Title :
Network Application Identification Using Transition Pattern of Payload Length
Author :
Yagi, Shinnosuke ; Waizumi, Yuji ; Tsunoda, Hiroshi ; Jamalipour, Abbas ; Kato, Nei ; Nemoto, Yoshiaki
Author_Institution :
Tohoku Univ., Sendai
fDate :
March 31 2008-April 3 2008
Abstract :
In recent years, information leakage through the Internet has become a new social problem. Many information leakage incidents are caused by illegal applications such as peer-to-peer (P2P) file sharing software. To prevent information leakage, early detection and blocking of the traffic exchanged by illegal applications is strongly required. In this paper, we propose a method for application discrimination of monitored traffic based on the transition pattern of payload length during start up phase of the communication. The proposed method does not need port numbers, which can be spoofed easily. Through experiments using real network traffic, we show that the proposed method can quickly and accurately discriminate applications.
Keywords :
Internet; peer-to-peer computing; telecommunication security; telecommunication traffic; Internet; illegal application; information leakage; payload length transition pattern; peer-to-peer file sharing software; social problem; Application software; Communications Society; Cryptography; Internet; Payloads; Peer to peer computing; Privacy; Statistics; Telecommunication traffic; Yagi-Uda antennas;
Conference_Titel :
Wireless Communications and Networking Conference, 2008. WCNC 2008. IEEE
Conference_Location :
Las Vegas, NV
Print_ISBN :
978-1-4244-1997-5
DOI :
10.1109/WCNC.2008.462