An Analysis of UDP Traffic Classification

Size: px
Start display at page:

Download "An Analysis of UDP Traffic Classification"

Transcription

1 An Analysis of UDP Traffic Classification 123 Jing Cai 13 Zhibin Zhang 13 Xinbo Song 1 Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China 2 Graduate University of Chinese Academy of Sciences, Beijing, China 3 National Engineering Laboratory for Information Security, Beijing, China caijing@software.ict.ac.cn Abstract Accurate and timely classification of network applications is fundamental to numerous network activities. The traditional methods based on the well-known ports and packet payload analysis could no longer meet the need to accurately identify the IP traffic. Therefore, a promising approach using the machine learning techniques has received more and more attention. There are a lot of work about this field. However, earlier work generally believed that TCP traffic occupied the main body, and UDP traffic is negligible, and therefore ignored the study of classifying UDP traffic. However, with the increase of network bandwidth, based on real-time considerations, more and more new applications use UDP as transport layer protocol, which directly increase UDP traffic. In view of this, we mainly discuss the classification of UDP traffic. Firstly, we divided the whole UDP traffic into five categories according to theirs specific characteristic. Secondly, we use four machine learning techniques{naive Bayes, SVMs, C4.5, K-Means} to classify the UDP traffic of these five categories. Through the comparison and analysis, we find the supervised techniques can achieve higher accuracy than the unsupervised clustering techniques. Among the above four techniques, the Naive Bayes always gets the minimum performance, while the C4.5 is always the maximum. The Simple K-Means always lies between the Naive Bayes and other supervised learning techniques, and it outperforms the Naive Bayes classifier by 17%. I. INTRODUCTION Accurate and timely classification of network applications is fundamental to numerous network activities, from security monitoring to accounting, and from Quality of Service to providing operators with useful forecasts for long-term provisioning. Due to its great importance, different techniques have been used to classify IP traffic. In the past, the commonly used technique based on the well-known TCP or UDP port numbers(visible in the TCP or UDP headers). However, with growing numbers of network applications are port-agile(allocating dynamic ports as needed), end user are deliberately using non-standard ports to hide the traffic, and the widespread use of the network address port translation in peer-to-peer file sharing system, this technique is becoming increasingly less effective. Moore et al.[1] found out that this traditional techniques for traffic/flow classification is nomore accurate than 50-70%. Another well researched approach based on the packet payload analysis also cannot deal with the proprietary protocols or encrypted traffic, and it may pose privacy and security concerns. Therefore, a promising approach that has recently received more and more attention is traffic classification using machine learning techniques. This technique is based on application protocol(payload) independent statistical features such as packet length and inter-arrival times. Each traffic flow is characterized by the same set of features but with different feature value. A ML classifier is built by training on a representative set of flow instances where the network applications are known. The built classifier can be used to determine the class of unknown flows. However, the earlier work generally believed that TCP traffic occupied the main body of the network traffic, and UDP traffic is negligible, and therefore ignored the classification of the UDP traffic. However, the situation has undergone tremendous changes at present. With the increase of network bandwidth, the traditional networking services based on images and text could no longer satisfy people s needs. More and more audio, video, and online games, have gradually become the main body of the network traffic. These applications mostly use UDP as their transport layer protocol [2], which directly results in the increase of UDP traffic. The organization of CAIDA [3] analyzed the trace collected in the period on several backbone links located in the US and Sweden and found the ratio between the UDP and TCP in packets, bytes, and flows have increased greatly. For UDP, compared with the TCP, we found there at least exist two big differences. Firstly, TCP is a connection-oriented protocol, it has controlling flags such as FIN and RST to explicitly identify the end of flow. But for UDP, it is a connectionless protocol. The main methodology to terminate UDP flows is the timeout strategy. The second, the composition of UDP is more complicated. The characteristics of different applications often demonstrate significant differences. Therefore, the situation is more complex for UDP. Due to these two great differences, the study on the classification of UDP traffic is nearly in the blank stage. In view of this, we mainly discuss the classification of UDP flows in this paper. To the best of our knowledge, we are the first to do so. There are two main contributions in our paper. We mainly discuss the classification of the UDP traffic. The whole UDP traffic have been divided into five categories according to theirs specific characteristic. These five categories are {SERVICE, IM, DOWNLOAD, STREAMING, Other}. We apply the unsupervised and supervised machine learning techniques for UDP traffic identification. Our unsupervised approach uses the Simple K-Means, and the

2 supervised approaches used the Naive Bayes, C4.5, and SVMs. Through the qualitative and quantitative analysis, our results shows that the supervised techniques can achieve higher accuracy than the unsupervised clustering techniques in most cases. Among the above four techniques, the Naive Bayes always gets the minimum performance, while the C4.5 is always the maximum. And the Simple K-Means always lies between the Naive Bayes and other supervised learning techniques. The remainder of this paper is organized as follows: Section II presents some related work. Section III outlines the basic machine algorithms we used. In section IV, we introduce the data trace used in our work and present the information of flow definition, the feature selection and evaluation criteria. Section V give the result and our analysis. At last, we conclude the paper and give some suggestions in Section VI. II. RELATED WORK Due to its fundamental nature and its underpinning of many other technique, the field of traffic classification has maintained continuous interest. There has been much recent work in the field of traffic classification. This section will survey the different techniques presented in literature. A. Port Number Analysis Historically, traffic classification techniques used the wellknown port number to identify Internet traffic. It was successful because many traditional applications use fixed port numbers assigned by IANA. For example, dns applications commonly use port 53. This techniques has been shown to be ineffective by Karaginnis et al. in [4] for some application such as the current generation of P2P applications which intentionally tries to disguise their traffic by using dynamic port numbers or masquerade as well-known applications. In addition, only those applications whose port number are known in advance can be identified. B. Payload-based Analysis Another well researched approach is analysis of packet payloads[5]. In this approach, the packet payloads are analyzed to see whether or not they contain characteristics signatures of known application. Although payload based inspection avoids reliance on fixed port numbers, it imposes significant complexity and processing load on the traffic identification device. This approach can be difficult or impossible when dealing with proprietary protocols or encrypted traffic. Furthermore direct analysis of session and application layer content may pose privacy and security concerns. Finally, these techniques only identify traffic for which signatures are available and are unable to classify previously unknown traffic. C. Machine Learning Approaches Newer approaches rely on traffic s statistical characteristics to identify the application. An assumption underlying such methods is that traffic at the network layer has statistical properties that are unique for certain classes of applications and enable different source applications to be distinguished from each other. However, the need to deal with traffic patterns, large data sets and multi-dimensional spaces of flow and packet attributes is one of the reason for the introduction of ML(Machine Learning) techniques in this field. Machine learning techniques generally consists of two parts:model building and then classification. A model is first built using training data. This model is then imputed into a classifier that then classifies a data set. Machine learning techniques can be divided into the categories of unsupervised and supervised. Bernaille et al.[6] used a Simple K-Means clustering algorithm to perform classification using only the first five packets of flow. McGregor et al. [7]used the Expectation Maximization algorithm to classify IP traffic. The approach clusters traffic with similar observable properties into different application types. Zander et al.[8] extended this work by using an EM algorithm called AutoClass and find the optimal set of attributes to use for building the classification model. Some supervised machine learning techniques also use connection-level statistics to classify traffic. Roughan et al.[9] use the technique of nearest neighbour(nn), linear discriminate analysis(lda) and Quadratic Discriminant Analysis(QDA) ML algorithms to map different applications to different QoS classes. Moore et al.[10][11] used the technique of Naive Bayes to build a classifier and shows that the Naive Bayes approach also has a high accuracy classifying traffic. Auld et al.[12] also applied Bayesian Neural Network to classify the Internet traffic. Este et al.[13], Park et al.[14] separately use the SVMs(Support Vector Machines), Genetic Algorithm to classify Internet traffic. Besides that, Crotti et al.[15] proposed a flow classification mechanism base on protocol fingerprints containing the information of packet length, inter-arrival time and packet arrival order. These works have demonstrated that supervised ML algorithms are also able to separate traffic into classes, with encouraging accuracy. III. EXPERIMENTAL SETUP A. Data Traces and Traffic Class We collected the experiment traces from a backbone router in China. The basic information of these traces is in Table I. The reason for not using the data set of CAIDA is that its payload information has been encrypted. And in this paper, we must use the payload information to classify the different applications. Compared with TCP, the composition of UDP is more complicated, it contains many different data elements. In UDP, there exists some streaming media protocols such as ppstream, pplive which seem to be appropriate to profile flow, but also exists protocols such as dns which only involves questionanswer and seems not to be suitable to profile flow. Due to this great differences among the applications, it is difficult to deal with it as a whole. Therefore, we divided the whole UDP flows into five categories according to their specific characteristics. Table II shows the basic information of the classification. The whole UDP flows have been divided into five cate-

