2010
DOI: 10.1109/tnet.2010.2044046
|View full text |Cite
|
Sign up to set email alerts
|

KISS: Stochastic Packet Inspection Classifier for UDP Traffic

Abstract: This paper proposes KISS, a novel Internet classification engine. Motivated by the expected raise of UDP traffic, which stems from the momentum of Peer-to-Peer (P2P) streaming applications, we propose a novel classification framework that leverages on statistical characterization of payload. Statistical signatures are derived by the means of a Chi-Square ( 2 )-like test, which extracts the protocol "format," but ignores the protocol "semantic" and "synchronization" rules. The signatures feed a decision process… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
72
0
2

Year Published

2012
2012
2022
2022

Publication Types

Select...
6
2
1

Relationship

2
7

Authors

Journals

citations
Cited by 116 publications
(75 citation statements)
references
References 25 publications
(46 reference statements)
1
72
0
2
Order By: Relevance
“…Hence network engineering research has been based on the dominance of TCP traffic [5][6][7]. Traffic classification has also concentrated on identifying TCP applications, and only a few popular UDP applications such as PPLive and SopCast have been studied [8,9]. In addition, network experiments with synthetic traffic have mostly focused on generating realistic TCP traffic while they often model UDP traffic as simple packet bunches sent at constant bit rate [24].…”
Section: Introductionmentioning
confidence: 99%
“…Hence network engineering research has been based on the dominance of TCP traffic [5][6][7]. Traffic classification has also concentrated on identifying TCP applications, and only a few popular UDP applications such as PPLive and SopCast have been studied [8,9]. In addition, network experiments with synthetic traffic have mostly focused on generating realistic TCP traffic while they often model UDP traffic as simple packet bunches sent at constant bit rate [24].…”
Section: Introductionmentioning
confidence: 99%
“…In the first part (1-4), it calculates the WSU value of each feature on NS, and inserts each feature into list in descending order according to their WSU values. In the second part (5)(6)(7)(8)(9)(10)(11)(12)(13)(14)(15)(16)(17)(18)(19), it further processes the ordered list to remove redundant features and only keeps predominant ones among all the selected features. A feature f p that has been determined to be a predominant feature can always be used to filter out other features that are ranked lower than f p .…”
Section: Algorithm 1 Feature Selection For Each Classmentioning
confidence: 99%
“…These techniques can deal with above limitations by avoiding deep packet inspection and creating new features from transport layer statistics (e.g., packet size and interarrival time) [11][12][13][14]. A variety of features have been extracted from traffic flows in recent years.…”
Section: Introductionmentioning
confidence: 99%
“…Our choice is motivated by the expected rise of UDP traffic volume [49,50,51,52], which steps from the momentum of applications (e.g. DNS, VoIP, streaming, p2p IPTV, etc.…”
Section: Our Contributionmentioning
confidence: 99%