Paper Abstract and Keywords |
Presentation |
2007-11-15 16:25
[Encouragement Talk]
An evaluation of transition pattern of payload legnth for network application identification Shinnosuke Yagi, Yuji Waizumi, Hiroshi Tsunoda, Yoshiaki Nemoto (Tohoku Univ.) TM2007-34 |
Abstract |
(in Japanese) |
(See Japanese page) |
(in English) |
Recently, increasing of information leakages caused by illegal use of network applications have been reported. To prevent the occurrence of such incidents, a network administrator should block the trafiic exchanged by unauthorized applications by checking incoming and outgoing traffic of his network. We have proposed a method for application identification based on transition pattern of payload length. However, that method needs reference vectors of each application for identification. Thus, it cannot identify applications whose reference vectors do not exist. In this paper, to tackle this problem, we propose a method to classify flows of these applications as ``Unknown''. The proposed method classify flows of these applications by setting threshold of the distance between a vector of the monitored flow and the nearest reference vector. The proposed method can also classify misidentified flows, which is misidentified to another application as ``Unknown''. In addtion, we evaluate three clustering algorithms: oLVQ1, K-means, and hierarchical clustering and compare their identification performance to find the appropriate clustering algolithm for the proposed method. |
Keyword |
(in Japanese) |
(See Japanese page) |
(in English) |
Application discrimination / P2P / Payload-length / transition pattern / / / / |
Reference Info. |
IEICE Tech. Rep., vol. 107, Nov. 2007. |
Paper # |
|
Date of Issue |
2007-11-08 (TM) |
ISSN |
Print edition: ISSN 0913-5685 Online edition: ISSN 2432-6380 |
Copyright and reproduction |
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034) |
Download PDF |
TM2007-34 |
Conference Information |
Committee |
NS ICM CQ |
Conference Date |
2007-11-15 - 2007-11-16 |
Place (in Japanese) |
(See Japanese page) |
Place (in English) |
Institute of System LSI Design Industry, Fukuoka |
Topics (in Japanese) |
(See Japanese page) |
Topics (in English) |
NGN architecture, NGN operation architecture, Traffic modeling, Overlay networking, etc. |
Paper Information |
Registration To |
ICM |
Conference Code |
2007-11-NS-TM-CQ |
Language |
Japanese |
Title (in Japanese) |
(See Japanese page) |
Sub Title (in Japanese) |
(See Japanese page) |
Title (in English) |
An evaluation of transition pattern of payload legnth for network application identification |
Sub Title (in English) |
|
Keyword(1) |
Application discrimination |
Keyword(2) |
P2P |
Keyword(3) |
Payload-length |
Keyword(4) |
transition pattern |
Keyword(5) |
|
Keyword(6) |
|
Keyword(7) |
|
Keyword(8) |
|
1st Author's Name |
Shinnosuke Yagi |
1st Author's Affiliation |
Tohoku University (Tohoku Univ.) |
2nd Author's Name |
Yuji Waizumi |
2nd Author's Affiliation |
Tohoku University (Tohoku Univ.) |
3rd Author's Name |
Hiroshi Tsunoda |
3rd Author's Affiliation |
Tohoku University (Tohoku Univ.) |
4th Author's Name |
Yoshiaki Nemoto |
4th Author's Affiliation |
Tohoku University (Tohoku Univ.) |
5th Author's Name |
|
5th Author's Affiliation |
() |
6th Author's Name |
|
6th Author's Affiliation |
() |
7th Author's Name |
|
7th Author's Affiliation |
() |
8th Author's Name |
|
8th Author's Affiliation |
() |
9th Author's Name |
|
9th Author's Affiliation |
() |
10th Author's Name |
|
10th Author's Affiliation |
() |
11th Author's Name |
|
11th Author's Affiliation |
() |
12th Author's Name |
|
12th Author's Affiliation |
() |
13th Author's Name |
|
13th Author's Affiliation |
() |
14th Author's Name |
|
14th Author's Affiliation |
() |
15th Author's Name |
|
15th Author's Affiliation |
() |
16th Author's Name |
|
16th Author's Affiliation |
() |
17th Author's Name |
|
17th Author's Affiliation |
() |
18th Author's Name |
|
18th Author's Affiliation |
() |
19th Author's Name |
|
19th Author's Affiliation |
() |
20th Author's Name |
|
20th Author's Affiliation |
() |
Speaker |
Author-1 |
Date Time |
2007-11-15 16:25:00 |
Presentation Time |
25 minutes |
Registration for |
ICM |
Paper # |
TM2007-34 |
Volume (vol) |
vol.107 |
Number (no) |
no.313 |
Page |
pp.1-6 |
#Pages |
6 |
Date of Issue |
2007-11-08 (TM) |
|