Title :
Application traffic classification based on command exchange mode of TCP flows
Author :
Chen, Yu ; Ping, Xiayu ; Wei, Tao
Author_Institution :
Inst. of Comput. Sci. & Technol., Peking Univ., Beijing, China
Abstract :
The principal technique employed in application traffic classification, a task of identifying the applications underlying network traffic, has evolved from based on port number to deep packet inspection to payload-independent classification. We propose a novel approach in the last category. The principal idea of our method is that we associate an application with temporal patterns of the command exchange modes (subsequences of packets) of TCP flows generated by the application. Since these patterns are local by nature, our approach might be able to identify an application even if only a portion of a full flow is observable. We have applied such method to classify a number of popular P2P applications and to detect suspicious botnet traffic. To identify these kinds of traffic, we not only utilize flow patterns, but also incorporate some statistics on multi-flow and host levels. We have tested our algorithm on P2P traffic collected from our institute´s computer network and on botnet traffic collected from a national-wide distributed honeynet. The early results are quite encouraging.
Keywords :
peer-to-peer computing; telecommunication traffic; transport protocols; P2P traffic; TCP flows; command exchange mode; traffic classification; Classification algorithms; Computers; Fingerprint recognition; Partitioning algorithms; Protocols; Software; Training; P2P; botnet; command exchange mode; traffic characteristics; traffic classification;
Conference_Titel :
Information Theory and Information Security (ICITIS), 2010 IEEE International Conference on
Conference_Location :
Beijing
Print_ISBN :
978-1-4244-6942-0
DOI :
10.1109/ICITIS.2010.5689522