Network Application Identification Using Sequential Transition Patterns of Payload Length
スポンサーリンク
概要
- 論文の詳細を見る
A person-to-person information sharing is easily realized by P2P networks that servers are not essential. Information leakages, which are caused by malicious accesses for P2P networks, has become new social issues. To prevent information leakage, it is necessary to detect and block traffics of P2P software. Since some P2P softwares can spoof port numbers, it is difficult to detect the traffics sent from P2P softwares by using port numbers. It is more difficult to devise effective countermeasures for detecting the software because their protocol are not public. In this paper, we propose a method to identify applications using sequential transition patterns of payload length. Through real traffic experiment we show that proposed method can quickly and accurately identify network applications.
- 東北大学大学院情報科学研究科の論文
著者
関連論文
- A Study of Gaussian Activation Function Based Modular Neural Network for Alternative-Style Handwritten Characters Recognition System
- Network Application Identification Using Sequential Transition Patterns of Payload Length