{"id":"https://openalex.org/W4313484697","doi":"https://doi.org/10.1109/acit57182.2022.9994184","title":"A Classifier to Detect Stream Applications Based on Network Traffic Statistical Metrics","display_name":"A Classifier to Detect Stream Applications Based on Network Traffic Statistical Metrics","publication_year":2022,"publication_date":"2022-11-22","ids":{"openalex":"https://openalex.org/W4313484697","doi":"https://doi.org/10.1109/acit57182.2022.9994184"},"language":"en","primary_location":{"id":"doi:10.1109/acit57182.2022.9994184","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/acit57182.2022.9994184","pdf_url":null,"source":{"id":"https://openalex.org/S4363608405","display_name":"2022 International Arab Conference on Information Technology (ACIT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 International Arab Conference on Information Technology (ACIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5091723521","display_name":"Omar Darwish","orcid":"https://orcid.org/0000-0001-8346-7148"},"institutions":[{"id":"https://openalex.org/I138216421","display_name":"Eastern Michigan University","ror":"https://ror.org/02ehshm78","country_code":"US","type":"education","lineage":["https://openalex.org/I138216421"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Omar Darwish","raw_affiliation_strings":["Eastern Michigan University,Information Security and Applied Computing,Ypsilanti,Michigan","Information Security and Applied Computing, Eastern Michigan University, Ypsilanti, Michigan"],"affiliations":[{"raw_affiliation_string":"Eastern Michigan University,Information Security and Applied Computing,Ypsilanti,Michigan","institution_ids":["https://openalex.org/I138216421"]},{"raw_affiliation_string":"Information Security and Applied Computing, Eastern Michigan University, Ypsilanti, Michigan","institution_ids":["https://openalex.org/I138216421"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020301697","display_name":"Sarah Herzallah","orcid":null},"institutions":[{"id":"https://openalex.org/I138216421","display_name":"Eastern Michigan University","ror":"https://ror.org/02ehshm78","country_code":"US","type":"education","lineage":["https://openalex.org/I138216421"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sarah Herzallah","raw_affiliation_strings":["Eastern Michigan University,Electrical and Computer Engineering,Ypsilanti,Michigan","Electrical and Computer Engineering, Eastern Michigan University, Ypsilanti, Michigan"],"affiliations":[{"raw_affiliation_string":"Eastern Michigan University,Electrical and Computer Engineering,Ypsilanti,Michigan","institution_ids":["https://openalex.org/I138216421"]},{"raw_affiliation_string":"Electrical and Computer Engineering, Eastern Michigan University, Ypsilanti, Michigan","institution_ids":["https://openalex.org/I138216421"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052028161","display_name":"Majdi Maabreh","orcid":"https://orcid.org/0000-0003-4822-417X"},"institutions":[{"id":"https://openalex.org/I157392197","display_name":"Hashemite University","ror":"https://ror.org/04a1r5z94","country_code":"JO","type":"education","lineage":["https://openalex.org/I157392197"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Majdi Maabreh","raw_affiliation_strings":["The Hashemite University,Department of Information Technology,Zarqa,Jordan","Department of Information Technology, The Hashemite University, Zarqa, Jordan"],"affiliations":[{"raw_affiliation_string":"The Hashemite University,Department of Information Technology,Zarqa,Jordan","institution_ids":["https://openalex.org/I157392197"]},{"raw_affiliation_string":"Department of Information Technology, The Hashemite University, Zarqa, Jordan","institution_ids":["https://openalex.org/I157392197"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064500908","display_name":"Shouroq Al-Eidi","orcid":null},"institutions":[{"id":"https://openalex.org/I114432678","display_name":"Tafila Technical University","ror":"https://ror.org/04jzmk773","country_code":"JO","type":"education","lineage":["https://openalex.org/I114432678"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Shouroq Al-Eidi","raw_affiliation_strings":["Tafila Technical University,Computer Science Department,Tafila,Jordan","Computer Science Department, Tafila Technical University, Tafila, Jordan"],"affiliations":[{"raw_affiliation_string":"Tafila Technical University,Computer Science Department,Tafila,Jordan","institution_ids":["https://openalex.org/I114432678"]},{"raw_affiliation_string":"Computer Science Department, Tafila Technical