3 TABLE I THE BASIC INFORMATION OF THE TRACE Id Begin time End time Bytes Packets I 2009,5.5,14: ,5.6,00:30 275G 2805(million) TABLE II UDP TRAFFIC ALLOCATED TO EACH CATEGORY Category SERVICE IM DOWNLOAD STREAMING OTHER Example Application {dns,ntp,messengerservice} {qq,msn} {bittorrent,edonkey,xunlei,guntella,kazaa} {pplive,ppstream,sopcast,qqlive} {unknown} gories named {SERVICE, IM, DOWNLOAD, STREAMING, OTHER}. As we said earlier, the traditional traffic identification method based on well known ports will lead to inaccurate judgement. Fortunately, some open source software such as L7-filter[16], OpenDPI provides features information of some application protocols. We draw this information to analyze the traffic of these most important applications in UDP. B. Flow and Feature Definitions We formally define UDP flows as a series of packets that consistent with a specific flow specification and timeout constraint. At present, the most widely used flow specification is the five-tuple specification(source address, destination address, source port, destination port, transport layer protocol); And the timeout constraint define a flow which became inactive beyond a specific timeout as a end flow. In this paper, we finally set the timeout value as 64s. Flows are bidirectional and the first packet seen by the classifier determines the client-server direction. Each flow has a number of unique properties(e,g,. the source and destination ports), and a number of characteristics parameterizing its behavior - together these values form the input discriminators for out classification work. The flow features we use to classify are as follows: Flow duration Flow volume in bytes Flow volume in packets Packet length(minimum,average,maximum and standard deviation) Inter-arrival time(minimum,average,maximum and standard deviation) Packet lengths are based on the IP length excluding link layer overhead. Inter-arrival times have at least microsecond precision and accuracy. As the traces contained both directions of the flows, feature were calculated in both directions. This produces a total of 22 flow features, which we refer to as the full feature set. Our feature are simple and well understood within the networking community. They represent a reasonable benchmark feature to which more complex features might be added in the future. C. Evaluation Criteria To measure the effectiveness of the algorithms three metrics were used: precision, recall, and overall accuracy. These measures have been widely used in the data mining literature. For a given class, the number of correctly classified objects is referred to as the True Positives. The number of objects falsely identified as a class are referred to as the False Positives. The number of objects from a class that are falsely labeled as another class is referred to as the False Negatives. Precision: the number of class members classified correctly over the total number of instances classified as class numbers. It is the ratio of True Positive to the number of True Positives and False Negatives. This determines how many identified objects were correct. precision = TP TP+FP (1) Recall(or true positive rate): the number of class members classified correctly over the total number of class numbers. It is also the ratio of True Positives to the number of True Positives and False Negatives. This determines how many objects in a class are misclassified as something else. recall = TP TP+FN (2) Overall Accuracy: the percentage of correctly classified instances over the total number of instances. It is the ratio of the sum of all True Positives to the sum of all the True and False Positives for all classes. This measures the overall accuracy of the classifier. overallaccuracy = n i=1 n i=1 TP i (TP i+fp i) IV. RESULTS AND ANALYSIS In the experiment, we do not use the complete flow characteristic information to classify the different application s traffic. In contrast, we only use the information of the first ten packets. When packets in flow reach ten, we collect the flow characteristic information and use these information to classify UDP traffic. A. Supervised Learning Approaches The supervised learning classifier is first trained with a training set containing 10,000 random samples from the whole flow set. Among the 10,000 flows, there are 5,000 flows from the category of DOWNLOAD, 2,500 flows from the category of STREAMING, 2,000 flows from the category of SERVICE and 500 flows from the category of IM. Once this training is complete, the classifier is then tested to see how well it classifies 10 different test sets containing 10,000(different) random samples. The composition of the test sets is the same as the training set, which is also 10,000 flows from these four categories. The initializing class labels are define by the mean of the payload-based analysis. (3)

