2010 Proceedings IEEE INFOCOM 2010
DOI: 10.1109/infcom.2010.5462239
|View full text |Cite
|
Sign up to set email alerts
|

Link Homophily in the Application Layer and its Usage in Traffic Classification

Abstract: Abstract-This paper addresses the following questions. Is there link homophily in the application layer traffic? If so, can it be used to accurately classify traffic in network trace data without relying on payloads or properties at the flow level? Our research shows that the answers to both of these questions are affirmative in real network trace data. Specifically, we define link homophily to be the tendency for flows with common IP hosts to have the same application (P2P, Web, etc.) compared to randomly sel… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
11
0

Year Published

2011
2011
2024
2024

Publication Types

Select...
6
3

Relationship

1
8

Authors

Journals

citations
Cited by 20 publications
(11 citation statements)
references
References 18 publications
0
11
0
Order By: Relevance
“…Beside software-based solutions [1][2][3][4][5][6][7][8][9][10], recent years, researchers have attempted to employ specialized hardware such as FPGA to accelerate traffic classification.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Beside software-based solutions [1][2][3][4][5][6][7][8][9][10], recent years, researchers have attempted to employ specialized hardware such as FPGA to accelerate traffic classification.…”
Section: Related Workmentioning
confidence: 99%
“…They include (1) payload-based method [1][2][3][4][5][6], a.k.a. deep packet inspection (DPI), which relies on searching the packet payload for application-specific signatures, (2) host-based approach [7][8][9] that makes use of transport-layer connection patterns of hosts, and (3) machine learning-based scheme (survey [10]) to classify traffic by recognizing statistical features of flows, such as packet lengths and inter-arrival times statistics.…”
Section: Introductionmentioning
confidence: 99%
“…This tendency can be exploited to characterize computer network traffic [35], even in the presence of packet obfuscation.…”
Section: Related Workmentioning
confidence: 99%
“…Finally, approach (iii) is based on the analysis of host behavior instead of individual network connections. The basic idea behind this solution is that different applications or application groups have different communication habits, for example, a client application has few outgoing connections, a server has numerous incoming connections, while P2P applications have many connections in both directions, giving rise to methods analyzing the connection patterns of host interactions [6], [7] or utilizing the assumption that similar hosts tend to be related to one another [8].…”
Section: Introductionmentioning
confidence: 99%