Loading [a11y]/accessibility-menu.js
Flow signatures of popular applications | IEEE Conference Publication | IEEE Xplore

Flow signatures of popular applications


Abstract:

Network flow data is widely used to analyze the protocol mix forwarded by a router or to identify anomalies that may be caused by hardware and software failures, configur...Show More

Abstract:

Network flow data is widely used to analyze the protocol mix forwarded by a router or to identify anomalies that may be caused by hardware and software failures, configuration errors, or intrusion attempts. The goal of our research is to find application signatures in network flow traces that can be used to pinpoint certain applications, such as specific web browsers, mail clients, or media-players. Our starting point is the hypothesis that popular applications generate application specific flow signatures. In order to verify our hypothesis, we recorded traffic traces of several applications and we subsequently analyzed the traces to identify flow signatures of these applications. The flow signatures were formalized as queries of a stream-based flow query language. The queries have been executed on several flow traces in order to evaluate our approach.
Date of Conference: 23-27 May 2011
Date Added to IEEE Xplore: 18 August 2011
ISBN Information:
Print ISSN: 1573-0077
Conference Location: Dublin, Ireland

Contact IEEE to Subscribe

References

References is not available for this document.