4 Overall Accuracy Number of Clusters Fig. 1. Accuracy using K-Means B. Unsupervised Learning Approaches The simple K-Means algorithms have an input parameter of K. This input parameter is the number of disjoint partitions used by the unsupervised learning algorithms. In our data set, we would expect there would be at least one cluster for each traffic class. In addition, due to the diversity of the traffic in some classes, we would expect even more clusters to be formed. Therefore, based on this, the simple K-Means algorithm was evaluated with K initially being 10 and K being incremented by 10 for each subsequent clustering. The average overall accuracy results of the testing set for the K-Means clustering algorithm are shown in Fig.1. Initially, when the number of clusters is small the overall accuracy of K-Means is approximately 63%. The overall accuracy steadily improves as the number of clusters increase. This continues until K is around 100 with the overall accuracy being 82%. At this point, the improvement is much more gradual with the overall accuracy only improving by an additional 3.0% when K is 150. When K is larger than 150, the improvement is further diminished with the overall accuracy improving to the high 87% range when K is 300. However, large values of K increase the likelihood of over-fitting. In view of this, we think the 150 clusters is the best trade-off between behavior separation and complexity. Once an acceptable clustering has been found using the flow samples in a training data set, the clustering is transformed into a classifier by using a transductive classifier. In this approach, the clusters are labeled and a new object is classified with the label of the cluster which it is most similar to. We labeled a cluster with the most common traffic category of the flow samples in it. If two or more categories are tied, then a label is chosen randomly amongst the tied category labels. A new flow sample is then classified with the traffic class label of the cluster it is most similar to. By this mean, the resulting classifier is then used to predict which traffic class a new connection belongs to from the same 10 test sets of data. C. Experiment Result Fig.2 shows the average recall and precision for the four machine learning techniques{naive-bayes, Support Vector TABLE III OVERALL ACCURACY OF EACH ALGORITHM Algorithm Average Minimum Maximum Naive Bayes 67.12% 66.55% 67.46% SVMs 95.39% 95.12% 95.58% C % % K-Means 84.97% 84.63% 85.30% Machines, C4.5 Decision Tree, Simple K-Means}. In Fig.2, for SVMs and C4.5 classifiers, all classes have precision and recall values above 90%. For the SVMs classifiers, note that two of the four classes have average recall values over 95%, and two have average precision values above 90%. For the C4.5 classifiers, the situation is also the same. Therefore, these two approaches performs quite well for the data sets with precision and recall values averaging around 95% for both data sets. For the K-Means classifier, all classes have recall and precision values above 70%. For the DOWNLOAD and STREAM- ING class, it can reach 91% and 81% separately. The two worst classified classes, SERVICE and IM, still have recall and precision over 70%. The reason SERVICE and IM have this low recall and precision is that approximately 10% of the SERVICE and IM flow samples are being incorrectly classified as DOWNLOAD and STREAMING flow samples. For the Naive Bayes classifier, it works the worst. For DOWNLOAD flows, it performs best with 70% recall and 87% precision, followed by 88% recall and 50% precision for STREAMING. The two worst classified classes are also the SERVICE and IM. For SERVICE flows, it only reach the 32% recall and 72% precision. In contrast, for IM flows, it is the 71% recall and 47% precision. The reason for this poor performance is owing to lots of DOWNLOAD and STREAMING flows being falsely classified as SERVICE and IM, and thus consequently contributing to their lower recall values. Among the four categories{download, STREAMING, SERVICE, IM}, the experiment result shows that the DOWN- LOAD and STREAMING flows are easier to be identified. And the SERVICE and IM flows are more harder to be classified. We think this is also determined by its characteristic nature. The SERVICE flows only involves one request packet and one response packet in one request and seems to be independent between many requests. And the IM flows are usually accompany with large inter-arrival time caused by intermittent chat. D. Overall Accuracy of Algorithms Table III shows the minimum, maximum, and average overall accuracy over the 10 test sets. As Table III shows, the Naive Bayes classifier has an overall accuracy of 67.12%, which is the minimum. Whereas in comparison, the C4.5 classifier has an average overall accuracy of 96.16%, which is the maximum. The SVMs classifier also can achieve an average overall accuracy of 95.39%. However, for the unsupervised learning algorithms(k-means), it has an average overall accuracy of 84.97%, lies between the Naive Bayes

5 Recall (a) Average Recall SVMs C4.5 Naive Bayes K Means DOWNLOAD STREAMING SERVICE IM Precision (b) Average Precision DOWNLOAD STREAMING SERVICE IM SVMs C4.5 Naive Bayes K Means Fig. 2. Supervised and Unsupervised Learning Approaches Result classifiers and other supervised learning algorithms. Thus, we find that the supervised techniques can achieve higher accuracy than the unsupervised clustering techniques in most cases. The only exception is the K-Means outperforms the Naive Bayes classifier by 17%. V. CONCLUSION In this paper, we mainly discuss the classification of UDP traffic. First, we divided the whole UDP traffic into five categories according to theirs specific characteristic. Next, we apply the unsupervised and supervised machine learning techniques for UDP traffic identification. Our unsupervised approach uses the Simple K-Means, and the supervised approaches uses the Naive Bayes, C4.5, and SVMs. Through the qualitative and quantitative analysis, our results shows that the supervised techniques can achieve higher accuracy than the unsupervised clustering techniques in most cases. And among the above four techniques, the Naive Bayes always gets the minimum performance, while the C4.5 is always the maximum. The Simple K-Means always lies between the Naive Bayes and other supervised learning techniques, and it outperforms the Naive Bayes classifier by 17%. ACKNOWLEDGMENT Our work is supported in part by the National Basic Research Program 973 of China(Grant No.2007CB311100). REFERENCES [1] A. Moore, and K. Papagiannaki Toward the Accurate Identification of Network Applications. in PAM 2005, Boston, USA, March 31-April 1, [2] K. Sripanidkulchai, B. Maggs, and H. Zhang, Analysis of Live Streaming Workloads on the Internet. In Proc. of IMC 04, October, 2004, pp [3] CAIDA. [4] T. Karagiannis, A. Broido, M. Faloutsos, and K. claffy Transport Layer Identification of P2P Traffic. In Proc. of IMC 04, Taormina, Italy, October 25-27, [5] S. Sen, O. Spatscheck, and D. Wang ccurate, Scalable In-Network Identification of P2P Traffic Using Application Signatures. in WWW2005, New York, USA, May 17-22, [6] L. Bernaille, R. Teixeira, I. Akodkenou, A. Soule, and K. Salamatian Traffic classification on the fly. ACM Special Interest Group on Data Communication (SIGCOMM) Computer Communication Review, vol. 36, no. 2, [7] A. McGregor, M. Hall, P. Lorier, and J. Brunskill Flow clustering using machine learning techniques. in Proc. Passive and Active Measurement Workshop (PAM2004), Antibes Juan-les-Pins, France, April [8] S. Zander, T. Nguyen, and G. Armitage Automated traffic classification and application identification using machine learning. in IEEE 30th Conference on Local Computer Networks (LCN 2005), Sydney, Australia, November [9] M. Roughan, S. Sen, O. Spatscheck and N. Duffield Class-of-Service Mapping for QoS: A Statistical Signature-based Approach to IP Traffic Classification. in IMC04, Taormina, Italy, October 25-27, [10] A. Moore, and D. Zuev Internet Traffic Classification Using Bayesian Analysis Techniques. in SIGMETRICS05, Banff, Canada, June 6-10, [11] A. Moore, and D. Zuev Discriminators for use in flow-based classification. Intel Research, Technical Report. [12] T. Auld, A. W. Moore and S. F. Gull Bayesian neural networks for Internet traffic classification. IEEE Transactions on Neural Networks, no. 1, pp. 223C239, January [13] A. Este, F. Gringoli, and L. Salgarelli, Support Vector Machines for TCP Traffic Classification. Elsevier Computer Networks (COMNET), Vol. 53, No. 14, pp , Sep [14] J. Park, H. R. Tyan, and K. C. C. J, GA-Based Internet Traffic Classification Technique for QoS Provisioning. in Proceedings of the 2006 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Pasadena, California, December [15] M. Crotti, M. Dusi, F. Gringoli, and L. Salgarelli, Traffic classification through simple statistical fingerprinting. in SIGCOMM Comput. Commun. Rev., vol. 37, no. 1, pp. 5C16, [16] l7-filter. [17] G. H. John, and P. Langley, Estimating Continuous Distributions in Bayesian Classifiers. in Proceedings of 11th Conference on Uncertainty in Artificial Intelligence, pp , Morgan Kaufman, San Mateo, [18] R. Kohavi, J. R. Quinlan, W. Klosgen and J. M. Zytkow, Decision-tree discovery. in Handbook of Data Mining and Knowledge Discovery, pp , Oxford University Press, [19] U.v. Luxburg, A Tutorial on Spectral Clustering. Stat Comput. 17, [See also Technical Report 149, Max Planck Institute for Biological Cybermetics,2006.]