University, Tafila, Jordan","institution_ids":["https://openalex.org/I114432678"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068496827","display_name":"Mahmoud Al-Maani","orcid":null},"institutions":[{"id":"https://openalex.org/I138216421","display_name":"Eastern Michigan University","ror":"https://ror.org/02ehshm78","country_code":"US","type":"education","lineage":["https://openalex.org/I138216421"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mahmoud Al-Maani","raw_affiliation_strings":["Eastern Michigan University,Information Security and Applied Computing,Ypsilanti,Michigan","Information Security and Applied Computing, Eastern Michigan University, Ypsilanti, Michigan"],"affiliations":[{"raw_affiliation_string":"Eastern Michigan University,Information Security and Applied Computing,Ypsilanti,Michigan","institution_ids":["https://openalex.org/I138216421"]},{"raw_affiliation_string":"Information Security and Applied Computing, Eastern Michigan University, Ypsilanti, Michigan","institution_ids":["https://openalex.org/I138216421"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5009036501","display_name":"Yahya Tashtoush","orcid":"https://orcid.org/0000-0002-4248-8732"},"institutions":[{"id":"https://openalex.org/I156983542","display_name":"Jordan University of Science and Technology","ror":"https://ror.org/03y8mtb59","country_code":"JO","type":"education","lineage":["https://openalex.org/I156983542"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Yahya Tashtoush","raw_affiliation_strings":["Jordan University of Science and Technology,Department of Computer Science,Irbid,Jordan","Department of Computer Science, Jordan University of Science and Technology, Irbid, Jordan"],"affiliations":[{"raw_affiliation_string":"Jordan University of Science and Technology,Department of Computer Science,Irbid,Jordan","institution_ids":["https://openalex.org/I156983542"]},{"raw_affiliation_string":"Department of Computer Science, Jordan University of Science and Technology, Irbid, Jordan","institution_ids":["https://openalex.org/I156983542"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5091723521"],"corresponding_institution_ids":["https://openalex.org/I138216421"],"apc_list":null,"apc_paid":null,"fwci":0.4324,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.52280311,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"35","issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10138","display_name":"Network Traffic and Congestion Control","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8446187376976013},{"id":"https://openalex.org/keywords/zoom","display_name":"Zoom","score":0.7198640704154968},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.6174569725990295},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5534994006156921},{"id":"https://openalex.org/keywords/covert","display_name":"Covert","score":0.545511782169342},{"id":"https://openalex.org/keywords/deep-packet-inspection","display_name":"Deep packet inspection","score":0.538986325263977},{"id":"https://openalex.org/keywords/traffic-analysis","display_name":"Traffic analysis","score":0.5238463878631592},{"id":"https://openalex.org/keywords/traffic-classification","display_name":"Traffic classification","score":0.49788975715637207},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4859963357448578},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.44523531198501587},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.42438799142837524},{"id":"https://openalex.org/keywords/web-traffic","display_name":"Web traffic","score":0.42364779114723206},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.42044389247894287},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3335530459880829},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3302258253097534},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.13309785723686218}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8446187376976013},{"id":"https://openalex.org/C124913957","wikidata":"https://www.wikidata.org/wiki/Q1232548","display_name":"Zoom","level":3,"score":0.7198640704154968},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.6174569725990295},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5534994006156921},{"id":"https://openalex.org/C2779338814","wikidata":"https://www.wikidata.org/wiki/Q5179285","display_name":"Covert","level":2,"score":0.545511782169342},{"id":"https://openalex.org/C204679922","wikidata":"https://www.wikidata.org/wiki/Q734252","display_name":"Deep packet inspection","level":3,"score":0.538986325263977},{"id":"https://openalex.org/C2781317605","wikidata":"https://www.wikidata.org/wiki/Q7832483","display_name":"Traffic