Toward the accurate identification of network applications

AW Moore, K Papagiannaki - International workshop on passive and active …, 2005 - Springer
Well-known port numbers can no longer be used to reliably identify network applications.
There is a variety of new Internet applications that either do not use well-known port …

Unexpected means of protocol inference

J Ma, K Levchenko, C Kreibich, S Savage… - Proceedings of the 6th …, 2006 - dl.acm.org
Network managers are inevitably called upon to associate network traffic with particular
applications. Indeed, this operation is critical for a wide range of management functions …

[PDF][PDF] Evaluating machine learning algorithms for automated network application identification

N Williams, S Zander… - Center for …, 2006 - researchportal.murdoch.edu.au
The identification of network applications that create traffic flows is vital to the areas of
network management and surveillance. Current popular methods such as port number and …

A statistical approach to IP-level classification of network traffic

M Crotti, F Gringoli, P Pelosato… - 2006 IEEE international …, 2006 - ieeexplore.ieee.org
Correct classification of traffic flows according to the application layer protocols that
generated them is essential for most network-management, resource allocation and …

Application‐level traffic monitoring and an analysis on IP networks

MS Kim, YJ Won, JWK Hong - ETRI journal, 2005 - Wiley Online Library
Traditional traffic identification methods based on well‐known port numbers are not
appropriate for the identification of new types of Internet applications. This paper proposes a …

A survey on internet traffic identification

A Callado, C Kamienski, G Szabó… - … surveys & tutorials, 2009 - ieeexplore.ieee.org
The area of Internet traffic measurement has advanced enormously over the last couple of
years. This was mostly due to the increase in network access speeds, due to the …

Semi-supervised network traffic classification

J Erman, A Mahanti, M Arlitt, I Cohen… - Proceedings of the 2007 …, 2007 - dl.acm.org
Identifying and categorizing network traffic by application type is challenging because of the
continued evolution of applications, especially of those with a desire to be undetectable. The …

Efficient application identification and the temporal and spatial stability of classification schema

W Li, M Canini, AW Moore, R Bolla - Computer Networks, 2009 - Elsevier
Motivated by the importance of accurate identification for a range of applications, this paper
compares and contrasts the effective and efficient classification of network-based …

Datasets are not enough: Challenges in labeling network traffic

JL Guerra, C Catania, E Veas - Computers & Security, 2022 - Elsevier
In contrast to previous surveys, the present work is not focused on reviewing the datasets
used in the network security field. The fact is that many of the available public labeled …

Reviewing traffic classification

S Valenti, D Rossi, A Dainotti, A Pescapè… - Data Traffic Monitoring …, 2013 - Springer
Traffic classification has received increasing attention in the last years. It aims at offering the
ability to automatically recognize the application that has generated a given stream of …