Title :
Machine Learning Techniques for Passive Network Inventory
Author :
François, Jérôme ; Abdelnur, Humberto ; State, Radu ; Festor, Olivier
Author_Institution :
Univ. of Luxembourg, Luxembourg, Luxembourg
fDate :
12/1/2010 12:00:00 AM
Abstract :
Being able to fingerprint devices and services, i.e., remotely identify running code, is a powerful service for both security assessment and inventory management. This paper describes two novel fingerprinting techniques supported by isomorphic based distances which are adapted for measuring the similarity between two syntactic trees. The first method leverages the support vector machines paradigm and requires a learning stage. The second method operates in an unsupervised manner thanks to a new classification algorithm derived from the ROCK and QROCK algorithms. It provides an efficient and accurate classification. We highlight the use of such classification techniques for identifying the remote running applications. The approaches are validated through extensive experimentations on SIP (Session Initiation Protocol) for evaluating the impact of the different parameters and identifying the best configuration before applying the techniques to network traces collected by a real operator.
Keywords :
fingerprint identification; learning (artificial intelligence); pattern classification; security of data; signalling protocols; support vector machines; QROCK algorithm; SIP; classification algorithm; fingerprinting techniques; inventory management; isomorphic based distances; machine learning; passive network inventory; security assessment; session initiation protocol; support vector machines; syntactic trees; Clustering algorithms; Fingerprint identification; Object recognition; Protocols; Support vector machines; Syntactics; Fingerprinting; SVM; inventory management; syntactic tree;
Journal_Title :
Network and Service Management, IEEE Transactions on
DOI :
10.1109/TNSM.2010.1012.0352