Hybrid Software Classifier of Internet Applications


  • Fatima Aljwari Umm Al-Qura University
  • Hamza Ibrahim Umm Al-Qura University
  • Faraah ALnashri Umm Al-Qura University
  • Aisha ALkamisi Umm Al-Qura University
  • Reem ALkhaldi Umm Al-Qura University


HTTP, WhatsApp, Twitter(X), Classification, Accuracy


Traffic classification refers to the processes used to categorize traffic based on features in the traffic and in accordance with specific classification objectives. In general, there are numerous forests, fields, and aims in the classification of internet traffic. Internet service providers must be aware of the types of traffic that are sent across their network Classifying Internet applications that are carried by computer networks is the specific goal, create a hybrid software classifier that can be applied to the classification of Internet traffic.   Internet service providers (ISPs) attempt to boost bandwidth as a result of rising Internet traffic, but at the same time, more bandwidth is needed for Internet applications. Problems arise from the exponential growth of new internet applications using unregistered ports. The new programs may also contain a lot of viruses and dangerous code. In recent years, traffic classification has drawn more and more attention. With the help of direct and passive observation of the individual packets or stream of packets moving over the network, it seeks to provide the capability of automatically identifying the program that created a specific stream of packets. Data mining (DM) is a method for sifting through enormous databases in search of fresh, obscured, and practical information patterns. The knowledge discovery process includes the DM idea.   This study employs a variety of techniques and functions as a hybrid classification. The foundation of many essential network monitoring and controlling jobs, such as billing, quality of service, security, and trend analyzers, is the classification of networks flows by their application type. Identification of Internet traffic is a crucial tool for network management. It enables operators to more accurately forecast upcoming traffic patterns and demand, and it enables security staff to spot unusual conduct.


. Internet traffic From Wikipedia, the free encyclopedia.

. "Internet traffic classification". National Science Foundation. 2013. Retrieved 18 October 2014.

. IETF RFC 2475 "An Architecture for Differentiated Services" section 2.3.1 - IETF definition of classifier.

. Machine Learning and Data Mining in Pattern Recognition: 8th International Conference, MLDM 2012, Berlin, Germany, July 13-20, 2012, Proceedings.

. Internet traffic classification An Enhancement in performance using classifiers combination, Indra Bahn Arya et al,/(IJCSIT) International Journal of Computer Science and Information Technologies Vol.2(2),2011,663-66.

. Internet Application Traffic Classification Using Fixed IP-Port, Sung-Ho Yoon, Jinn-Wan Park, Jun-Sang Park, Young-Seek Oh, Myung-Sup Kim, Dept. Of Computer and Information Science, Korea University, Korea.

. Network Working Group, J. Reynolds, J. Postal, ISI, October 1994.

. Internet traffic From Wikipedia, the free encyclopedia.

. Patrick Schneider Division of Applied Sciences, Harvard University, 29 Oxford Street, Cambridge, MA 02138, USA Patrick.Schneider@Switzerland.ORG

. Deep Content Inspection vs. Deep Packet Inspection", Wedge Networks Inc., August 2, 2011, accessed August 23, 2011.

. https://en.wikipedia.org/wiki/Traffic_classification

. V. Carela-Espaoll, P. Barlet-Ros, M. Sole-Simo, A. Dainotti, W. de Donato, and A. Pescape

. S. B. Kotsiantis. Supervised machine learning: A review of classification techniques. In Proceeding of the 2007 conference on Emerging Artificial Intelligence Applications in Computer Engineering: Real Word AI Systems with Applications in eHealth, HCI, Information Retrieval and Pervasive Technologies, pages 3–24, Amsterdam, The Netherlands, The Netherlands, 2007. IOS Press

. https://en.wikipedia.org/wiki/WhatsApp

. Twitter via SMS FAQ" Retrieved April 13, 2012.4"

. https://www.w3.org/Protocols/HTTP/AsImplemented.html

. https://en.wikipedia.org/wiki/Hypertext_Transfer_Protocol

. whatis.techtarget.com › ... › IT standards and organizations

. www.cisco.com/c/en/us/products/.../models-comparison.html

. Blake, S., Black, D., Carlson, M., Davies, E., Wang, Z. and W.Weiss, "An Architecture for Differentiated Services", RFC 2475, December 1998.

