Network application profiling with traffic causality graphs

被引:14
|
作者
Asai, Hirochika [1 ]
Fukuda, Kensuke [2 ]
Abry, Patrice [3 ]
Borgnat, Pierre [3 ]
Esaki, Hiroshi [1 ]
机构
[1] Univ Tokyo, Grad Sch Informat Sci & Technol, Tokyo 1138654, Japan
[2] NII, Tokyo, Japan
[3] Ecole Normale Super Lyon, CNRS, F-69364 Lyon, France
关键词
Graph mining; Identification; Network application profiling; Traffic causality graph;
D O I
10.1002/nem.1865
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A network application profiling framework is proposed that is based on traffic causality graphs (TCGs), representing temporal and spatial causality of flows to identify application programs. The proposed framework consists of three modules: the feature vector space construction using discriminative patterns extracted from TCGs by a graph-mining algorithm; a feature vector supervised learning procedure in the constructed vector space; and an application identification program using a similarity measure in the feature vector space. Accuracy of the proposed framework for application identification is evaluated, making use of ground truth packet traces from seven peer-to-peer (P2P) application programs. It is demonstrated that this framework achieves an overall 90.0% accuracy in application identification. Contributions are twofold: (1) using a graph-mining algorithm, the proposed framework enables automatic extraction of discriminative patterns serving as identification features; 2) high accuracy in application identification is achieved, notably for P2P applications that are more difficult to identify because of their using random ports and potential communication encryption. Copyright (C) 2014 John Wiley & Sons, Ltd
引用
收藏
页码:289 / 303
页数:15
相关论文
共 50 条
  • [41] Investigating Application Behavior in Network Traffic Traces
    Foroushani, Vahid Aghaei
    Zincir-Heywood, A. Nur
    2013 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE FOR SECURITY AND DEFENSE APPLICATIONS (CISDA), 2013, : 72 - 79
  • [42] Application Identification via Network Traffic Classification
    Yamansavascilar, Baris
    Guvensan, M. Amac
    Yavuz, A. Gokhan
    Karsligil, M. E.
    2017 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2016, : 843 - 848
  • [43] The DARPA SEARCHLIGHT Dataset of Application Network Traffic
    Ardi, Calvin
    Aubry, Connor
    Kocoloski, Brian
    DeAngelis, David
    Hussain, Alefiya
    Troglia, Matt
    Schwab, Stephen
    THE PROCEEDINGS OF 15TH WORKSHOP ON CYBER SECURITY EXPERIMENTATION AND TEST, CSET 2022, 2022, : 59 - 64
  • [44] An Application for Traffic Analysis and Optimization of Network Infrastructures
    Pereira, Marco
    Sousa, Pedro
    2018 13TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI), 2018,
  • [45] TRAFFIC CLASSIFICATION AND APPLICATION IDENTIFICATION IN NETWORK FORENSICS
    Pluskal, Jan
    Lichtner, Ondrej
    Rysavy, Ondrej
    ADVANCES IN DIGITAL FORENSICS XIV, 2018, 532 : 161 - 181
  • [46] Graphs, causality, and structural equation models
    Pearl, J
    SOCIOLOGICAL METHODS & RESEARCH, 1998, 27 (02) : 226 - 284
  • [47] Bond graphs II: Causality and singularity
    Department of Mathematics, University of Nottingham, Nottingham, NG7 2RD, United Kingdom
    不详
    Discrete Appl Math, 2 (143-173):
  • [48] Structuring graphs for the understanding of causality in texts
    Nazarenko, A.
    Revue d'Intelligence Artificielle, 1996, 10 (01): : 163 - 198
  • [49] Entropy-Based Profiling of Network Traffic for Detection of Security Attack
    Lee, Tsern-Huei
    He, Jyun-De
    TENCON 2009 - 2009 IEEE REGION 10 CONFERENCE, VOLS 1-4, 2009, : 2505 - 2509
  • [50] Exploration of the application of Grey-Markov models in the causality analysis of traffic accidents in roundabouts
    Li, Peijing
    Li, Jian
    PLOS ONE, 2023, 18 (09):