Discriminating Internet Applications based on Multiscale Analysis

被引:0
作者
Rocha, Eduardo [1 ]
Salvador, Paulo [1 ]
Nogueira, Antonio [1 ]
机构
[1] Univ Aveiro, Inst Telecomunicacoes, P-3810193 Aveiro, Portugal
来源
2009 NEXT GENERATION INTERNET NETWORKS | 2009年
关键词
Application identification; multiscale analysis; wavelets; cluster analysis; multifractal behavior;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the last few years, several new IP applications and protocols emerged as the capability of the networks to provide new services increased. The rapid increase in the number of users of Peer-to-Peer (P2P) network applications, due to the fact that users are easily able to use network resources over these overlay networks, also lead to a drastic increase in the overall Internet traffic volume. An accurate mapping of Internet traffic to applications can be important for a broad range of network management and measurement tasks, including traffic engineering, service differentiation, performance/failure monitoring and security. Traditional mapping approaches have become increasingly inaccurate because many applications use non-default or ephemeral port numbers, use well-known port numbers associated with other applications, change application signatures or use traffic encryption. This paper presents a novel framework for identifying IP applications based on the multiscale behavior of the generated traffic: by performing clustering analysis over the multiscale parameters that are inferred from the measured traffic, we are able to efficiently differentiate different IP applications. Besides achieving accurate identification results, this approach also avoids some of the limitations of existing identification techniques, namely their inability do deal with stringent confidentiality requirements.
引用
收藏
页码:40 / 46
页数:7
相关论文
共 27 条
[1]  
ABRY MST, 2000, WAVELETS ANAL ESTIMA
[2]   Anomaly detection in communication networks using wavelets [J].
Alarcon-Aquino, V ;
Barria, JA .
IEE PROCEEDINGS-COMMUNICATIONS, 2001, 148 (06) :355-362
[3]  
[Anonymous], 2004, AVIAN DIS
[4]  
[Anonymous], SIGCOMM
[5]  
[Anonymous], P INT C AC SPEECH SI
[6]  
COCHRAN D, 1988, AC SPEECH SIGN PROC, V4, P2388
[7]  
ENESCU B, 2004, ANN DISASTER PREVENT, V47
[8]  
Erman Jeffrey., 2006, Proceedings of the 2006 SIGCOMM workshop on Mining Network Data, P281
[9]  
Feldmann A., 1998, Computer Communication Review, V28, P42, DOI 10.1145/285243.285256
[10]  
Feldmann A, 1999, COMP COMM R, V29, P301, DOI 10.1145/316194.316235