Rethinking The Building Block: A Profiling Methodology for UDP Flows

Rethinking The Building Block: A Profiling Methodology for UDP Flows Rethinking The Building Block: A Profiling Methodology for UDP Flows 123 Jing Cai 13 Zhibin Zhang 13 Peng Zhang 13 Xinbo Song 1 Institute of Computing Technology, Chinese Academy of Sciences, Beijing,

More information

Efficient Flow based Network Traffic Classification using Machine Learning

Efficient Flow based Network Traffic Classification using Machine Learning Efficient Flow based Network Traffic Classification using Machine Learning Jamuna.A*, Vinodh Ewards S.E** *(Department of Computer Science and Engineering, Karunya University, Coimbatore-114) ** (Assistant

More information

Improved Classification of Known and Unknown Network Traffic Flows using Semi-Supervised Machine Learning

Improved Classification of Known and Unknown Network Traffic Flows using Semi-Supervised Machine Learning Improved Classification of Known and Unknown Network Traffic Flows using Semi-Supervised Machine Learning Timothy Glennan, Christopher Leckie, Sarah M. Erfani Department of Computing and Information Systems,

More information

Identify P2P Traffic by Inspecting Data Transfer Behaviour

Identify P2P Traffic by Inspecting Data Transfer Behaviour Identify P2P Traffic by Inspecting Data Transfer Behaviour Mingjiang Ye, Jianping Wu,KeXu,DahMingChiu 2 Department of Computer Science, Tsinghua University, Beijing, 84, P.R.China yemingjiang@csnet.cs.tsinghua.edu.cn,

More information

Can we trust the inter-packet time for traffic classification?

Can we trust the inter-packet time for traffic classification? Can we trust the inter-packet time for traffic classification? Mohamad Jaber, Roberto G. Cascella and Chadi Barakat INRIA Sophia Antipolis, EPI Planète 2004, Route des Luciolles Sophia Antipolis, France

More information

Identify P2P Traffic by Inspecting Data Transfer Behaviour

Identify P2P Traffic by Inspecting Data Transfer Behaviour Identify P2P Traffic by Inspecting Data Transfer Behaviour Mingjiang Ye, Jianping Wu, Ke Xu, Dah Ming Chiu 2 Tsinghua National Laboratory for Information Science and Technology, Department of Computer

More information

Automated Traffic Classification and Application Identification using Machine Learning. Sebastian Zander, Thuy Nguyen, Grenville Armitage

Automated Traffic Classification and Application Identification using Machine Learning. Sebastian Zander, Thuy Nguyen, Grenville Armitage Automated Traffic Classification and Application Identification using Machine Learning Sebastian Zander, Thuy Nguyen, Grenville Armitage {szander,tnguyen,garmitage}@swin.edu.au Centre for Advanced Internet

More information

Training on multiple sub-flows to optimise the use of Machine Learning classifiers in real-world IP networks

Training on multiple sub-flows to optimise the use of Machine Learning classifiers in real-world IP networks Training on multiple sub-flows to optimise the use of Machine Learning classifiers in real-world IP networks Thuy T.T. Nguyen, Grenville Armitage Centre for Advanced Internet Architectures Swinburne University

More information

Statistical based Approach for Packet Classification

Statistical based Approach for Packet Classification Statistical based Approach for Packet Classification Dr. Mrudul Dixit 1, Ankita Sanjay Moholkar 2, Sagarika Satish Limaye 2, Devashree Chandrashekhar Limaye 2 Cummins College of engineering for women,

More information

Internet Traffic Classification using Machine Learning

Internet Traffic Classification using Machine Learning Internet Traffic Classification using Machine Learning by Alina Lapina 2018, UiO, INF5050 Alina Lapina, Master student at IFI, Full stack developer at Ciber Experis 2 Based on Thuy T. T. Nguyen, Grenville

More information

Generalization and Optimization of Feature Set for Accurate Identification of P2P Traffic in the Internet using Neural Network

Generalization and Optimization of Feature Set for Accurate Identification of P2P Traffic in the Internet using Neural Network Generalization and Optimization of Feature Set for Accurate Identification of P2P Traffic in the Internet using Neural Network S. AGRAWAL, B.S. SOHI Department of Electronics & Communication Engineering

More information

Keywords Traffic classification, Traffic flows, Naïve Bayes, Bag-of-Flow (BoF), Correlation information, Parametric approach

Keywords Traffic classification, Traffic flows, Naïve Bayes, Bag-of-Flow (BoF), Correlation information, Parametric approach Volume 4, Issue 3, March 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Special Issue:

More information

A Hybrid Approach for Accurate Application Traffic Identification

A Hybrid Approach for Accurate Application Traffic Identification A Hybrid Approach for Accurate Application Traffic Identification Thesis Defence December 21, 2005 Young J. Won yjwon@postech.ac.kr Distributed Processing & Network Management Lab. Dept. of Computer Science

More information

Online Traffic Classification Based on Sub-Flows

Online Traffic Classification Based on Sub-Flows Online Traffic Classification Based on SubFlows Victor Pasknel de A. Ribeiro, Raimir Holanda Filho Master s Course in Applied Computer Sciences University of Fortaleza UNIFOR Fortaleza Ceará Brazil paskel@unifor.br,

More information

Computer Communications

Computer Communications Computer Communications 33 (2) 4 5 Contents lists available at ScienceDirect Computer Communications journal homepage: www.elsevier.com/locate/comcom Identify P2P traffic by inspecting data transfer behavior

More information

Internet Traffic Classification Using Machine Learning. Tanjila Ahmed Dec 6, 2017

Internet Traffic Classification Using Machine Learning. Tanjila Ahmed Dec 6, 2017 Internet Traffic Classification Using Machine Learning Tanjila Ahmed Dec 6, 2017 Agenda 1. Introduction 2. Motivation 3. Methodology 4. Results 5. Conclusion 6. References Motivation Traffic classification

More information

BLINC: Multilevel Traffic Classification in the Dark

BLINC: Multilevel Traffic Classification in the Dark BLINC: Multilevel Traffic Classification in the Dark Thomas Karagiannis, UC Riverside Konstantina Papagiannaki, Intel Research Cambridge Michalis Faloutsos, UC Riverside The problem of workload characterization

More information

BitTorrent Traffic Classification

BitTorrent Traffic Classification BitTorrent Traffic Classification Atwin O. Calchand, Van T. Dinh, Philip Branch, Jason But Centre for Advanced Internet Architectures, Technical Report 090227A Swinburne University of Technology Melbourne,

More information

Machine Learning based Traffic Classification using Low Level Features and Statistical Analysis

Machine Learning based Traffic Classification using Low Level Features and Statistical Analysis Machine Learning based Traffic using Low Level Features and Statistical Analysis Rajesh Kumar M.Tech Scholar PTU Regional Center (SBBSIET) Jalandhar, India TajinderKaur Assistant Professor SBBSIET Padhiana

More information

Keywords Machine learning, Traffic classification, feature extraction, signature generation, cluster aggregation.

