2009 29th IEEE International Conference on Distributed Computing Systems 2009
DOI: 10.1109/icdcs.2009.34
|View full text |Cite
|
Sign up to set email alerts
|

High-Speed Flow Nature Identification

Abstract: This paper concerns the fundamental problem of identifying the content nature of a flow, namely text, binary, or encrypted, for the first time. We propose Iustitia, a tool for identifying flow nature on the fly. The key observation behind Iustitia is that text flows have the lowest entropy and encrypted flows have the highest entropy, while the entropy of binary flows stands in between. The basic idea of Iustitia is to classify flows using machine learning techniques where a feature is the entropy of every cer… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0
2

Year Published

2011
2011
2020
2020

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 14 publications
0
2
0
2
Order By: Relevance
“…So Khakpour [20] does not carry out any experiments based on real-world packet traces. However, despite the difficulties mentioned above, we still utilize pure text and encrypted data, which are obtained from real-world traces for validation in our paper.…”
Section: Real-world Packet Verificationmentioning
confidence: 99%
See 1 more Smart Citation
“…So Khakpour [20] does not carry out any experiments based on real-world packet traces. However, despite the difficulties mentioned above, we still utilize pure text and encrypted data, which are obtained from real-world traces for validation in our paper.…”
Section: Real-world Packet Verificationmentioning
confidence: 99%
“…The work of Khakpour et al [20] was the pioneer of our task. They suggested a high-speed architecture which can separate flows into three categories, including text, binary and encrypted.…”
Section: Related Workmentioning
confidence: 99%
“…В [6] потоки определяются как зашифрованные или незашифрованные на основании энтропии первого пакета. В [7] вычисление энтропии первых байтов полезной нагрузки идентифицирует тип содержимого как текст, бинарный файл или шифрованный файл, что позволяет приоритизировать передачу некоторых файлов. Однако, такую классификацию сложно назвать точной или детализированной, так как для одного и того же приложения возможно использование всех видов содержимого.…”
Section: стохастический анализ пакетовunclassified
“…文 献 [17] 使用一个会话的第 1 个报文进行 DPI 检测, 实现及早的分类, 但是这种技术除了要预先提取 有效的签名外, 还要检测报文负载, 不仅导致计算开销大还会侵犯隐私. 为了解决 DPI 面临的一些问 题, Khakpour 等 [18] 使用随机报文探测 (stochastic packet inspection, SPI) 技术 [12] , 设计了一种快速 算法, 该算法计算报文中第 1 个负载字节数的信息熵进行载荷内容类型识别. 但是该技术仍然可能涉 及侵犯客户隐私的问题.…”
unclassified