Network application identification using transition pattern of payload length

Shinnosuke Yagi, Yuji Waizumi, Hiroshi Tsunoda, Abbas Jamalipour, Nei Kato, Yoshiaki Nemoto

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Abstract

In recent years, information leakage through the Internet has become a new social problem. Many information leakage incidents are caused by illegal applications such as Peer-to-Peer (P2P) file sharing software. To prevent information leakage, early detection and blocking of the traffic exchanged by illegal applications is strongly required. In this paper, we propose a method for application discrimination of monitored traffic based on the transition pattern of payload length during start up phase of the communication. The proposed method does not need port numbers, which can be spoofed easily. Through experiments using real network traffic, we show that the proposed method can quickly and accurately discriminate applications.

Original languageEnglish
Title of host publicationWCNC 2008 - IEEE Wireless Communications and Networking Conference, Conference Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages2633-2638
Number of pages6
ISBN (Print)9781424419968
DOIs
Publication statusPublished - 2008 Jan 1
EventIEEE Wireless Communications and Networking Conference, WCNC 2008 - Las Vegas, NV, United States
Duration: 2008 Mar 312008 Apr 3

Publication series

NameIEEE Wireless Communications and Networking Conference, WCNC
ISSN (Print)1525-3511

Other

OtherIEEE Wireless Communications and Networking Conference, WCNC 2008
CountryUnited States
CityLas Vegas, NV
Period08/3/3108/4/3

ASJC Scopus subject areas

  • Engineering(all)

Fingerprint Dive into the research topics of 'Network application identification using transition pattern of payload length'. Together they form a unique fingerprint.

Cite this