{"id":"https://openalex.org/W1990301041","doi":"https://doi.org/10.1109/icccn.2012.6289243","title":"The Impact of Evasion on the Generalization of Machine Learning Algorithms to Classify VoIP Traffic","display_name":"The Impact of Evasion on the Generalization of Machine Learning Algorithms to Classify VoIP Traffic","publication_year":2012,"publication_date":"2012-07-01","ids":{"openalex":"https://openalex.org/W1990301041","doi":"https://doi.org/10.1109/icccn.2012.6289243","mag":"1990301041"},"language":"en","primary_location":{"id":"doi:10.1109/icccn.2012.6289243","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccn.2012.6289243","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 21st International Conference on Computer Communications and Networks (ICCCN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5064562846","display_name":"Riyad Alshammari","orcid":"https://orcid.org/0000-0002-0529-2458"},"institutions":[{"id":"https://openalex.org/I129902397","display_name":"Dalhousie University","ror":"https://ror.org/01e6qks80","country_code":"CA","type":"education","lineage":["https://openalex.org/I129902397"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Riyad Alshammari","raw_affiliation_strings":["Faculty of Computer Science, Dalhousie University, Halifax, NS, Canada","Fac. of Comput. Sci., Dalhousie Univ., Halifax, NS, Canada#TAB#"],"affiliations":[{"raw_affiliation_string":"Faculty of Computer Science, Dalhousie University, Halifax, NS, Canada","institution_ids":["https://openalex.org/I129902397"]},{"raw_affiliation_string":"Fac. of Comput. Sci., Dalhousie Univ., Halifax, NS, Canada#TAB#","institution_ids":["https://openalex.org/I129902397"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008462534","display_name":"A. Nur Zincir\u2010Heywood","orcid":"https://orcid.org/0000-0003-2796-7265"},"institutions":[{"id":"https://openalex.org/I129902397","display_name":"Dalhousie University","ror":"https://ror.org/01e6qks80","country_code":"CA","type":"education","lineage":["https://openalex.org/I129902397"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"A. Nur Zincir-Heywood","raw_affiliation_strings":["Faculty of Computer Science, Dalhousie University, Halifax, NS, Canada","Fac. of Comput. Sci., Dalhousie Univ., Halifax, NS, Canada#TAB#"],"affiliations":[{"raw_affiliation_string":"Faculty of Computer Science, Dalhousie University, Halifax, NS, Canada","institution_ids":["https://openalex.org/I129902397"]},{"raw_affiliation_string":"Fac. of Comput. Sci., Dalhousie Univ., Halifax, NS, Canada#TAB#","institution_ids":["https://openalex.org/I129902397"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5064562846"],"corresponding_institution_ids":["https://openalex.org/I129902397"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.07310811,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"14","issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.991100013256073,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/voice-over-ip","display_name":"Voice over IP","score":0.8063985109329224},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7694309949874878},{"id":"https://openalex.org/keywords/evasion","display_name":"Evasion (ethics)","score":0.7555975317955017},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.643339991569519},{"id":"https://openalex.org/keywords/traffic-classification","display_name":"Traffic classification","score":0.5043011903762817},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4847659468650818},{"id":"https://openalex.org/keywords/generalization","display_name":"Generalization","score":0.4653834402561188},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.45094916224479675},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3489416837692261},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.19912314414978027},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.13127151131629944},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.09436866641044617},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.07436850666999817}],"concepts":[{"id":"https://openalex.org/C171246234","wikidata":"https://www.wikidata.org/wiki/Q81945","display_name":"Voice over IP","level":3,"score":0.8063985109329224},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7694309949874878},{"id":"https://openalex.org/C2781251061","wikidata":"https://www.wikidata.org/wiki/Q5416089","display_name":"Evasion (ethics)","level":3,"score":0.7555975317955017},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.643339991569519},{"id":"https://openalex.org/C169988225","wikidata":"https://www.wikidata.org/wiki/Q7832484","display_name":"Traffic classification","level":3,"score":0.5043011903762817},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4847659468650818},{"id":"https://openalex.org/C177148314","wikidata":"https://www.wikidata.org/wiki/Q170084","display_name":"Generalization","level":2,"score":0.4653834402561188},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.45094916224479675},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3489416837692261},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.19912314414978027},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.13127151131629944},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.09436866641044617},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.07436850666999817},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C8891405","wikidata":"https://www.wikidata.org/wiki/Q1059","display_name":"Immune system","level":2,"score":0.0},{"id":"https://openalex.org/C203014093","wikidata":"https://www.wikidata.org/wiki/Q101929","display_name":"Immunology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccn.2012.6289243","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccn.2012.6289243","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 21st International Conference on Computer Communications and Networks (ICCCN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320321629","display_name":"Dalhousie University","ror":"https://ror.org/01e6qks80"},{"id":"https://openalex.org/F4320334593","display_name":"Natural Sciences and Engineering Research Council of Canada","ror":"https://ror.org/01h531d29"},{"id":"https://openalex.org/F4320334904","display_name":"National Institute for Materials Science","ror":"https://ror.org/026v1ze26"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W105475431","https://openalex.org/W1608222975","https://openalex.org/W1618185284","https://openalex.org/W1964234701","https://openalex.org/W1997487781","https://openalex.org/W2012095206","https://openalex.org/W2073089243","https://openalex.org/W2097725665","https://openalex.org/W2100002870","https://openalex.org/W2102351657","https://openalex.org/W2119271160","https://openalex.org/W2132481770","https://openalex.org/W2133473417","https://openalex.org/W2134533574","https://openalex.org/W2135088779","https://openalex.org/W2145073242","https://openalex.org/W2150779517","https://openalex.org/W2170079982","https://openalex.org/W2171275292","https://openalex.org/W2751318774","https://openalex.org/W2963110670","https://openalex.org/W3115184262","https://openalex.org/W3151983878","https://openalex.org/W3160447194","https://openalex.org/W4242138061","https://openalex.org/W6604348779","https://openalex.org/W6636391385","https://openalex.org/W6679660968","https://openalex.org/W6681651645"],"related_works":["https://openalex.org/W2084179496","https://openalex.org/W2103238357","https://openalex.org/W2741704743","https://openalex.org/W2262810789","https://openalex.org/W4386040921","https://openalex.org/W2749819919","https://openalex.org/W2993764333","https://openalex.org/W2977917096","https://openalex.org/W2914904360","https://openalex.org/W4313196748"],"abstract_inverted_index":{"We":[0],"propose":[1],"a":[2,16],"novel":[3],"approach":[4],"to":[5,10,80,87],"generate":[6],"well":[7,50],"generalized":[8],"signatures":[9,28,70],"classify":[11],"Skype":[12,62,85],"VoIP":[13],"traffic":[14,38,86],"using":[15],"machine":[17],"learning":[18],"based":[19],"approach.":[20],"Results":[21],"show":[22],"that":[23,39,65],"the":[24,27,59,66,69,76,82,89],"performance":[25,67],"of":[26,61,68,84],"did":[29],"not":[30],"degrade":[31],"significantly":[32],"when":[33],"they":[34],"were":[35],"evaluated":[36],"on":[37,58],"was":[40],"captured":[41],"from":[42],"different":[43,47],"locations":[44],"and":[45],"at":[46],"times":[48],"as":[49,51],"employed":[52],"against":[53],"evasion":[54,60],"attacks.":[55],"Our":[56],"results":[57],"classifier":[63],"demonstrate":[64],"are":[71],"very":[72],"promising":[73],"even":[74],"if":[75],"user":[77],"tries":[78],"maliciously":[79],"alter":[81],"characteristics":[83],"evade":[88],"classifier.":[90]},"counts_by_year":[{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