analysis","level":2,"score":0.5238463878631592},{"id":"https://openalex.org/C169988225","wikidata":"https://www.wikidata.org/wiki/Q7832484","display_name":"Traffic classification","level":3,"score":0.49788975715637207},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4859963357448578},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.44523531198501587},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.42438799142837524},{"id":"https://openalex.org/C2777672014","wikidata":"https://www.wikidata.org/wiki/Q1172573","display_name":"Web traffic","level":3,"score":0.42364779114723206},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.42044389247894287},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3335530459880829},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3302258253097534},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.13309785723686218},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C15336307","wikidata":"https://www.wikidata.org/wiki/Q1766051","display_name":"Lens (geology)","level":2,"score":0.0},{"id":"https://openalex.org/C78762247","wikidata":"https://www.wikidata.org/wiki/Q1273174","display_name":"Petroleum engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/acit57182.2022.9994184","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/acit57182.2022.9994184","pdf_url":null,"source":{"id":"https://openalex.org/S4363608405","display_name":"2022 International Arab Conference on Information Technology (ACIT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 International Arab Conference on Information Technology (ACIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Good health and well-being","score":0.7300000190734863,"id":"https://metadata.un.org/sdg/3"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1513886380","https://openalex.org/W1516506771","https://openalex.org/W1521553548","https://openalex.org/W1559810148","https://openalex.org/W1976515580","https://openalex.org/W1978282450","https://openalex.org/W2039156677","https://openalex.org/W2062401262","https://openalex.org/W2096118443","https://openalex.org/W2112684840","https://openalex.org/W2119271160","https://openalex.org/W2144098589","https://openalex.org/W2156123711","https://openalex.org/W2171634548","https://openalex.org/W2613548641","https://openalex.org/W2914899172","https://openalex.org/W3129726290"],"related_works":["https://openalex.org/W2964663688","https://openalex.org/W3171671300","https://openalex.org/W4399181772","https://openalex.org/W2062731068","https://openalex.org/W4293901154","https://openalex.org/W4293088549","https://openalex.org/W4296473472","https://openalex.org/W3174245262","https://openalex.org/W1917343041","https://openalex.org/W3007491104"],"abstract_inverted_index":{"One":[0],"of":[1,36,77,82,110,114,133,142,157],"the":[2,21,34,37,78,99,107,134,140],"most":[3],"crucial":[4,50],"considerations,":[5],"when":[6],"considering":[7],"security":[8],"vulnerabilities,":[9],"is":[10,14,117],"network":[11,31],"traffic.":[12],"There":[13],"still":[15],"potential":[16],"for":[17,119],"more":[18],"research":[19],"on":[20,30,67,128],"inter-arrival":[22,80],"time":[23],"side,":[24],"even":[25],"though":[26],"some":[27],"studies":[28],"concentrate":[29],"traffic":[32,141],"from":[33],"perspective":[35],"packet":[38,42,45],"fields":[39],"such":[40,58],"as":[41,59],"length":[43],"and":[44,89,97,106,130,144],"number.":[46],"Inter-arrival":[47],"timings":[48],"are":[49,55,92,126],"to":[51,159],"investigate":[52],"because":[53],"there":[54],"numerous":[56],"attacks,":[57,63],"Covert":[60],"Timing":[61],"Channels":[62],"that":[64,139],"heavily":[65],"rely":[66],"them.":[68],"In":[69],"this":[70,120],"article,":[71],"we":[72],"conduct":[73],"a":[74,112],"statistical":[75,108],"analysis":[76],"TCP":[79],"times":[81],"two":[83,103],"major":[84],"key":[85],"streaming":[86],"programs":[87],"(Zoom":[88],"Skype),":[90],"which":[91],"frequently":[93],"used,":[94],"particularly":[95],"during":[96],"following":[98],"COVID-19":[100],"pandemic.":[101],"Using":[102],"internet-connected":[104],"devices":[105],"measures":[109],"TCP,":[111],"dataset":[113],"18,371":[115],"instances":[116],"created":[118],"use.":[121],"Five":[122],"machine":[123,151],"learning":[124,152],"algorithms":[125,153],"evaluated":[127],"balanced":[129],"imbalanced":[131],"forms":[132],"dataset.":[135],"The":[136],"results":[137],"revealed":[138],"Zoom":[143],"Skype":[145],"calls":[146],"can":[147],"be":[148],"identified":[149],"by":[150,161],"with":[154],"an":[155],"accuracy":[156],"up":[158],"99%":[160],"random":[162],"forest.":[163]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2025-12-21T23:12:01.093139","created_date":"2025-10-10T00:00:00"}
