2016 18th Asia-Pacific Network Operations and Management Symposium (APNOMS) 2016
DOI: 10.1109/apnoms.2016.7737287
|View full text |Cite
|
Sign up to set email alerts
|

Payload signature structure for accurate application traffic classification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(7 citation statements)
references
References 9 publications
0
7
0
Order By: Relevance
“…Traditional traffic classification methods include portbased and payload-based analysis methods [4][5][6][7]. The portbased method was performed for applications using fixed port numbers and is not used now because most applications use dynamic ports.…”
Section: A Research Backgroundmentioning
confidence: 99%
See 2 more Smart Citations
“…Traditional traffic classification methods include portbased and payload-based analysis methods [4][5][6][7]. The portbased method was performed for applications using fixed port numbers and is not used now because most applications use dynamic ports.…”
Section: A Research Backgroundmentioning
confidence: 99%
“…The signature-based method analyzes common characteristics of traffic generated from target applications and defines them as signatures [5][6][7][8]. The signature-based analysis methods can be defined in various ways according Information on user behavior plays a crucial role in network security and management.…”
Section: A Research Backgroundmentioning
confidence: 99%
See 1 more Smart Citation
“…Network traffic consists of header information like ports, IPs, payload length, protocol, etc which are currently used to classify applications [1]. Identification of signature in the payload length is a technique commonly used to classify an application with high accuracy [2][3] [4]. Some researchers found a way to automate the process of signature identification by finding a string or hex subsequence in the payload [5][6].…”
Section: Related Workmentioning
confidence: 99%
“…[3]Lotfollahi, M.added dropout to prevent over fitting and softmax to classify the last layer on the basis of CNN and 5-layer SAE. From Kampeas, J [4]proposed a new set of traffic classification functions for SDN [5] and NFV [6]environments. Very high classification accuracy is achieved by capturing the required data through a single filtering rule and taking only the least feature-dependent part.…”
Section: Introductionmentioning
confidence: 99%