Man vs. Machine - A Study of the Ability of Statistical Methodologies to Discern Human Generated ssh Traffic from Machine Generated scp Traffic
نویسندگان
چکیده
This paper discusses our recent results in the classification of human-based ssh traffic as compared to machine-based scp traffic. Since both of these services, ssh and scp, use the same port, port 22, this classification problem occurs within a quite natural framework. Results that illustrate an exploratory analysis of the data will be presented along with some preliminary classification results.
منابع مشابه
Behavioral Analysis of Traffic Flow for an Effective Network Traffic Identification
Fast and accurate network traffic identification is becoming essential for network management, high quality of service control and early detection of network traffic abnormalities. Techniques based on statistical features of packet flows have recently become popular for network classification due to the limitations of traditional port and payload based methods. In this paper, we propose a metho...
متن کاملA statistical approach to classify Skype traffic
Abstract- Skype is one of the most powerful and high-quality chat tools that allows its users to use of many services such as: transferring audio, sending messages, video conferencing and audio for free. Skype traffic has a lot of Internet traffic. Hence, Internet service providers need to identify traffic to do the quality of service and network management. On the other hand, Skype developers ...
متن کاملA Real Time Traffic Sign Detection and Recognition Algorithm based on Super Fuzzy Set
Advanced Driver Assistance Systems (ADAS) benefit from current infrastructure to discern environmental information. Traffic signs are global guidelines which inform drivers from near characteristics of paths ahead. Traffic Sign Recognition (TSR) system is an ADAS that recognize traffic signs in images captured from road and show information as an adviser or transmit them to other ADASs. In this...
متن کاملCommunication-Aware Traffic Stream Optimization for Virtual Machine Placement in Cloud Datacenters with VL2 Topology
By pervasiveness of cloud computing, a colossal amount of applications from gigantic organizations increasingly tend to rely on cloud services. These demands caused a great number of applications in form of couple of virtual machines (VMs) requests to be executed on data centers’ servers. Some of applications are as big as not possible to be processed upon a single VM. Also, there exists severa...
متن کاملClassification of encrypted traffic for applications based on statistical features
Traffic classification plays an important role in many aspects of network management such as identifying type of the transferred data, detection of malware applications, applying policies to restrict network accesses and so on. Basic methods in this field were using some obvious traffic features like port number and protocol type to classify the traffic type. However, recent changes in applicat...
متن کامل