996.
  45. V. Svetnik, A. Liaw, C. Tong, J. Christopher Culberson, R. P. Sheridan, and B. P. Feuston, “Random forest: a classification and regression tool for compound classification and QSAR modeling,” Journal of Chemical Information and Computer Sciences, vol. 43, no. 6, pp. 1947–1958, 2003. View at Publisher · View at Google Scholar · View at Scopus
  46. C. Cortes and V. Vapnik, “Support-vector networks,” Machine Learning, vol. 20, no. 3, pp. 273–297, 1995. View at Publisher · View at Google Scholar · View at Scopus
  47. J. Kim, J. Hwang, and K. Kim, “High-performance internet traffic classification using a Markov model and Kullback-Leibler divergence,” Mobile Information Systems, vol. 2016, Article ID 6180527, 13 pages, 2016. View at Publisher · View at Google Scholar · View at Scopus
  48. S. García, A. Fernández, J. Luengo, and F. Herrera, “Advanced nonparametric tests for multiple comparisons in the design of experiments in computational intelligence and data mining: experimental analysis of power,” Information Sciences, vol. 180, no. 10, pp. 2044–2064, 2010. View at Publisher · View at Google Scholar · View at Scopus
  49. F. Gringoli, L. Salgarelli, M. Dusi, N. Cascarano, F. Risso, and K. C. Claffy, “Gt: picking up the truth from the ground for internet traffic,” ACM SIGCOMM Computer Communication Review, vol. 39, no. 5, pp. 12–18, 2009. View at Google Scholar
  50. D. Sheskin, Handbook of Parametric and Nonparametric Statistical Procedures, Chapman and Hall/CRC Press, 2003. View at Publisher · View at Google Scholar
  51. D. Quade, “Using weighted rankings in the analysis of complete blocks with additive block effects,” Journal of the American Statistical Association, vol. 74, no. 367, pp. 680–683, 1979. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  52. J. D. Gibbons and S. Chakraborti, Nonparametric Statistical Inference, Springer, Berlin, Germany, 2011.
  53. J. Makhoul, F. Kubala, R. Schwartz, and R. Weischedel, “Performance measures for information extraction,” in Proceedings of the DARPA Broadcast News Workshop, pp. 249–252, Herndon, Va, USA, February 1999.
  54. D. L. Olson and D. Delen, Advanced Data Mining Techniques, Springer, 1st edition, 2008.
  55. A. P. Bradley, “The use of the area under the ROC curve in the evaluation of machine learning algorithms,” Pattern Recognition, vol. 30, no. 7, pp. 1145–1159, 1997. View at Publisher · View at Google Scholar · View at Scopus