{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T21:24:21Z","timestamp":1774646661847,"version":"3.50.1"},"reference-count":36,"publisher":"Elsevier BV","issue":"12","license":[{"start":{"date-parts":[[2012,7,1]],"date-time":"2012-07-01T00:00:00Z","timestamp":1341100800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Communications"],"published-print":{"date-parts":[[2012,7]]},"DOI":"10.1016\/j.comcom.2012.04.012","type":"journal-article","created":{"date-parts":[[2012,4,16]],"date-time":"2012-04-16T14:43:36Z","timestamp":1334587416000},"page":"1457-1471","source":"Crossref","is-referenced-by-count":84,"title":["Feature selection for optimizing traffic classification"],"prefix":"10.1016","volume":"35","author":[{"given":"Hongli","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Gang","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Mahmoud T.","family":"Qassrawi","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Xiangzhan","family":"Yu","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.comcom.2012.04.012_b0005","doi-asserted-by":"crossref","unstructured":"A.W. Moore, D. Panpagiannaki, Toward the accurate identification of network applications, in: Proceedings of the Sixth Passive and Active Measurement Workshop (PAM 2005), Boston, USA, 2005, pp. 41\u201354.","DOI":"10.1007\/978-3-540-31966-5_4"},{"key":"10.1016\/j.comcom.2012.04.012_b0010","doi-asserted-by":"crossref","unstructured":"S. Sen, Oliver Spatscheck, Dongmei Wang, Accurate, scalable in-network identification of P2P traffic using application signatures, in: Proceedings of the 13th International Conference on World Wide Web, New York, USA, May, 2004, pp. 512\u2013521.","DOI":"10.1145\/988672.988742"},{"key":"10.1016\/j.comcom.2012.04.012_b0015","unstructured":"Thomas Karagiannis, Application-specific payload bit strings, http:\/\/www.cs.ucr.edu\/~tkarag\/papers\/strings.txt, Novemeber 2004."},{"key":"10.1016\/j.comcom.2012.04.012_b0020","unstructured":"H. Patrick, S. Subhabrata, O. Spatschek, D. Wang, ACAS: automated construction of application signatures, in: Proceedings of the 2005 ACM SIGCOMM Workshop on Mining Network Data. Philadelphia, Pennsylvania, USA, 2005, pp. 197\u2013202."},{"issue":"4","key":"10.1016\/j.comcom.2012.04.012_b0025","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1145\/1851275.1851194","article-title":"Internet Inter-Domain traffic","volume":"40","author":"Labovitz","year":"2010","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"10.1016\/j.comcom.2012.04.012_b0030","doi-asserted-by":"crossref","unstructured":"J. Erman, A. Mahanti, M. Arlitt, Byte me: a case for byte accuracy in traffic classification, in: Joint International Conference on Measurement and Modeling of Computer Systems Proceedings of the 3rd annual ACM workshop on Mining network data, California, USA, June, 2007, pp. 35\u201337.","DOI":"10.1145\/1269880.1269890"},{"key":"10.1016\/j.comcom.2012.04.012_b0035","doi-asserted-by":"crossref","unstructured":"L. Peng, H. Zhang, B. Yang, Y.H. Chen, M.T. Qassrawi, G. Lu, Traffic identification using flexible neural trees, in: Proceedings of the 18th International Workshop on Quality of Service (IWQoS), Beijing, China, June 2010, pp. 1\u20135.","DOI":"10.1109\/IWQoS.2010.5542729"},{"key":"10.1016\/j.comcom.2012.04.012_b0040","doi-asserted-by":"crossref","unstructured":"G. Lu, H. Zhang, X. Sha, C. Chen, L. Peng, TCFOM: a robust traffic classification framework based on OC-SVM combined with MC-SVM, in: 2010 International Conference on Communications and Intelligence Information Security (ICCIIS), Nanning, China, October, 2010, pp. 180\u2013186, http:\/\/dx.doi.org\/10.1109\/ICCIIS.2010.57","DOI":"10.1109\/ICCIIS.2010.57"},{"key":"10.1016\/j.comcom.2012.04.012_b0045","doi-asserted-by":"crossref","unstructured":"A.W. Moore, D. Zuev, Internet traffic classification using bayesian analysis techniques, in: Proceedings of the 2005 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, Canada, 2005, pp. 