Keywords Machine learning, Traffic classification, feature extraction, signature generation, cluster aggregation. Volume 3, Issue 12, December 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Survey on

More information

A NEW HYBRID APPROACH FOR NETWORK TRAFFIC CLASSIFICATION USING SVM AND NAÏVE BAYES ALGORITHM

A NEW HYBRID APPROACH FOR NETWORK TRAFFIC CLASSIFICATION USING SVM AND NAÏVE BAYES ALGORITHM Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,

More information

Heuristics to Classify Internet Backbone Traffic based on Connection Patterns

Heuristics to Classify Internet Backbone Traffic based on Connection Patterns Heuristics to Classify Internet Backbone Traffic based on Connection Patterns Wolfgang John and Sven Tafvelin Department of Computer Science and Engieneering Chalmers University of Technolgy Göteborg,

More information

A Method and System for Thunder Traffic Online Identification

A Method and System for Thunder Traffic Online Identification 2016 3 rd International Conference on Engineering Technology and Application (ICETA 2016) ISBN: 978-1-60595-383-0 A Method and System for Thunder Traffic Online Identification Jinfu Chen Institute of Information

More information

Public Review for A Preliminary Performance Comparison of Five Machine Learning Algorithms for Practical IP Traffic Flow Classification

Public Review for A Preliminary Performance Comparison of Five Machine Learning Algorithms for Practical IP Traffic Flow Classification a c m Public Review for A Preliminary Performance Comparison of Five Machine Learning Algorithms for Practical IP Traffic Flow Classification Nigel Williams, Sebastian Zander, and Grenville Armitrage This

More information

Assessing the Nature of Internet traffic: Methods and Pitfalls

Assessing the Nature of Internet traffic: Methods and Pitfalls Assessing the Nature of Internet traffic: Methods and Pitfalls Wolfgang John Chalmers University of Technology, Sweden together with Min Zhang Beijing Jiaotong University, China Maurizio Dusi Università

More information

A Method of Identifying the P2P File Sharing

A Method of Identifying the P2P File Sharing IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.11, November 2010 111 A Method of Identifying the P2P File Sharing Jian-Bo Chen Department of Information & Telecommunications

More information

ABSTRACT. 1. Introduction. identificationn. remotely. P2P applications need hard to. most exciting. areas of Inter- centralized to. system.

ABSTRACT. 1. Introduction. identificationn. remotely. P2P applications need hard to. most exciting. areas of Inter- centralized to. system. Journal of Applied Mathematics and Physics,, 2013, 1, 56-62 http://dx.doi.org/10.4236/jamp..2013.14011 Published Online October 2013 (http://www.scirp.org/journal/jamp) EPFIA: Extensible P2P Flows Identification

More information

Can Passive Mobile Application Traffic be Identified using Machine Learning Techniques

Can Passive Mobile Application Traffic be Identified using Machine Learning Techniques Dublin Institute of Technology ARROW@DIT Dissertations School of Computing 2015-03-10 Can Passive Mobile Application Traffic be Identified using Machine Learning Techniques Peter Holland Dublin Institute

More information

Internet Traffic Classification using a Hidden Markov model

Internet Traffic Classification using a Hidden Markov model 2010 10th International Conference on Hybrid Intelligent Systems Internet Traffic Classification using a Hidden Markov model José Everardo Bessa Maia Department of Statistics and Computing UECE - State

More information

Tunneling Activities Detection Using Machine Learning Techniques

Tunneling Activities Detection Using Machine Learning Techniques Fabien Allard 1, Renaud Dubois 1, Paul Gompel 2 and Mathieu Morel 3 1 Thales Communications 160 Boulevard de Valmy BP 82 92704 Colombes Cedex FRANCE firstname.lastname@fr.thalesgroup.com 2 pgompel@gmail.com

More information

Active Build-Model Random Forest Method for Network Traffic Classification

Active Build-Model Random Forest Method for Network Traffic Classification Active Build-Model Random Forest Method for Network Traffic Classification Alhamza Munther #1, Rozmie Razif #2, Shahrul Nizam #3, Naseer Sabri #4, Mohammed Anbar *5 #1, 2, 3, 4 School of Computer and Communication

More information

Automated Traffic Classification and Application Identification using Machine Learning

Automated Traffic Classification and Application Identification using Machine Learning Automated Traffic Classification and Application Identification using Machine Learning Sebastian Zander, Thuy Nguyen, Grenville Armitage Centre for Advanced Internet Architectures Swinburne University

More information

Application Identification Based on Network Behavioral Profiles

Application Identification Based on Network Behavioral Profiles Application Identification Based on Network Behavioral Profiles Yan Hu Dept. of Information Engineering Chinese University of Hong Kong Email: yhu4@ie.cuhk.edu.hk Dah-Ming Chiu Dept. of Information Engineering

More information

TOWARDS HIGH-PERFORMANCE NETWORK APPLICATION IDENTIFICATION WITH AGGREGATE-FLOW CACHE

TOWARDS HIGH-PERFORMANCE NETWORK APPLICATION IDENTIFICATION WITH AGGREGATE-FLOW CACHE TOWARDS HIGH-PERFORMANCE NETWORK APPLICATION IDENTIFICATION WITH AGGREGATE-FLOW CACHE Fei He 1, 2, Fan Xiang 1, Yibo Xue 2,3 and Jun Li 2,3 1 Department of Automation, Tsinghua University, Beijing, China

More information

Categorizing Interactive IP Traffic-Skype

Categorizing Interactive IP Traffic-Skype IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 9, Issue 6 (Mar. - Apr. 2013), PP 57-63 Categorizing Interactive IP Traffic-Skype P.Pinky 1, S E Vinodh Ewards

More information

Early traffic classification using Support Vector Machines

Early traffic classification using Support Vector Machines Early traffic classification using Support Vector Machines Gabriel Gómez Sena Facultad de Ingeniería Universidad de la República Montevideo, Uruguay ggomez@fing.edu.uy Pablo Belzarena Facultad de Ingeniería

More information

Classification of Traffic Flows into QoS Classes by Unsupervised Learning and KNN Clustering

Classification of Traffic Flows into QoS Classes by Unsupervised Learning and KNN Clustering KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS VOL. 3, NO. 2, April 2009 134 Copyright c 2009 KSII Classification of Traffic Flows into QoS Classes by Unsupervised Learning and KNN Clustering Yi

More information

Network Traffic Classification Using Correlation Information

Network Traffic Classification Using Correlation Information 104 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 24, NO. 1, JANUARY 2013 Network Traffic Classification Using Correlation Information Jun Zhang, Member, IEEE, Yang Xiang, Member, IEEE, Yu

More information

Early Application Identification

Early Application Identification Early Application Identification Laurent Bernaille Renata Teixeira Kave Salamatian Université Pierre et Marie Curie - LIP6/CNRS Which applications run on my network? Internet Edge Network (campus, enterprise)

More information

Rapid Identification of BitTorrent Traffic

Rapid Identification of BitTorrent Traffic 35th Annual IEEE Conference on Local Computer Networks LCN 2010, Denver, Colorado Rapid Identification of Traffic Jason But, Philip Branch and Tung Le Centre for Advanced Internet Architectures Swinburne

More information

A Multi-agent Based Cognitive Approach to Unsupervised Feature Extraction and Classification for Network Intrusion Detection

A Multi-agent Based Cognitive Approach to Unsupervised Feature Extraction and Classification for Network Intrusion Detection Int'l Conf. on Advances on Applied Cognitive Computing ACC'17 25 A Multi-agent Based Cognitive Approach to Unsupervised Feature Extraction and Classification for Network Intrusion Detection Kaiser Nahiyan,

