NOMS 2008 - 2008 IEEE Network Operations and Management Symposium 2008
DOI: 10.1109/noms.2008.4575130
|View full text |Cite
|
Sign up to set email alerts
|

Towards automated application signature generation for traffic identification

Abstract: Traditionally, Internet applications have been identified by using predefined well-known ports with questionable accuracy. An alternative approach, applicationlayer signature mapping, involves the exhaustive search of reliable signatures but with more promising accuracy. With a prior protocol knowledge, the signature generation can guarantee a high accuracy. As more applications use proprietary protocols, it becomes increasingly difficult to obtain an accurate signature while avoiding time-consuming and manual… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
61
0
2

Year Published

2013
2013
2018
2018

Publication Types

Select...
9
1

Relationship

5
5

Authors

Journals

citations
Cited by 108 publications
(63 citation statements)
references
References 9 publications
0
61
0
2
Order By: Relevance
“…Park et al [16] investigated the first 100 packets in each flow for four different applications. They discovered that the first few packets are used to send a signal before transmitting the content data, and most of the application signatures are located within the first few packets in a flow.…”
Section: Baseline Classification Systemmentioning
confidence: 99%
“…Park et al [16] investigated the first 100 packets in each flow for four different applications. They discovered that the first few packets are used to send a signal before transmitting the content data, and most of the application signatures are located within the first few packets in a flow.…”
Section: Baseline Classification Systemmentioning
confidence: 99%
“…Similarly, HMM implementation [16] covers the comparative analysis of different HMMs with other techniques of traffic classification. The researchers also applied other statistical methods [17], [18] to address the problem of traffic classification in IP networks.…”
Section: Related Workmentioning
confidence: 99%
“…Longest Application Signature ExtRaction (LASER) algorithm exists for automatic signature generation of patterns using packet payload. But the disadvantage is that common sequences can also exist in many genuine packets which may lead to buffering of genuine packets resulting in increased overhead [8]. Honeycomb, which generates automatic signatures from packet payload uses Longest Common Substring (LCS) algorithm.…”
Section: Introductionmentioning
confidence: 99%