Thesis Open Access
tewodros hailu
{ "files": [ { "links": { "self": "https://nadre.ethernet.edu.et/api/files/009d56d9-216c-48e7-8d86-11617febf07b/f1042664640.pdf" }, "checksum": "md5:d45cbd5fd89e1d88df48cadeabb670f7", "bucket": "009d56d9-216c-48e7-8d86-11617febf07b", "key": "f1042664640.pdf", "type": "pdf", "size": 647925 } ], "owners": [ 11 ], "doi": "10.20372/nadre:4488", "stats": {}, "links": { "doi": "https://doi.org/10.20372/nadre:4488", "conceptdoi": "https://doi.org/10.20372/nadre:4487", "bucket": "https://nadre.ethernet.edu.et/api/files/009d56d9-216c-48e7-8d86-11617febf07b", "conceptbadge": "https://nadre.ethernet.edu.et/badge/doi/10.20372/nadre%3A4487.svg", "html": "https://nadre.ethernet.edu.et/record/4488", "latest_html": "https://nadre.ethernet.edu.et/record/4488", "badge": "https://nadre.ethernet.edu.et/badge/doi/10.20372/nadre%3A4488.svg", "latest": "https://nadre.ethernet.edu.et/api/records/4488" }, "conceptdoi": "10.20372/nadre:4487", "created": "2024-12-02T09:51:54.170624+00:00", "updated": "2024-12-02T09:51:56.606142+00:00", "conceptrecid": "4487", "revision": 3, "id": 4488, "metadata": { "access_right_category": "success", "doi": "10.20372/nadre:4488", "description": "<p>Over-the-Top (OTT) bypass is a type of Interconnect Bypass fraud where regular<br>\nvoice calls are rerouted through OTT network and terminated as an OTT call. These<br>\ncalls are terminated using OTT applications which need user’s Mobile Station International<br>\nSubscriber Directory Number (MSISDN) for authentication. Detecting<br>\nOTT voice call packets through different network traffic classification techniques is<br>\none subtask in the detection of this fraud.<br>\nIn this thesis, performance of three machine learning algorithms; Adaptive Booster<br>\n(AdaBoost) + J48, Repeated Incremental Pruning to Produce Error Reduction (RIPPER),<br>\nand Support Vector Machine (SVM) is evaluated in detecting MSISDN-based OTT<br>\npackets taking Viber, Tango, and Telegram as a sample. Detection of OTT traffic<br>\nand voice call packets from the OTT traffic have been treated separately as classification<br>\ntasks. Ten cross-fold and separate test data validation techniques together<br>\nwith 1.7 million labeled packets generated and captured in controlled laboratory<br>\nenvironment are used in the evaluation process.<br>\nAdaBoost + J48 achieved the best accuracy on both classification tasks compared to<br>\nthe others while using ten cross-fold validation. However, an accuracy of 48.4%<br>\nobtained in detecting voice call packets while using separate test data validation<br>\nmakes it less preferable in the classification task. Even if it takes longer time to<br>\ntrain SVM, it was the best performer (95.35% accurate) in detecting voice call packets<br>\nin separate test data validation. Considering accuracy attained by the algorithms<br>\nin separate test data validation technique together with the detection rate<br>\nof OTT voice call packets, SVM is preferable than the other two algorithms</p>", "license": { "id": "cc-by" }, "title": "Network Traffic Classification Using Machine Learning: A Step Towards Over-the-Top Bypass Fraud Detection", "relations": { "version": [ { "count": 1, "index": 0, "parent": { "pid_type": "recid", "pid_value": "4487" }, "is_last": true, "last_child": { "pid_type": "recid", "pid_value": "4488" } } ] }, "communities": [ { "id": "aau" }, { "id": "zenodo" } ], "publication_date": "2018-11-14", "creators": [ { "name": "tewodros hailu" } ], "access_right": "open", "resource_type": { "subtype": "thesis", "type": "publication", "title": "Thesis" }, "related_identifiers": [ { "scheme": "doi", "identifier": "10.20372/nadre:4487", "relation": "isVersionOf" } ] } }
All versions | This version | |
---|---|---|
Views | 0 | 0 |
Downloads | 0 | 0 |
Data volume | 0 Bytes | 0 Bytes |
Unique views | 0 | 0 |
Unique downloads | 0 | 0 |