2006 IEEE International Conference on Communications 2006
DOI: 10.1109/icc.2006.254723
|View full text |Cite
|
Sign up to set email alerts
|

A statistical approach to IP-level classification of network traffic

Abstract: Abstract-Correct classification of traffic flows according to the application layer protocols that generated them is essential for most network-management, resource allocation and intrusion detection systems in TCP/IP networks. With the ever increasing number of network protocols and services running on nonstandard TCP ports, the classification methods based the analysis of the transport layer header are rapidly becoming ineffective. On the other hand, mechanisms based on full payload analysis are too computat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
25
0
1

Year Published

2008
2008
2019
2019

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 47 publications
(26 citation statements)
references
References 12 publications
(16 reference statements)
0
25
0
1
Order By: Relevance
“…However, literature work on IP flow classification [2] and on web site fingerprinting [6] appear to suggest that a significant amount of the information used by the classifiers is brought by a few packets (frequently the initial ones in the session), whose size is quite different from the remaining ones in the session. This implies that fragmentation (eventually in conjunction with other tools) may be an extremely effective limited-overhead traffic flow confidentiality tool.…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…However, literature work on IP flow classification [2] and on web site fingerprinting [6] appear to suggest that a significant amount of the information used by the classifiers is brought by a few packets (frequently the initial ones in the session), whose size is quite different from the remaining ones in the session. This implies that fragmentation (eventually in conjunction with other tools) may be an extremely effective limited-overhead traffic flow confidentiality tool.…”
Section: Discussionmentioning
confidence: 99%
“…9 we show a representation, which, according to our knowledge was not used for website fingerprinting attacks before, and provides some insight into the level of protection. While packet counting and packet number based algorithms (such as [2,5,16]) can be fooled using a simple control logic (without randomization and without dummy traffic), looking at Fig. 9, it can easily be seen that the traffic pattern mapped into the "cumulative length" -"elapsed time" space remains somewhat characteristic of the site.…”
Section: Fig 4: Test Setupmentioning
confidence: 99%
See 2 more Smart Citations
“…This approach distinguishes the behavior of an application by observing the size and the direction of the first few packets of the TCP connection. Crotti et al in [8] propose a statistical approach to identify network application by building a set of protocol fingerprints that summarize its main IP-level statistical properties. In [17], Ma et al analyze three mechanisms relying on flow content to automatically identify traffic that uses the same applicationlayer protocol.…”
Section: Related Workmentioning
confidence: 99%