50\u201360.","DOI":"10.1145\/1064212.1064220"},{"issue":"1","key":"10.1016\/j.comcom.2012.04.012_b0050","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1109\/TNN.2006.883010","article-title":"Bayesian neural networks for internet traffic classification","volume":"18","author":"Auld","year":"2007","journal-title":"IEEE Trans. Neural Networks"},{"key":"10.1016\/j.comcom.2012.04.012_b0055","doi-asserted-by":"crossref","unstructured":"D.A. Cieslak, N.V. Chawla, A. Striegel, Combating imbalance in network intrusion datasets, in: IEEE International conference on Granular Computing, Athens, Georgia, May, 2006, pp. 732\u2013737.","DOI":"10.1109\/GRC.2006.1635905"},{"key":"10.1016\/j.comcom.2012.04.012_b0060","doi-asserted-by":"crossref","unstructured":"D. Nechay, Y. Pointurier, M. Coates, Controlling false alarm\/discovery rates in online internet traffic flow classification, in: Proceedings of the IEEE Conference on Computer Communications (INFOCOM), Brazil, April, 2009, pp. 684\u2013692.","DOI":"10.1109\/INFCOM.2009.5061976"},{"issue":"6","key":"10.1016\/j.comcom.2012.04.012_b0065","doi-asserted-by":"crossref","first-page":"790","DOI":"10.1016\/j.comnet.2008.11.016","article-title":"Efficient application identification and the temporal and spatial stability of classification schema","volume":"53","author":"Li","year":"2009","journal-title":"Computer Networks"},{"issue":"10","key":"10.1016\/j.comcom.2012.04.012_b0070","doi-asserted-by":"crossref","first-page":"2236","DOI":"10.1016\/j.comcom.2007.05.005","article-title":"Predictive connectionist approach for VOD bandwidth management","volume":"30","author":"Gomes","year":"2007","journal-title":"Comput. Commun."},{"key":"10.1016\/j.comcom.2012.04.012_b0075","doi-asserted-by":"crossref","unstructured":"X. Chen, M. Wasikowski, FAST: a ROC-based feature selection metric for small samples and imbalanced data classification problems, in: Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, New York, USA, 2008, pp. 124\u2013133.","DOI":"10.1145\/1401890.1401910"},{"issue":"1\u20132","key":"10.1016\/j.comcom.2012.04.012_b0080","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1023\/B:MACH.0000035476.95130.99","article-title":"A bias-variance analysis of a real world learning problem: the CoIL challenge 2000","volume":"57","author":"der Putten","year":"2004","journal-title":"Mach. Learn."},{"key":"10.1016\/j.comcom.2012.04.012_b0085","unstructured":"L. Dai, X.C. Yun, J. Xiao, Optimizing traffic classification using hybrid feature selection, in: The Ninth International Conference on Web-Age Information Management, Hunan, China, July, 2008."},{"key":"10.1016\/j.comcom.2012.04.012_b0090","doi-asserted-by":"crossref","unstructured":"Y. Lim, H. Kim, J. Jeong, C. Kim, T. Kwon, Y. Choi, Internet traffic classification demystified: on the sources of the discriminative power, in: Proceedings of the 6th International Conference (Co-NEXT \u201810), ACM, New York, USA, November, 2010, http:\/\/dx.doi.org\/10.1145\/1921168.1921180.","DOI":"10.1145\/1921168.1921180"},{"key":"10.1016\/j.comcom.2012.04.012_b0095","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1145\/1007730.1007741","article-title":"Feature reduction for text categorization on imbalanced data","volume":"6","author":"Zheng","year":"2004","journal-title":"ACM SIGKDD Explorat. Newslett."},{"key":"10.1016\/j.comcom.2012.04.012_b0100","doi-asserted-by":"crossref","unstructured":"A.H.M. Kamal, X. Zhu, A. Pandya, S. Hsu, Feature selection with biased sample distribution, in: IEEE International conference on Information Reuse & Integration, Las Vegas, USA, August, 2009.","DOI":"10.1109\/IRI.2009.5211613"},{"key":"10.1016\/j.comcom.2012.04.012_b0105","doi-asserted-by":"crossref","first-page":"1388","DOI":"10.1109\/TKDE.2009.187","article-title":"Combating the small sample class imbalance problem using feature selection","volume":"22","author":"Wasikowski","year":"2010","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"10.1016\/j.comcom.2012.04.012_b0110","unstructured":"L. Yu, H. Liu, Feature selection for high-dimensional data: a fast correlation-based filter solution, in: Proceedings of the Twentieth International Conference on Machine Learning, Washington DC, USA, 2003."