Reconciling Multiple Matches for the Signature-Based Application Identification
نویسندگان
چکیده
Accurate application identification is one of the core elements of network operations and management to provide enhanced network services and security. While the signaturebased approach that examines packet content for identification is attractive with greater accuracy than the traditional technique relying on TCP port numbers, one potential challenge is multiple matches arising when more than a single application identifies the data stream in question. In that case, the input stream cannot be adequately classified solely by the help of the application signatures, and it is necessary to establish an additional process that reconciles such multiple matches in order to make the final identification decision. In this paper, we address the problem of multiple matches by developing a set of selection heuristics that help accurately identify the application associated with the input data stream. The heuristics choose one out of a set of applications using their own unique discrimination function, and the input traffic can be classified into the selected application. Our experimental results with a recent traffic data set show that our proposed method successfully deals with multiple matches, achieving a high degree of identification accuracy up to 99% with respect to precision and recall.
منابع مشابه
An ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure
Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication. This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...
متن کاملImprovement and parallelization of Snort network intrusion detection mechanism using graphics processing unit
Nowadays, Network Intrusion Detection Systems (NIDS) are widely used to provide full security on computer networks. IDS are categorized into two primary types, including signature-based systems and anomaly-based systems. The former is more commonly used than the latter due to its lower error rate. The core of a signature-based IDS is the pattern matching. This process is inherently a computatio...
متن کاملOffline Language-free Writer Identification based on Speeded-up Robust Features
This article proposes offline language-free writer identification based on speeded-up robust features (SURF), goes through training, enrollment, and identification stages. In all stages, an isotropic Box filter is first used to segment the handwritten text image into word regions (WRs). Then, the SURF descriptors (SUDs) of word region and the corresponding scales and orientations (SOs) are extr...
متن کاملReducing the Limitation on Application of Synchronous Decorrelating Detector Cdma Systems
In CDMA (Code - Division Multiple - Access) systems multi - user accessing of a channel is possible. Under the assumptions of Optimum multi - user and decorrelating detector in CDMA systems. By using signals with zero and / or identical cross correlations, a simple and expandable decorrelating detector with optimum efficiency which can be easily implemented are proposed. Constructing these sign...
متن کاملIdentification of Multiple Input-multiple Output Non-linear System Cement Rotary Kiln using Stochastic Gradient-based Rough-neural Network
Because of the existing interactions among the variables of a multiple input-multiple output (MIMO) nonlinear system, its identification is a difficult task, particularly in the presence of uncertainties. Cement rotary kiln (CRK) is a MIMO nonlinear system in the cement factory with a complicated mechanism and uncertain disturbances. The identification of CRK is very important for different pur...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- JCM
دوره 8 شماره
صفحات -
تاریخ انتشار 2013