DocumentCode :
3282843
Title :
Network Application Identification Using Transition Pattern of Payload Length
Author :
Yagi, Shinnosuke ; Waizumi, Yuji ; Tsunoda, Hiroshi ; Jamalipour, Abbas ; Kato, Nei ; Nemoto, Yoshiaki
Author_Institution :
Tohoku Univ., Sendai
fYear :
2008
fDate :
March 31 2008-April 3 2008
Firstpage :
2633
Lastpage :
2638
Abstract :
In recent years, information leakage through the Internet has become a new social problem. Many information leakage incidents are caused by illegal applications such as peer-to-peer (P2P) file sharing software. To prevent information leakage, early detection and blocking of the traffic exchanged by illegal applications is strongly required. In this paper, we propose a method for application discrimination of monitored traffic based on the transition pattern of payload length during start up phase of the communication. The proposed method does not need port numbers, which can be spoofed easily. Through experiments using real network traffic, we show that the proposed method can quickly and accurately discriminate applications.
Keywords :
Internet; peer-to-peer computing; telecommunication security; telecommunication traffic; Internet; illegal application; information leakage; payload length transition pattern; peer-to-peer file sharing software; social problem; Application software; Communications Society; Cryptography; Internet; Payloads; Peer to peer computing; Privacy; Statistics; Telecommunication traffic; Yagi-Uda antennas;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Wireless Communications and Networking Conference, 2008. WCNC 2008. IEEE
Conference_Location :
Las Vegas, NV
ISSN :
1525-3511
Print_ISBN :
978-1-4244-1997-5
Type :
conf
DOI :
10.1109/WCNC.2008.462
Filename :
4489493
Link To Document :
بازگشت