More information

A Preliminary Performance Comparison of Two Feature Sets for Encrypted Traffic Classification

A Preliminary Performance Comparison of Two Feature Sets for Encrypted Traffic Classification A Preliminary Performance Comparison of Two Feature Sets for Encrypted Traffic Classification Riyad Alshammari and A. Nur Zincir-Heywood Dalhousie University, Faculty of Computer Science {riyad,zincir}@cs.dal.ca

More information

The Comparative Study of Machine Learning Algorithms in Text Data Classification*

The Comparative Study of Machine Learning Algorithms in Text Data Classification* The Comparative Study of Machine Learning Algorithms in Text Data Classification* Wang Xin School of Science, Beijing Information Science and Technology University Beijing, China Abstract Classification

More information

Bittorrent traffic classification

Bittorrent traffic classification Bittorrent traffic classification Tung M Le 1, Jason But Centre for Advanced Internet Architectures. Technical Report 091022A Swinburne University of Technology Melbourne, Australia jbut@swin.edu.au Abstract-

More information

Video Streaming Over the Internet

Video Streaming Over the Internet Video Streaming Over the Internet 1. Research Team Project Leader: Graduate Students: Prof. Leana Golubchik, Computer Science Department Bassem Abdouni, Adam W.-J. Lee 2. Statement of Project Goals Quality

More information

Network Traffic Classification Based on Deep Learning

Network Traffic Classification Based on Deep Learning Journal of Physics: Conference Series PAPER OPEN ACCESS Network Traffic Classification Based on Deep Learning To cite this article: Jun Hua Shu et al 2018 J. Phys.: Conf. Ser. 1087 062021 View the article

More information

Improving Machine Learning Network Traffic Classification with Payload-based Features

Improving Machine Learning Network Traffic Classification with Payload-based Features Improving Machine Learning Network Traffic Classification with Payload-based Features Michal Scigocki, Sebastian Zander Centre for Advanced Internet Architectures, Technical Report 131120A Swinburne University

More information

Trends and Differences in Connection-behavior within Classes of Internet Backbone Traffic

Trends and Differences in Connection-behavior within Classes of Internet Backbone Traffic Trends and Differences in Connection-behavior within Classes of Internet Backbone Traffic Wolfgang John, Sven Tafvelin, and Tomas Olovsson Department of Computer Science and Engineering Chalmers University

More information

Detecting HTTP Tunnels with Statistical Mechanisms

Detecting HTTP Tunnels with Statistical Mechanisms Detecting HTTP Tunnels with Statistical Mechanisms Manuel Crotti, Maurizio Dusi, Francesco Gringoli, Luca Salgarelli DEA, Università degli Studi di Brescia, via Branze, 38, 25123 Brescia, Italy E-mail:

More information

Technology, Telaprolu, A.P.India 2 Research Scholar, Department of Computer Science, Rayalaseema University, Kurnool, A.P, India

Technology, Telaprolu, A.P.India 2 Research Scholar, Department of Computer Science, Rayalaseema University, Kurnool, A.P, India A Realistic Comprehensive Study on Various Classification Models in Data Mining Dr.K.Rajasekhararao 1, M.Jayaram 2 1 Professor of Computer Science and Engineering, Director, Usha Rama College of Engineering

More information

Traffic Classification through Joint Distributions of Packet-level Statistics

Traffic Classification through Joint Distributions of Packet-level Statistics Traffic Classification through Joint Distributions of Packet-level Statistics Alberto Dainotti and Antonio Pescapé University of Napoli Federico II (Italy) Email: {alberto,pescape}@unina.it Hyun-chul Kim

More information

Internet Traffic Classification: An Enhancement in Performance using Classifiers Combination

Internet Traffic Classification: An Enhancement in Performance using Classifiers Combination Internet Traffic Classification: An Enhancement in Performance using Classifiers Combination 1 Indra Bhan Arya 1 Maulana Azad National Institute of Technology Bhopal 2 Rachna Mishra 2 Truba Institute of

More information

CLASSIFICATION WITH RADIAL BASIS AND PROBABILISTIC NEURAL NETWORKS

CLASSIFICATION WITH RADIAL BASIS AND PROBABILISTIC NEURAL NETWORKS CLASSIFICATION WITH RADIAL BASIS AND PROBABILISTIC NEURAL NETWORKS CHAPTER 4 CLASSIFICATION WITH RADIAL BASIS AND PROBABILISTIC NEURAL NETWORKS 4.1 Introduction Optical character recognition is one of

More information

SVILUPPO DI UNA TECNICA DI RICONOSCIMENTO STATISTICO DI APPLICAZIONI SU RETE IP

SVILUPPO DI UNA TECNICA DI RICONOSCIMENTO STATISTICO DI APPLICAZIONI SU RETE IP UNIVERSITÀ DEGLI STUDI DI PARMA FACOLTÀ di INGEGNERIA Corso di Laurea Specialistica in Ingegneria delle Telecomunicazioni SVILUPPO DI UNA TECNICA DI RICONOSCIMENTO STATISTICO DI APPLICAZIONI SU RETE IP

More information

Generalization of Signatures for SSH Encrypted Traffic Identification

Generalization of Signatures for SSH Encrypted Traffic Identification Generalization of Signatures for SSH Encrypted Traffic Identification Riyad Alshammari and A. Nur Zincir-Heywood Faculty of Computer Science, Dalhousie University 6050 University Avenue Halifax, NS, Canada

More information

Application Behavior Characterization (ABC) System for Fast and Accurate Large- Scale Traffic Classification

Application Behavior Characterization (ABC) System for Fast and Accurate Large- Scale Traffic Classification Application Characterization (ABC) System for Fast and Accurate Large- Scale Traffic Classification Dawei Wang 1,3, Luoshi Zhang 4, Zhenlong uan 1,2, ibo Xue 1,3 and ingfei Dong 5 1 Research Inst. of Info.

More information

ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS

ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS Saulius Grusnys, Ingrida Lagzdinyte Kaunas University of Technology, Department of Computer Networks, Studentu 50,

More information

On the Stability of the Information Carried by Traffic Flow Features at the Packet Level

On the Stability of the Information Carried by Traffic Flow Features at the Packet Level On the Stability of the Information Carried by Traffic Flow Features at the Packet Level Alice Este, Francesco Gringoli, Luca Salgarelli DEA, Università degli Studi di Brescia, Italy Email: @ing.unibs.it

More information

NAT Router Performance Evaluation

NAT Router Performance Evaluation University of Aizu, Graduation Thesis. Mar, 22 17173 1 NAT Performance Evaluation HAYASHI yu-ichi 17173 Supervised by Atsushi Kara Abstract This thesis describes a quantitative analysis of NAT routers

More information

Computer Networks. Profiling and identification of P2P traffic q. Yan Hu a, *, Dah-Ming Chiu a, John C.S. Lui b. abstract

Computer Networks. Profiling and identification of P2P traffic q. Yan Hu a, *, Dah-Ming Chiu a, John C.S. Lui b. abstract Computer Networks 53 (2009) 849 863 Contents lists available at ScienceDirect Computer Networks journal homepage: www.elsevier.com/locate/comnet Profiling and identification of P2P traffic q Yan Hu a,

