Header signature maintenance for Internet traffic identification

نویسندگان

  • Sung-Ho Yoon
  • Jun-Sang Park
  • Baraka D. Sija
  • Mi-Jung Choi
  • Myung-Sup Kim
چکیده

Int J Network Mgmt 2016; 1–15 Summary Various traffic identification methods have been proposed with the focus on application‐level traffic analysis. Header signature–based identification using the 3‐tuple (Internet Protocol address, port number, and L4 protocol) within a packet header has garnered a lot of attention because it overcomes the limitations faced by the payload‐based method, such as encryption, privacy concerns, and computational overhead. However, header signature–based identification does have a significant flaw in that the volume of header signatures increases rapidly over time as a number of applications emerge, evolve, and vanish. In this article, we propose an efficient method for header signature maintenance. Our approach automatically constructs header signatures for traffic identification and only retains the most significant signatures in the signature repository to save memory space and to improve matching speed. For the signature maintenance, we define a new metric, the so‐called signature weight, that reflects its potential ability to identify traffic. Signature weight is periodically calculated and updated to adapt to the changes of network environment. We prove the feasibility of the proposed method by developing a prototype system and deploying it in a real operational network. Finally, we prove the superiority of our signature maintenance method through comparison analysis against other existing methods on the basis of various evaluation metrics.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Signature-aware Traffic Monitoring with IPFIX1

Traffic monitoring is essential for accounting user traffic and detecting anomaly traffic such as Internet worms or P2P file sharing applications. Since typical Internet traffic monitoring tools use only TCP/UDP/IP header information, they cannot effectively classify diverse application traffic, because TCP or UDP port numbers could be used by different applications. Moreover, under the recent ...

متن کامل

Identification of Repeated DoS Attacks using Network Traffic Forensics

Once an attacker has compromised a set of machines, typically, he will repeatedly deploy the same set of machines to attack different targets. In this paper, we propose a method to identify repeated attack scenarios, that is, the combination of a particular set of hosts and attack tool, by making use of pattern recognition techniques. While previous methods have focused on intrusion detection u...

متن کامل

Mitigating Distributed Denial-of-Service Attack with Deterministic Bit Marking

The Distributed Denial-of-Service attack is a serious threat in Internet and an effective method is needed for distinguishing the attack traffic from the legitimate traffic. We propose the concept of bit marking to identify and drop the attack packets. Bit marking is a variation of packet marking technique that modifies the packet header at each router. However bit marking differs from packet m...

متن کامل

Detection of malicious Traffic on Backbone Links via Packet Header Analysis

Purpose: In this study, modern Internet backbone traffic has been investigated in order to study occurrences of malicious activities and potential security problems within Internet packet headers. Design/Methodology/Approach: Contemporary and highly aggregated backbone data has been analyzed regarding consistency of network and transport layer headers (i.e. IP, TCP, UDP and ICMP). Possible secu...

متن کامل

Feature Extraction to Identify Network Traffic with Considering Packet Loss Effects

There are huge petitions of network traffic coming from various applications on Internet. In dealing with this volume of network traffic, network management plays a crucial rule. Traffic classification is a basic technique which is used by Internet service providers (ISP) to manage network resources and to guarantee Internet security. In addition, growing bandwidth usage, at one hand, and limit...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Int. Journal of Network Management

دوره 27  شماره 

صفحات  -

تاریخ انتشار 2017