. https://en.wikipedia.org/wiki/Router_(computing).

. https://en.wikipedia.org/wiki/Smart_device

. www.boosla.com

. Q & A with the founder of “Wireshark and Ethereal ". interview with Gerald combs. protocolTesting.com 24-7-2010.

. www.wireshark.org

. Syed SS, Shanthi S, Chitra VM. Application of Data Mining techniques to model breast cancer data. International Jour¬nal of Emerging Technology and Advanced Engineering. 2013 Nov; 3(11):362–9.

. Bellaachia A, Guven E. Predicting breast cancer survivabil¬ity using data mining techniques. Society for Industrial and Applied Mathematics. 2006; 58(13):1–4.

. Kaur G, Chhabra A. Improved J48 classification algorithm for the prediction of diabetes. International Journal of Computer Applications. 2014 Jul; 98(22):13–7.

. Ian H. Witten, Eibe Frank & Mark A. Hall., “Data MiningPractical Machine Learning Tools and Techniques, Third Edition.” Morgan Kaufmann Publishers is an imprint of Elsevier.[4]

. Dr. B. Srinivasan, P.Mekala, “Mining Social Networking Data for Classification Using REPTree”, International Journal of Advance Research in Computer Science and Management Studies, Volume 2, Issue 10, October 2014 pp-

. "The Random Subspace Method for Constructing Decision Forests" (PDF). IEEE Transactions on Pattern Analysis and Machine Intelligence. 20 (8): 832–844. doi:10.1109/34.709601.

. Hastie, Trevor; Tibshirani, Robert; Friedman, Jerome (2008). The Elements of Statistical Learning (2nd ed.). Springer. ISBN 0-387-95284-5

. http://fiji.sc/javadoc/weka/classifiers/trees/J48graft.html.

. PG and Research Department of Computer Science, D.G. Vaishnav College, Chennai-600106, Tamil Nadu, India; venkatelumalai12@yahoo.co.in, velmurugan_dgvc@yahoo.co.in

. Asstt. Prof., Department of Mathematics and Computer Science, Govt. P.G. College Bareli (M.P.), 464668, India

. M. Thangaraj, Ph.D. Associate Professor Madurai Kamaraj University,Madurai Tamil Nadu,India

. Muppala, Suresh. "Coordinated environment for classification and control of network traffic." U.S. Patent No. 7,742,406. 22 Jun. 2010.?

. Floyd, Sally, and Kevin Fall. "Promoting the use of end-to-end congestion control in the Internet." IEEE/ACM Transactions on networking 7.4 (1999): 458-472.?

. Hirvonen, Matti, and Jukka-Pekka Laulajainen. "Two-phased network traffic classification method for quality of service management." Consumer Electronics, 2009. ISCE'09. IEEE 13th International Symposium on. IEEE, 2009.?

. Samarati, Pierangela, and Sabrina Capitani de Vimercati. "Access control: Policies, models, and mechanisms." International School on Foundations of Security Analysis and Design. Springer Berlin Heidelberg, 2000.

. Garcia, M. N., De Simone, F., Tavakoli, S., Staelens, N., Egger, S., Brunnström, K., & Raake, A. (2014, September). Quality of experience and HTTP adaptive streaming: A review of subjective studies. In 2014 sixth international workshop on quality of multimedia experience (qomex) (pp. 141-146). IEEE.

. Castillo, C., Mendoza, M., & Poblete, B. (2011, March). Information credibility on twitter. In Proceedings of the 20th international conference on World wide web (pp. 675-684).

. Mars, M., Morris, C., & Scott, R. E. (2019). WhatsApp guidelines–what guidelines? A literature review. Journal of telemedicine and telecare, 25(9), 524-529.




How to Cite

Fatima Aljwari, Hamza Ibrahim, Faraah ALnashri, Aisha ALkamisi, & Reem ALkhaldi. (2024). Hybrid Software Classifier of Internet Applications. International Journal of Computer (IJC), 50(1), 79–106. Retrieved from https://ijcjournal.org/index.php/InternationalJournalOfComputer/article/view/2176