Towards Automatic Signature Generation for Identification of HTTP-based Applications

被引:0
|
作者
Kim, Hwan-Hee [1 ]
Choi, Mi-Jung [1 ]
机构
[1] Kangwon Natl Univ, Dept Comp Sci, Chunchon, South Korea
来源
2013 15TH ASIA-PACIFIC NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (APNOMS) | 2013年
关键词
Signature; Regular expression; Traffic analysis; Application identification;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Today, network traffic is rapidly increasing by development of Internet with growth of smart devices such as smartphone, tablet PC, smart TV, etc. Specifically, since smart devices are using the HTTP protocol in various applications, HTTP traffic has been increasing continuously. In order to manage the increased network traffic, many studies such as well-known port based analysis, signature based analysis, statistical based analysis, have been conducted. Signature-based analysis among these network traffic analyses has relatively high accuracy, but it also has an overhead to create signatures. Hence, many studies have been conducted for reduce the overhead to create signatures. In this paper, we propose an automated signature generation system in order to exactly identify applications in HTTP traffic and reduce the overhead to create signatures. In addition, we propose a 'signature ranking method' for effectively applying our analysis system to real-time environment. We show our method feasibility through the experiment in a campus network.(1)
引用
收藏
页数:3
相关论文
共 50 条
  • [1] A Design Pattern for Reliable HTTP-Based Applications
    Ivaki, Naghmeh
    Laranjeiro, Nuno
    Araujo, Filipe
    2015 IEEE 12TH INTERNATIONAL CONFERENCE ON SERVICES COMPUTING (SCC 2015), 2015, : 656 - 663
  • [2] Simulation Framework for HTTP-Based Adaptive Streaming Applications
    Ott, Harald
    Miller, Konstantin
    Wolisz, Adam
    WNS3'17: PROCEEDINGS OF THE WORKSHOP ON NS-3, 2017, : 95 - 102
  • [3] An Http-based implementation of OpenSST
    Zhang, XH
    Cheng, F
    Dulaunoy, A
    Meinel, C
    ICCC2004: Proceedings of the 16th International Conference on Computer Communication Vol 1and 2, 2004, : 1560 - 1565
  • [4] Survey of approaches and features for the identification of HTTP-based botnet traffic
    Acarali, Dilara
    Rajarajan, Muttukrishnan
    Komninos, Nikos
    Herwono, Ian
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 76 : 1 - 15
  • [5] Analyzing HTTP-Based Information Exfiltration of Malicious Android Applications
    Kelkar, Soham
    Kraus, Timothy
    Morgan, Daria
    Zhang, Junjie
    Dai, Rui
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 1642 - 1645
  • [6] Automated Generation of Models for Fast and Precise Detection of HTTP-Based Malware
    Zarras, Apostolis
    Papadogiannakis, Antonis
    Gawlik, Robert
    Holz, Thorsten
    2014 TWELFTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2014, : 249 - 256
  • [7] HTTP-based anonymous communication channels
    Waldman, M
    Köpsell, S
    DR DOBBS JOURNAL, 2004, 29 (06): : 30 - 33
  • [8] Analysis of Aggregated HTTP-based Video Traffic
    Biernacki, Arkadiusz
    JOURNAL OF COMMUNICATIONS AND NETWORKS, 2016, 18 (05) : 826 - 836
  • [9] An Empirical Study of HTTP-based Financial Botnets
    Sood, Aditya K.
    Zeadally, Sherali
    Enbody, Richard J.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2016, 13 (02) : 236 - 251
  • [10] High-level design and architecture of an HTTP-based infrastructure for web applications
    Neumann G.
    Zdun U.
    World Wide Web, 2000, 3 (1) : 13 - 26