skip to main content
10.1145/1558607.1558684acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsiirwConference Proceedingsconference-collections
research-article

Content-based alternatives to conventional network monitoring systems

Published: 13 April 2009 Publication History

Abstract

Network monitoring and management rely extensively upon network protocol identification as one of the most basic acts of analysis of network traffic. However, the conventional method of identifying network protocols based upon standard or well-known port numbers is no longer sufficient for modern networks, given the propensities for users and programs to change ports dynamically or use nonstandard ports. Unfortunately, this calls into question the ability of the collection of standard tools to gather reliable network intelligence.

References

[1]
S. Baset and H. Schulzrinne. An Analysis of the Skype Peer-to-Peer Internel Telephony Protocol. arXiv preprint cs.NI/0412017, 2004.
[2]
J. Levandoski, E. Sommer, and M. Strait. Application Layer Packet Classifier for Linux. 2008. http://17-filter.sourceforge.net/.
[3]
S. O Donnell. Network management: open source solutions to proprietary problems. In ACM SIGUCCS USER SERVICES CONFERENCE, volume 28, pages 208--217. ASSOCIATION FOR COMPUTING MACHINERY, 2000.
[4]
H. Welte. The netfilter framework in Linux 2.4. In Proceedings of Linux Kongress, 2000.

Index Terms

  1. Content-based alternatives to conventional network monitoring systems

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      CSIIRW '09: Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies
      April 2009
      952 pages
      ISBN:9781605585185
      DOI:10.1145/1558607
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 13 April 2009

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. network management
      2. network monitoring
      3. network protocol identification
      4. network protocols

      Qualifiers

      • Research-article

      Conference

      CSIIRW '09

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • 0
        Total Citations
      • 283
        Total Downloads
      • Downloads (Last 12 months)2
      • Downloads (Last 6 weeks)1
      Reflects downloads up to 27 Feb 2025

      Other Metrics

      Citations

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media