Effective behavior signature extraction method using sequence pattern algorithm for traffic identification
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Shim, Kyu-Seok | - |
dc.contributor.author | Yoon, Sung-Ho | - |
dc.contributor.author | Sija, Baraka D. | - |
dc.contributor.author | Park, Jun-Sang | - |
dc.contributor.author | Cho, Kyunghee | - |
dc.contributor.author | Kim, Myung-Sup | - |
dc.date.accessioned | 2021-09-02T14:04:33Z | - |
dc.date.available | 2021-09-02T14:04:33Z | - |
dc.date.created | 2021-06-16 | - |
dc.date.issued | 2018-03 | - |
dc.identifier.issn | 1055-7148 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/76856 | - |
dc.description.abstract | With the rapid development of the internet and a vigorous emergence of new applications, traffic identification has become a key issue. Although various methods have been proposed, there are still several limitations to achieving fine-grained and application-level identification. Therefore, we previously proposed a behavior signature model for extracting a unique traffic pattern of an application. Although this signature model achieves a good identification performance, it has trouble with the signature extraction, particularly from a huge amount of input traffic, because a Candidate-Selection method is used for extracting the signature. To improve this inefficiency in the extraction process, in this paper, we propose a novel behavior signature extraction method using a sequence pattern algorithm. The proposed method can extract a signature regardless of the volume of input traffic because it excludes certain unsatisfactory candidates using a predefined support value during the early stage of the process. We proved experimentally the feasibility of the proposed extraction method for 7 popular applications. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | WILEY | - |
dc.subject | CLASSIFICATION | - |
dc.title | Effective behavior signature extraction method using sequence pattern algorithm for traffic identification | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Kim, Myung-Sup | - |
dc.identifier.doi | 10.1002/nem.2011 | - |
dc.identifier.scopusid | 2-s2.0-85043502587 | - |
dc.identifier.wosid | 000427120900003 | - |
dc.identifier.bibliographicCitation | INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, v.28, no.2 | - |
dc.relation.isPartOf | INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT | - |
dc.citation.title | INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT | - |
dc.citation.volume | 28 | - |
dc.citation.number | 2 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordPlus | CLASSIFICATION | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.