More information

Tunneling Activities Detection Using Machine Learning Techniques

Tunneling Activities Detection Using Machine Learning Techniques Paper Tunneling Activities Detection Using Machine Learning Techniques Fabien Allard, Renaud Dubois, Paul Gompel, and Mathieu Morel, Colombes Cedex, France Abstract Tunnel establishment, like HTTPS tunnel

More information

Investigating Two Different Approaches for Encrypted Traffic Classification

Investigating Two Different Approaches for Encrypted Traffic Classification Investigating Two Different Approaches for Encrypted Traffic Classification Riyad Alshammari and A. Nur Zincir-Heywood Faculty of Computer Science, Dalhousie University 6050 University Avenue Halifax,

More information

Reduce the False Positive and False Negative from Real Traffic with Intrusion Detection

Reduce the False Positive and False Negative from Real Traffic with Intrusion Detection Research Inventy: International Journal Of Engineering And Science Vol.05, Issue 01 (January 2015), PP: 09-14 Issn (e): 2278-4721, Issn (p):2319-6483, www.researchinventy.com Reduce the False Positive

More information

Transport Layer Identification of P2P Super nodes

Transport Layer Identification of P2P Super nodes Transport Layer Identification of P2P Super nodes DJ Oneil Hun Jeong Kang Jinoh Kim Donghyong Kwon Abstract Since P2P applications emerged, the amount of P2P traffic has continually grown. This poses potential

More information

NMLRG #4 meeting in Berlin. Mobile network state characterization and prediction. P.Demestichas (1), S. Vassaki (2,3), A.Georgakopoulos (2,3)

NMLRG #4 meeting in Berlin. Mobile network state characterization and prediction. P.Demestichas (1), S. Vassaki (2,3), A.Georgakopoulos (2,3) NMLRG #4 meeting in Berlin Mobile network state characterization and prediction P.Demestichas (1), S. Vassaki (2,3), A.Georgakopoulos (2,3) (1)University of Piraeus (2)WINGS ICT Solutions, www.wings-ict-solutions.eu/

More information

CSI5387: Data Mining Project

CSI5387: Data Mining Project CSI5387: Data Mining Project Terri Oda April 14, 2008 1 Introduction Web pages have become more like applications that documents. Not only do they provide dynamic content, they also allow users to play

More information

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print,

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print, ANNEX B - Communications Protocol Overheads The OSI Model is a conceptual model that standardizes the functions of a telecommunication or computing system without regard of their underlying internal structure

More information

A Study on Intrusion Detection Techniques in a TCP/IP Environment

A Study on Intrusion Detection Techniques in a TCP/IP Environment A Study on Intrusion Detection Techniques in a TCP/IP Environment C. A. Voglis and S. A. Paschos Department of Computer Science University of Ioannina GREECE Abstract: The TCP/IP protocol suite is the

More information

On the Relationship of Server Disk Workloads and Client File Requests

On the Relationship of Server Disk Workloads and Client File Requests On the Relationship of Server Workloads and Client File Requests John R. Heath Department of Computer Science University of Southern Maine Portland, Maine 43 Stephen A.R. Houser University Computing Technologies

More information

SSD Garbage Collection Detection and Management with Machine Learning Algorithm 1

SSD Garbage Collection Detection and Management with Machine Learning Algorithm 1 , pp.197-206 http//dx.doi.org/10.14257/ijca.2018.11.4.18 SSD Garbage Collection Detection and Management with Machine Learning Algorithm 1 Jung Kyu Park 1 and Jaeho Kim 2* 1 Department of Computer Software

More information

PERSONAL communications service (PCS) provides

PERSONAL communications service (PCS) provides 646 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 5, NO. 5, OCTOBER 1997 Dynamic Hierarchical Database Architecture for Location Management in PCS Networks Joseph S. M. Ho, Member, IEEE, and Ian F. Akyildiz,

More information

International Journal of Scientific Research & Engineering Trends Volume 4, Issue 6, Nov-Dec-2018, ISSN (Online): X

International Journal of Scientific Research & Engineering Trends Volume 4, Issue 6, Nov-Dec-2018, ISSN (Online): X Analysis about Classification Techniques on Categorical Data in Data Mining Assistant Professor P. Meena Department of Computer Science Adhiyaman Arts and Science College for Women Uthangarai, Krishnagiri,

More information

A Hybrid Approach for Accurate Application Traffic Identification

A Hybrid Approach for Accurate Application Traffic Identification A Hybrid for Accurate Application Traffic Identification Young J. Won 1, Byung-Chul Park 1, Hong-Taek Ju 2, Myung-Sup Kim 3 and James W. Hong 1 1 Dept. of Computer Science and Engineering, POSTECH {yjwon,

More information

Discovering Advertisement Links by Using URL Text

Discovering Advertisement Links by Using URL Text 017 3rd International Conference on Computational Systems and Communications (ICCSC 017) Discovering Advertisement Links by Using URL Text Jing-Shan Xu1, a, Peng Chang, b,* and Yong-Zheng Zhang, c 1 School

More information

Using Visual Motifs to Classify Encrypted Traffic

Using Visual Motifs to Classify Encrypted Traffic Using Visual Motifs to Classify Encrypted Traffic VizSEC'06 - November 3, 2006 Charles V Wright Fabian Monrose Gerald M Masson Johns Hopkins University Information Security Institute Traffic Classification:

More information

A Model of Machine Learning Based on User Preference of Attributes

A Model of Machine Learning Based on User Preference of Attributes 1 A Model of Machine Learning Based on User Preference of Attributes Yiyu Yao 1, Yan Zhao 1, Jue Wang 2 and Suqing Han 2 1 Department of Computer Science, University of Regina, Regina, Saskatchewan, Canada

More information

Clustering the Internet Topology at the AS-level

Clustering the Internet Topology at the AS-level Clustering the Internet Topology at the AS-level BILL ANDREOPOULOS 1, AIJUN AN 1, XIAOGANG WANG 2 1 Department of Computer Science and Engineering, York University 2 Department of Mathematics and Statistics,

More information

Link Prediction for Social Network

Link Prediction for Social Network Link Prediction for Social Network Ning Lin Computer Science and Engineering University of California, San Diego Email: nil016@eng.ucsd.edu Abstract Friendship recommendation has become an important issue

More information

Domain Based Approach for QoS Provisioning in Mobile IP

Domain Based Approach for QoS Provisioning in Mobile IP Domain Based Approach for QoS Provisioning in Mobile IP Ki-Il Kim and Sang-Ha Kim Department of Computer Science 220 Gung-dong,Yuseong-gu, Chungnam National University, Deajeon 305-764, Korea {kikim, shkim}@cclab.cnu.ac.kr

More information

BUSNet: Model and Usage of Regular Traffic Patterns in Mobile Ad Hoc Networks for Inter-Vehicular Communications

BUSNet: Model and Usage of Regular Traffic Patterns in Mobile Ad Hoc Networks for Inter-Vehicular Communications BUSNet: Model and Usage of Regular Traffic Patterns in Mobile Ad Hoc Networks for Inter-Vehicular Communications Kai-Juan Wong, Bu-Sung Lee, Boon-Chong Seet, Genping Liu, Lijuan Zhu School of Computer

More information

A Novel Identification Approach to Encryption Mode of Block Cipher Cheng Tan1, a, Yifu Li 2,b and Shan Yao*2,c

