Title | ||
---|---|---|
A Reliable Network Identification Method Based on Transition Pattern of Payload Length |
Abstract | ||
---|---|---|
In recent years, information leakage through the Internet has become a new social problem. Many information leakage incidents are caused by illegal applications such as Peer-to-Peer (P2P) file sharing software. To prevent information leakage, early detection and blocking of the traffic exchanged by illegal applications is strongly required. We have proposed a method for application identification based on the transition pattern of payload length of startup phase of the communication. The method can identify applications without using port numbers, which can be easily spoofed. However, the method can identify only applications which the method learned and cannot discriminate unlearned applications. In this paper, we propose a new application identification method by introducing "Unknown" category to handle flows of unlearned applications. |
Year | DOI | Venue |
---|---|---|
2008 | 10.1109/GLOCOM.2008.ECP.370 | IEEE Global Telecommunications Conference (Globecom) |
Keywords | Field | DocType |
accuracy,network management,internet,clustering algorithms,social problems,payloads,p2p,internet traffic,classification algorithms,file sharing | Information leakage,Spoofing attack,Computer science,Computer network,Real-time computing,Statistical classification,Network management,File sharing,Internet traffic,Payload,The Internet | Conference |
ISSN | Citations | PageRank |
1930-529X | 0 | 0.34 |
References | Authors | |
9 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Shinnosuke Yagi | 1 | 0 | 0.34 |
Yuji Waizumi | 2 | 37 | 5.86 |
Hiroshi Tsunoda | 3 | 55 | 7.04 |
Yoshiaki Nemoto | 4 | 920 | 70.38 |