2013
DOI: 10.1109/cc.2013.6674214
|View full text |Cite
|
Sign up to set email alerts
|

Network traffic signature generation mechanism using principal component analysis

Abstract: The Deep Packet Inspection (DPI) method is a popular method that can accurately identify the flow data and its corresponding application. Currently, the DPI method is widely used in common network management systems. However, the major limitation of DPI systems is that their signature library is mainly extracted manually, which makes it hard to efficiently obtain the signature of new applications. Hence, in this paper, we propose an automatic signature extraction mechanism using Principal Component Analysis (P… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 9 publications
(19 reference statements)
0
3
0
Order By: Relevance
“…Besides, Table 4 in general, summarizes the superiority of the proposed method, as an approach capable of identifying both, an application and its individual services. [18] 2012 ✓ (Unnamed) X ✓ X M. Cheng et al [20] 2013 ✓ (Unnamed) X ✓ X FlowAntEater [21] 2013 ✓ (FlowAntEater) ✓ (SSMA) ✓ X S. Yoon et al [24] 2014 ✓ (Unnamed) X ✓ X H. Min An et al [27] 2015 ✓ (Unnamed) X ✓ X SigBox [28] 2017…”
Section: Analytic Comparison Of the Proposed Approachmentioning
confidence: 99%
See 2 more Smart Citations
“…Besides, Table 4 in general, summarizes the superiority of the proposed method, as an approach capable of identifying both, an application and its individual services. [18] 2012 ✓ (Unnamed) X ✓ X M. Cheng et al [20] 2013 ✓ (Unnamed) X ✓ X FlowAntEater [21] 2013 ✓ (FlowAntEater) ✓ (SSMA) ✓ X S. Yoon et al [24] 2014 ✓ (Unnamed) X ✓ X H. Min An et al [27] 2015 ✓ (Unnamed) X ✓ X SigBox [28] 2017…”
Section: Analytic Comparison Of the Proposed Approachmentioning
confidence: 99%
“…DSA Biometric Signatures for Internet-based applications Polygraph [13] 2005 BGA Signatures for Polymorphic worms LASER [14] 2008 LCS Internet application identification AutoSig [15] 2009 ASMA Applications signatures generation R. Perdisci et al [16] 2010 BCA HTTP malware signatures generation Zhanyi Wang [17] 2012 ANN & DL Network traffic identification Y. Wang et al [18] 2012 SAA Automatic signature generation FIRMA [19] 2013 LCS Generation of network signatures for malware M. Cheng et al [20] 2013 PCA Automatic signature extraction FlowAntEater [21] 2013 K-means & SSMA Generation and evaluation of applications signatures J. Tharp et al [22] 2013 Heuristics Reconciliation of multiple matching Hwan-Hee Kim & Min-Jung Choi [23] 2013…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…The basic capacity refers to the maximum traffic permitted of one lane's section in a certain period of time (taking 15min or 1 h) under ideal road and traffic control conditions [7]. The calculation formula by the headway time is defined as follow.…”
Section: Supply Characteristics Of Freewaymentioning
confidence: 99%