Behavior signature for fine-grained traffic identification
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Yoon, S.-H. | - |
dc.contributor.author | Park, J.-S. | - |
dc.contributor.author | Kim, M.-S. | - |
dc.date.accessioned | 2021-09-05T00:02:15Z | - |
dc.date.available | 2021-09-05T00:02:15Z | - |
dc.date.created | 2021-06-17 | - |
dc.date.issued | 2015 | - |
dc.identifier.issn | 1935-0090 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/95963 | - |
dc.description.abstract | With the rapid development of the Internet and a vigorous emergence of new applications, traffic identification has become a key issue for efficient network management. Although various methods have been proposed, there are still several limitations to achieving fine-grained and application-level traffic identification. In this paper, we propose a new signature model called a behavior signature for Internet traffic identification that utilizes the inter-flow relation of application traffic. The proposed behavior signature is a unique traffic behavior pattern appearing in the first few packets of plural traffic flows when a specific function is conducted by an application with a combination of various optional traffic features. This is in contrast to other existing signature models that usually focus on a singular packet or flow for feature extraction and traffic identification. We proved the feasibility and applicability of the proposed behavior signature by developing an extraction and identification algorithm and by conducting experiments on several popular applications. © 2015 NSP Natural Sciences Publishing Cor. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | Natural Sciences Publishing Co. | - |
dc.title | Behavior signature for fine-grained traffic identification | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Kim, M.-S. | - |
dc.identifier.doi | 10.12785/amis/092L27 | - |
dc.identifier.scopusid | 2-s2.0-84931829324 | - |
dc.identifier.bibliographicCitation | Applied Mathematics and Information Sciences, v.9, no.2, pp.523 - 534 | - |
dc.relation.isPartOf | Applied Mathematics and Information Sciences | - |
dc.citation.title | Applied Mathematics and Information Sciences | - |
dc.citation.volume | 9 | - |
dc.citation.number | 2 | - |
dc.citation.startPage | 523 | - |
dc.citation.endPage | 534 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scopus | - |
dc.subject.keywordAuthor | Behavior signature | - |
dc.subject.keywordAuthor | Network management | - |
dc.subject.keywordAuthor | Traffic classification | - |
dc.subject.keywordAuthor | Traffic identification | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.