Thesis Open Access
tewodros hailu
{
"files": [
{
"links": {
"self": "https://nadre.ethernet.edu.et/api/files/009d56d9-216c-48e7-8d86-11617febf07b/f1042664640.pdf"
},
"checksum": "md5:d45cbd5fd89e1d88df48cadeabb670f7",
"bucket": "009d56d9-216c-48e7-8d86-11617febf07b",
"key": "f1042664640.pdf",
"type": "pdf",
"size": 647925
}
],
"owners": [
11
],
"doi": "10.20372/nadre:4488",
"stats": {},
"links": {
"doi": "https://doi.org/10.20372/nadre:4488",
"conceptdoi": "https://doi.org/10.20372/nadre:4487",
"bucket": "https://nadre.ethernet.edu.et/api/files/009d56d9-216c-48e7-8d86-11617febf07b",
"conceptbadge": "https://nadre.ethernet.edu.et/badge/doi/10.20372/nadre%3A4487.svg",
"html": "https://nadre.ethernet.edu.et/record/4488",
"latest_html": "https://nadre.ethernet.edu.et/record/4488",
"badge": "https://nadre.ethernet.edu.et/badge/doi/10.20372/nadre%3A4488.svg",
"latest": "https://nadre.ethernet.edu.et/api/records/4488"
},
"conceptdoi": "10.20372/nadre:4487",
"created": "2024-12-02T09:51:54.170624+00:00",
"updated": "2024-12-02T09:51:56.606142+00:00",
"conceptrecid": "4487",
"revision": 3,
"id": 4488,
"metadata": {
"access_right_category": "success",
"doi": "10.20372/nadre:4488",
"description": "<p>Over-the-Top (OTT) bypass is a type of Interconnect Bypass fraud where regular<br>\nvoice calls are rerouted through OTT network and terminated as an OTT call. These<br>\ncalls are terminated using OTT applications which need user’s Mobile Station International<br>\nSubscriber Directory Number (MSISDN) for authentication. Detecting<br>\nOTT voice call packets through different network traffic classification techniques is<br>\none subtask in the detection of this fraud.<br>\nIn this thesis, performance of three machine learning algorithms; Adaptive Booster<br>\n(AdaBoost) + J48, Repeated Incremental Pruning to Produce Error Reduction (RIPPER),<br>\nand Support Vector Machine (SVM) is evaluated in detecting MSISDN-based OTT<br>\npackets taking Viber, Tango, and Telegram as a sample. Detection of OTT traffic<br>\nand voice call packets from the OTT traffic have been treated separately as classification<br>\ntasks. Ten cross-fold and separate test data validation techniques together<br>\nwith 1.7 million labeled packets generated and captured in controlled laboratory<br>\nenvironment are used in the evaluation process.<br>\nAdaBoost + J48 achieved the best accuracy on both classification tasks compared to<br>\nthe others while using ten cross-fold validation. However, an accuracy of 48.4%<br>\nobtained in detecting voice call packets while using separate test data validation<br>\nmakes it less preferable in the classification task. Even if it takes longer time to<br>\ntrain SVM, it was the best performer (95.35% accurate) in detecting voice call packets<br>\nin separate test data validation. Considering accuracy attained by the algorithms<br>\nin separate test data validation technique together with the detection rate<br>\nof OTT voice call packets, SVM is preferable than the other two algorithms</p>",
"license": {
"id": "cc-by"
},
"title": "Network Traffic Classification Using Machine Learning: A Step Towards Over-the-Top Bypass Fraud Detection",
"relations": {
"version": [
{
"count": 1,
"index": 0,
"parent": {
"pid_type": "recid",
"pid_value": "4487"
},
"is_last": true,
"last_child": {
"pid_type": "recid",
"pid_value": "4488"
}
}
]
},
"communities": [
{
"id": "aau"
},
{
"id": "zenodo"
}
],
"publication_date": "2018-11-14",
"creators": [
{
"name": "tewodros hailu"
}
],
"access_right": "open",
"resource_type": {
"subtype": "thesis",
"type": "publication",
"title": "Thesis"
},
"related_identifiers": [
{
"scheme": "doi",
"identifier": "10.20372/nadre:4487",
"relation": "isVersionOf"
}
]
}
}
| All versions | This version | |
|---|---|---|
| Views | 0 | 0 |
| Downloads | 0 | 0 |
| Data volume | 0 Bytes | 0 Bytes |
| Unique views | 0 | 0 |
| Unique downloads | 0 | 0 |