KISS: Stocastic Packet Inspection for UDP Traffic Classification
نویسندگان
چکیده
This paper proposes KISS, a novel Internet classification engines. Motivated by the expected raise of UDP traffic, which stems from the momentum of P2P streaming applications, we propose a novel payload-based classification framework which leverages on statistical characterization of payload. Statistical signatures are automatically inferred from training data, by the means of a Chi-Square like test, which extracts the protocol “format”, but ignores the protocol semantic and synchronization rules. The signatures feed a decision engine based either on a simple geometric decision process, or on Support Vector Machines. KISS is very efficient, and its signatures are intrinsically robust to packet sampling, reordering, and flow asymmetry, so that is can be used on almost any network. KISS is tested in different scenarios, considering both data, VoIP, and traditional P2P Internet applications. Results are astonishing. The average True Positive percentage is 99.6%, with the worst case equal 98.7%. Less than 0.05% of False Positives are raised. But KISS is also proved to provide almost perfect results when facing new P2P streaming applications, such as Joost, PPLive, SopCast and TVants.
منابع مشابه
KISS: Stochastic Packet Inspection
This paper proposes KISS, a new Internet classification method. Motivated by the expected raise of UDP traffic volume, which stems from the momentum of P2P streaming applications, we propose a novel statistical payload-based classification framework, targeted to UDP traffic. Statistical signatures are automatically inferred from training data, by the means of a Chi-Square like test, which extra...
متن کاملA Review on Traffic Classification Methods in WSN
In a wireless network it is very important to provide the network security and quality of service. To achieve these parameters there must be proper traffic classification in the wireless network. There are many algorithms used such as port number, deep packet inspection as the earlier methods and now days KISS, nearest cluster based classifier (NCC), SVM method and used to classify the traffic ...
متن کاملNew High Secure Network Steganography Method Based on Packet Length
In network steganography methods based on packet length, the length of the packets is used as a carrier for exchanging secret messages. Existing methods in this area are vulnerable against detections due to abnormal network traffic behaviors. The main goal of this paper is to propose a method which has great resistance to network traffic detections. In the first proposed method, the sender embe...
متن کاملEfficient application identification and the temporal and spatial stability of classification schema
Motivated by the importance of accurate identification for a range of applications, this paper compares and contrasts the effective and efficient classification of network-based applications using behavioral observations of network-traffic and those using Deep-Packet Inspection. Importantly, throughout our work we are able to make comparison with data possessing an accurate, independently-deter...
متن کاملGoing Beyond Deep Packet Inspection (DPI) Software on Intel® Architecture
Ever-increasing IP traffic and security threats are driving the need for more robust cyber security and extensive analysis of packet flows to better protect and manage network traffic. In response, a new breed of security appliances has emerged, interrogating packet content and extracting metadata, and providing far more traffic flow detail than made possible with first generation deep packet i...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009