GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference 2009
DOI: 10.1109/glocom.2009.5425781
|View full text |Cite
|
Sign up to set email alerts
|

Using Network Motifs to Identify Application Protocols

Abstract: Identifying application types in network traffic is a difficult problem for administrators who must secure and manage network resources, further complicated by the use of encrypted protocols and nonstandard port numbers. This paper takes a unique approach to this problem by modeling and analyzing application graphs, structures which describe the applicationlevel (e.g., HTTP, FTP) communications between hosts. These graphs are searched for motifs: recurring, significant patterns of interconnections that can be … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
27
0

Year Published

2011
2011
2016
2016

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(27 citation statements)
references
References 14 publications
0
27
0
Order By: Relevance
“…This fundamental idea has been demonstrated in areas as diverse as spam filtering [5,4], telecommunications [3], bioinformatics [20] and social network analysis [13]. How best to represent the network around a node is still a significant research challenge.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…This fundamental idea has been demonstrated in areas as diverse as spam filtering [5,4], telecommunications [3], bioinformatics [20] and social network analysis [13]. How best to represent the network around a node is still a significant research challenge.…”
Section: Introductionmentioning
confidence: 99%
“…How best to represent the network around a node is still a significant research challenge. Recently profiling using network motif counts has emerged as a promising solution for characterizing networks [20,25,3].…”
Section: Introductionmentioning
confidence: 99%
“…Motif discovery typically does not take node or edge attributes into account, but rather depends solely on the pattern structure. It is commonly performed on naturally occurring graphs like biological networks [28], or computational graphs such as software graphs [38] or computer network graphs [3]. In these works, motif profiles (i.e., counts of different motif structures in the graph) have proven to be a strong indicator of a network's function.…”
Section: Introductionmentioning
confidence: 99%
“…This fundamental idea has been demonstrated not only in social network analysis [14,21] and in bioinformatics [23] but also in areas as diverse as spam filtering [6,5], telecommunications [3], fraud detection [24] and of course web search [16]. How best to represent the network around an object is still a significant research challenge.…”
Section: Introductionmentioning
confidence: 99%
“…How best to represent the network around an object is still a significant research challenge. Recently profiling using network motif counts has emerged as a promising solution for characterizing networks [23,26,27,3].…”
Section: Introductionmentioning
confidence: 99%