Formal Methods to Improve the Identification and Validation of Network Traffic

被引:0
|
作者
Finsterbusch, Michael [1 ]
Mueller, Jean-Alexander [2 ]
机构
[1] HTWK Leipzig, Leipzig, Germany
[2] HfT Leipzig, Leipzig, Germany
关键词
traffic identification; protocol verification; CLASSIFICATION;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Internet traffic identification and validation has been the subject of intensive study for many years. It is used to provide Quality of Service, to provide security and to implement many other tasks. The reliability of these methods, however, is not proved by formal verification. Therefore, the results of these methods can vary from the lab where these methods were developed and their deployment in real world application. In this paper, we present an idea to overcome this problem in order to guarantee reliability and provide more optimised solutions.
引用
收藏
页数:3
相关论文
共 50 条
  • [21] On Formal Modeling and Validation of Wireless Sensor Network Protocols
    Rachid Bechar
    Mounir Tahar Abbes
    Freha Mezzoudj
    Ladjel Bellatreche
    Wireless Personal Communications, 2020, 114 : 2855 - 2888
  • [22] On Formal Modeling and Validation of Wireless Sensor Network Protocols
    Bechar, Rachid
    Tahar Abbes, Mounir
    Mezoudj, Fareha
    Bellatreche, Ladjel
    WIRELESS PERSONAL COMMUNICATIONS, 2020, 114 (04) : 2855 - 2888
  • [23] Formal analysis methods of network security design
    Stawowski, Mariusz
    SECRYPT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2007, : 313 - 318
  • [24] Snowflake Anonymous Network Traffic Identification
    Wang, Yuying
    Yang, Guilong
    Xu, Dawei
    Dai, Cheng
    Chen, Tianxin
    Yang, Yunfan
    PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND NETWORKS, VOL III, CENET 2023, 2024, 1127 : 402 - 412
  • [25] Protocol identification of encrypted network traffic
    Gebski, Matthew
    Penev, Alex
    Wong, Raymond K.
    2006 IEEE/WIC/ACM International Conference on Web Intelligence, (WI 2006 Main Conference Proceedings), 2006, : 957 - 960
  • [26] Models and Methods for Studying Network Traffic
    Poymanova, E. D.
    Tatarnikova, T. M.
    2018 WAVE ELECTRONICS AND ITS APPLICATION IN INFORMATION AND TELECOMMUNICATION SYSTEMS (WECONF), 2018,
  • [27] Network Traffic Identification Algorithm Based on Neural Network
    Wu, Fei
    Ye, Yong
    Li, Hongfa
    Ni, Shilong
    Su, Jiangwen
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2016, 9 (12): : 129 - 138
  • [28] Traffic Pattern Plot: Video Identification in Encrypted Network Traffic
    Kamal, Ali S.
    Bukhari, Syed M. A. H.
    Khan, Muhammad U. S.
    Maqsood, Tahir
    Fayyaz, Muhammad A. B.
    INTELLIGENT SUSTAINABLE SYSTEMS, WORLDS4 2022, VOL 2, 2023, 579 : 77 - 84
  • [29] Requirements validation of a voice communication system used in air traffic control -: An industrial application of light-weight formal methods
    Hörl, J
    Aichernig, BK
    4TH INTERNATIONAL CONFERENCE ON REQUIREMENTS ENGINEERING, PROCEEDINGS, 2000, : 190 - 190
  • [30] COST 247, verification and validation methods for formal descriptions - Foreword
    Groote, JF
    Rem, M
    SCIENCE OF COMPUTER PROGRAMMING, 1997, 29 (1-2) : 1 - 2