A Novel Identification Approach to Encryption Mode of Block Cipher Cheng Tan1, a, Yifu Li 2,b and Shan Yao*2,c th International Conference on Sensors, Mechatronics and Automation (ICSMA 16) A Novel Approach to Encryption Mode of Block Cheng Tan1, a, Yifu Li 2,b and Shan Yao*2,c 1 Science and Technology on Communication

More information

Study on Classifiers using Genetic Algorithm and Class based Rules Generation

Study on Classifiers using Genetic Algorithm and Class based Rules Generation 2012 International Conference on Software and Computer Applications (ICSCA 2012) IPCSIT vol. 41 (2012) (2012) IACSIT Press, Singapore Study on Classifiers using Genetic Algorithm and Class based Rules

More information

Analysis of Elephant Users in Broadband Network Traffic

Analysis of Elephant Users in Broadband Network Traffic Analysis of in Broadband Network Traffic Péter Megyesi and Sándor Molnár High Speed Networks Laboratory, Department of Telecommunications and Media Informatics, Budapest University of Technology and Economics,

More information

Network Management without Payload Inspection: Application Classification via Statistical Analysis of Bulk Flow Data

Network Management without Payload Inspection: Application Classification via Statistical Analysis of Bulk Flow Data Future Network and MobileSummit 2012 Conference Proceedings Paul Cunningham and Miriam Cunningham (Eds) IIMC International Information Management Corporation, 2012 ISBN: 978-1-905824-29-8 Network Management

More information

A Ns2 model for the Xbox System Link game Halo

A Ns2 model for the Xbox System Link game Halo A Ns2 model for the Xbox System Link game Halo Tanja Lang, Grenville Armitage Centre for Advanced Internet Architectures. Technical Report 030613A Swinburne University of Technology Melbourne, Australia

More information

Smart Home Network Management with Dynamic Traffic Distribution. Chenguang Zhu Xiang Ren Tianran Xu

Smart Home Network Management with Dynamic Traffic Distribution. Chenguang Zhu Xiang Ren Tianran Xu Smart Home Network Management with Dynamic Traffic Distribution Chenguang Zhu Xiang Ren Tianran Xu Motivation Motivation Per Application QoS In small home / office networks, applications compete for limited

More information

A Comparative Study of Selected Classification Algorithms of Data Mining

A Comparative Study of Selected Classification Algorithms of Data Mining Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.220

More information

Game Traffic Analysis: An MMORPG Perspective

Game Traffic Analysis: An MMORPG Perspective Appeared in ACM NOSSDAV 2005 (15th International Workshop on Network and Operating System Support for Digital Audio and Video) Game Traffic Analysis: An MMORPG Perspective (MMORPG: Massive Multiplayer

More information

Identifying and Discriminating Between Web and Peer-to-Peer Traffic in the Network Core

Identifying and Discriminating Between Web and Peer-to-Peer Traffic in the Network Core WWW 27 / Track: Technology for Developing Regions Identifying and Discriminating Between Web and Peer-to-Peer Traffic in the Network Core Jeffrey Erman Anirban Mahanti Martin Arlitt Carey Williamson Department

More information

Robust Network Traffic Classification

Robust Network Traffic Classification IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 23, NO. 4, AUGUST 2015 1257 Robust Network Traffic Classification Jun Zhang, Member, IEEE, XiaoChen, Student Member, IEEE, YangXiang, Senior Member, IEEE, Wanlei

More information

Switch Architecture for Efficient Transfer of High-Volume Data in Distributed Computing Environment

Switch Architecture for Efficient Transfer of High-Volume Data in Distributed Computing Environment Switch Architecture for Efficient Transfer of High-Volume Data in Distributed Computing Environment SANJEEV KUMAR, SENIOR MEMBER, IEEE AND ALVARO MUNOZ, STUDENT MEMBER, IEEE % Networking Research Lab,

More information

AN ASSOCIATIVE TERNARY CACHE FOR IP ROUTING. 1. Introduction. 2. Associative Cache Scheme

AN ASSOCIATIVE TERNARY CACHE FOR IP ROUTING. 1. Introduction. 2. Associative Cache Scheme AN ASSOCIATIVE TERNARY CACHE FOR IP ROUTING James J. Rooney 1 José G. Delgado-Frias 2 Douglas H. Summerville 1 1 Dept. of Electrical and Computer Engineering. 2 School of Electrical Engr. and Computer

More information

Fault Identification from Web Log Files by Pattern Discovery

Fault Identification from Web Log Files by Pattern Discovery ABSTRACT International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 2 ISSN : 2456-3307 Fault Identification from Web Log Files

More information

Balancing Awareness and Interruption: Investigation of Notification Deferral Policies

Balancing Awareness and Interruption: Investigation of Notification Deferral Policies Balancing Awareness and Interruption: Investigation of Notification Deferral Policies Eric Horvitz 1, Johnson Apacible 1, and Muru Subramani 1 1 Microsoft Research, One Microsoft Way Redmond, Washington

More information

Basic Concepts in Intrusion Detection

Basic Concepts in Intrusion Detection Technology Technical Information Services Security Engineering Roma, L Università Roma Tor Vergata, 23 Aprile 2007 Basic Concepts in Intrusion Detection JOVAN GOLIĆ Outline 2 Introduction Classification

More information

FPGA based Network Traffic Analysis using Traffic Dispersion Graphs

FPGA based Network Traffic Analysis using Traffic Dispersion Graphs FPGA based Network Traffic Analysis using Traffic Dispersion Graphs 2 nd September, 2010 Faisal N. Khan, P. O. Box 808, Livermore, CA 94551 This work performed under the auspices of the U.S. Department

More information

Clean Living: Eliminating Near-Duplicates in Lifetime Personal Storage

Clean Living: Eliminating Near-Duplicates in Lifetime Personal Storage Clean Living: Eliminating Near-Duplicates in Lifetime Personal Storage Zhe Wang Princeton University Jim Gemmell Microsoft Research September 2005 Technical Report MSR-TR-2006-30 Microsoft Research Microsoft

More information

CLASSIFICATION OF ARTIFICIAL INTELLIGENCE IDS FOR SMURF ATTACK

CLASSIFICATION OF ARTIFICIAL INTELLIGENCE IDS FOR SMURF ATTACK CLASSIFICATION OF ARTIFICIAL INTELLIGENCE IDS FOR SMURF ATTACK N.Ugtakhbayar, D.Battulga and Sh.Sodbileg Department of Communication technology, School of Information Technology, National University of

More information

Automated Application Signature Generation Using LASER and Cosine Similarity

Automated Application Signature Generation Using LASER and Cosine Similarity Automated Application Signature Generation Using LASER and Cosine Similarity Byungchul Park, Jae Yoon Jung, John Strassner *, and James Won-ki Hong * {fates, dejavu94, johns, jwkhong}@postech.ac.kr Dept.

More information

Characterizing Gnutella Network Properties for Peer-to-Peer Network Simulation

Characterizing Gnutella Network Properties for Peer-to-Peer Network Simulation Characterizing Gnutella Network Properties for Peer-to-Peer Network Simulation Selim Ciraci, Ibrahim Korpeoglu, and Özgür Ulusoy Department of Computer Engineering, Bilkent University, TR-06800 Ankara,

More information