An analysis of clustering objectives for feature selection applied to encrypted traffic identification