Network application profiling with traffic causality graphs

被引:14
|
作者
Asai, Hirochika [1 ]
Fukuda, Kensuke [2 ]
Abry, Patrice [3 ]
Borgnat, Pierre [3 ]
Esaki, Hiroshi [1 ]
机构
[1] Univ Tokyo, Grad Sch Informat Sci & Technol, Tokyo 1138654, Japan
[2] NII, Tokyo, Japan
[3] Ecole Normale Super Lyon, CNRS, F-69364 Lyon, France
关键词
Graph mining; Identification; Network application profiling; Traffic causality graph;
D O I
10.1002/nem.1865
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A network application profiling framework is proposed that is based on traffic causality graphs (TCGs), representing temporal and spatial causality of flows to identify application programs. The proposed framework consists of three modules: the feature vector space construction using discriminative patterns extracted from TCGs by a graph-mining algorithm; a feature vector supervised learning procedure in the constructed vector space; and an application identification program using a similarity measure in the feature vector space. Accuracy of the proposed framework for application identification is evaluated, making use of ground truth packet traces from seven peer-to-peer (P2P) application programs. It is demonstrated that this framework achieves an overall 90.0% accuracy in application identification. Contributions are twofold: (1) using a graph-mining algorithm, the proposed framework enables automatic extraction of discriminative patterns serving as identification features; 2) high accuracy in application identification is achieved, notably for P2P applications that are more difficult to identify because of their using random ports and potential communication encryption. Copyright (C) 2014 John Wiley & Sons, Ltd
引用
收藏
页码:289 / 303
页数:15
相关论文
共 50 条
  • [1] Causality-based Sensemaking of Network Traffic for Android Application Security
    Zhang, Hao
    Yao, Danfeng
    Ramakrishnan, Naren
    AISEC'16: PROCEEDINGS OF THE 2016 ACM WORKSHOP ON ARTIFICIAL INTELLIGENCE AND SECURITY, 2016, : 47 - 58
  • [2] Application profiling of IP traffic
    Liu, D
    Huebner, F
    LCN 2002: 27TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 2002, : 220 - 229
  • [3] Causality and price discovery: An application of directed acyclic graphs
    Haigh, MS
    Bessler, DA
    JOURNAL OF BUSINESS, 2004, 77 (04): : 1099 - 1121
  • [4] A statistical method for profiling network traffic
    Marchette, D
    PROCEEDINGS OF THE WORKSHOP ON INTRUSION DETECTION AND NETWORK MONITORING (ID '99), 1999, : 119 - 128
  • [5] Connectivity index of directed rough fuzzy graphs and its application in traffic flow network
    Ahmad, Uzma
    Nawaz, Iqra
    Broumi, Said
    GRANULAR COMPUTING, 2023, 8 (06) : 1561 - 1582
  • [6] Connectivity index of directed rough fuzzy graphs and its application in traffic flow network
    Uzma Ahmad
    Iqra Nawaz
    Said Broumi
    Granular Computing, 2023, 8 : 1561 - 1582
  • [7] User Profiling from Network Traffic via Novel Application-Level Interactions
    Alotibi, Gaseb
    Clarke, Nathan
    Li, Fudong
    Furnell, Steven
    2016 11TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2016, : 279 - 285
  • [8] Modeling and Profiling of Aggregated Industrial Network Traffic
    Lavassani, Mehrzad
    akerberg, Johan
    Bjoerkman, Mats
    APPLIED SCIENCES-BASEL, 2022, 12 (02):
  • [9] Traffic profiling for efficient network resource utilization
    Kalapriya, K
    Raghucharan, BR
    Lele, AM
    Nandy, SK
    IC'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTERNET COMPUTING, VOLS 1 AND 2, 2003, : 789 - 795
  • [10] Cubic Graphs and Their Application to a Traffic Flow Problem
    G. Muhiuddin
    M. Mohseni Takallo
    Y. B. Jun
    R. A. Borzooei
    International Journal of Computational Intelligence Systems, 2020, 13 : 1265 - 1280