Generating regular expression signatures for network traffic classification in trusted network management

Y Wang, Y Xiang, W Zhou, S Yu - Journal of Network and Computer …, 2012 - Elsevier
Network traffic classification is a critical foundation for trusted network management and
security systems. Matching application signatures in traffic payload is widely considered to …

Классификация IP-трафика методами машинного обучения

ОИ Шелухин, СД Ерохин, АВ Ванюшина - 2018 - elibrary.ru
Рассмотрены задачи, методы и проблемы классификация сетевого трафика методами
машинного обучения и интеллектуального анализа данных. Анализируются …

Toward IoT device fingerprinting from proprietary protocol traffic via key-blocks aware approach

Y Sang, J Yang, Y Zhang, S Li, P Chang - Computers & Security, 2023 - Elsevier
IoT Device fingerprinting of network traffic is valuable for many management and security
solutions as it provides insights into the devices active on a network. Unfortunately, existing …

Toward unsupervised protocol feature word extraction

Z Zhang, Z Zhang, PPC Lee, Y Liu… - IEEE Journal on …, 2014 - ieeexplore.ieee.org
Protocol feature words are byte subsequences within traffic payload that can distinguish
application protocols, and they form the building blocks of many constructions of deep …

Payload signature structure for accurate application traffic classification

YH Goo, KS Shim, SK Lee… - 2016 18th Asia-Pacific …, 2016 - ieeexplore.ieee.org
Emergence of high-speed Internet and various smart devices has led to a rapid increase of
applications on the Internet. In order to provide reliable services and efficient management …

Design and implementation of a malware detection system based on network behavior

L Xue, G Sun - Security and Communication Networks, 2015 - Wiley Online Library
With the increasing of new malicious software attacks, the host‐based malware detection
methods cannot always detect the latest unknown malware. Intrusion detection system does …

Analyzing Network Protocols of Application Layer Using Hidden Semi‐Markov Model

J Cai, JZ Luo, F Lei - Mathematical Problems in Engineering, 2016 - Wiley Online Library
With the rapid development of Internet, especially the mobile Internet, the new applications
or network attacks emerge in a high rate in recent years. More and more traffic becomes …

User behavior based traffic emulator: A framework for generating test data for DPI tools

P Megyesi, G Szabó, S Molnár - Computer Networks, 2015 - Elsevier
Abstract Deep Packet Inspection (DPI) engines rely highly on the operation environment ie,
the traffic mix they supposed to work with. A well performing DPI engine requires real-world …

Rexactor: Automatic regular expression signature generation for stateless packet inspection

M Kapoor, G Fuchs, J Quance - 2021 IEEE 20th International …, 2021 - ieeexplore.ieee.org
Monitoring, security, and network management systems require packet classification
solutions to identify particular application-layer protocols. In real-time cases, traffic must …

[PDF][PDF] Behavior signature for fine-grained traffic identification

SH Yoon, JS Park, MS Kim - Appl. Math, 2015 - nmlab.korea.ac.kr
With the rapid development of the Internet and a vigorous emergence of new applications,
traffic identification has become a key issue for efficient network management. Although …