},{"issue":"2","key":"10.1016\/j.comcom.2012.04.012_b0115","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1007\/s12083-008-0022-6","article-title":"Exploiting unlabeled data to improve peer-to-peer traffic classification using incremental tri-training method","volume":"2","author":"Raahemi","year":"2009","journal-title":"J. Peer-to-Peer Networking Appl."},{"key":"10.1016\/j.comcom.2012.04.012_b0120","first-page":"1289","article-title":"An extensive empirical study of feature selection metrics for text classification","volume":"3","author":"Forman","year":"2003","journal-title":"J. Mach. Learn. Res."},{"key":"10.1016\/j.comcom.2012.04.012_b0125","unstructured":"I. Kononenko, On biases in estimating multi-valued attributes, in: 14th International Joint conference on Artificial Intelligence, San Francisco, USA, 1995, pp. 1034\u20131040."},{"key":"10.1016\/j.comcom.2012.04.012_b0130","unstructured":"Cambridge data sets [Online]. http:\/\/www.cl.cam.ac.uk\/research\/srg\/netos\/nprobe\/data\/papers\/sigmetrics\/index.html."},{"key":"10.1016\/j.comcom.2012.04.012_b0135","unstructured":"Weka tools [Online]. http:\/\/www.cs.waikato.ac.nz\/ml\/weka\/."},{"key":"10.1016\/j.comcom.2012.04.012_b0140","unstructured":"tcptrace \u2013 Official Homepage.\u201d Available: http:\/\/www.tcptrace.org\/."},{"key":"10.1016\/j.comcom.2012.04.012_b0145","unstructured":"A.W. Moore, D. Zuev, Discriminators for use in flow-based classification, Technical report, Intel Research, Cambridge, 2005."},{"key":"10.1016\/j.comcom.2012.04.012_b0150","unstructured":"UNIBS data sets [Online]. http:\/\/www.ing.unibs.it\/ntw\/tools\/traces\/download."},{"key":"10.1016\/j.comcom.2012.04.012_b0155","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1145\/1629607.1629610","article-title":"GT: picking up the truth from the ground for Internet traffic","volume":"39","author":"Gringoli","year":"2009","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"10.1016\/j.comcom.2012.04.012_b0160","unstructured":"Tcpdump [Online]. http:\/\/www.tcpdump.org\/."},{"key":"10.1016\/j.comcom.2012.04.012_b0165","unstructured":"G. John, P. Langley, Estimating continuous distributions in Bayesian Classifiers, in: Proceedings of the Eleventh Conference on Uncertainty in Artificial Intelligence, san Mateo, USA, 1995."},{"key":"10.1016\/j.comcom.2012.04.012_b0170","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1007\/BF00116251","article-title":"Induction of decision trees","volume":"1","author":"Quinlan","year":"1986","journal-title":"J. Mach. Learn."},{"issue":"5","key":"10.1016\/j.comcom.2012.04.012_b0175","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1145\/1163593.1163596","article-title":"A preliminary performance comparison of five machine learning algorithms for practical IP traffic flow classification","volume":"36","author":"Williams","year":"2006","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"10.1016\/j.comcom.2012.04.012_b0180","doi-asserted-by":"crossref","unstructured":"L.C. Molina, L. Belanche, A. Nebot, Feature selection algorithms: a survey and experimental evaluation, in: IEEE International Conference on data mining, Maebashi City, Japan, 2002, pp. 306\u2013313.","DOI":"10.1109\/ICDM.2002.1183917"}],"container-title":["Computer Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366412001259?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366412001259?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,6,27]],"date-time":"2019-06-27T07:00:57Z","timestamp":1561618857000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0140366412001259"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,7]]},"references-count":36,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2012,7]]}},"alternative-id":["S0140366412001259"],"URL":"https:\/\/doi.org\/10.1016\/j.comcom.2012.04.012","relation":{},"ISSN":["0140-3664"],"issn-type":[{"value":"0140-3664","type":"print"}],"subject":[],"published":{"date-parts":[[2012,7]]}}}