How To Classify Network Traffic In Real Time
|
|
|
- Shana Hoover
- 5 years ago
- Views:
Transcription
1 22 Approaching Real-time Network Traffic Classification ISSN Wei Li, Kaysar Abdin, Robert Dann and Andrew Moore RR October 2006 Department of Computer Science
2
3 Approaching Real-time Network Traffic Classification Wei Li, Kaysar Abdin, Robert Dann and Andrew Moore Department of Computer Science Queen Mary, University of London {wei.li, abm, rjd1, Abstract. Recent research explored the feasibility of using Machine Learning methods to provide accurate network traffic classification. We further believe that these methods can work on real-time Internet traffic with sufficient accuracy for practical applications. In this paper we present ANTc, a framework for quasi-realtime statistical traffic classification. It essentially demultiplexes network flows, collects statistical features of the flows, and then allows classification of the flows into arbitrary traffic classes using a pre-trained Naïve Bayes model. ANTc contains a built-in feature collector for the input of Naïve Bayes classifier and further provides a modular framework to facilitate further investigations into statistical classification methodologies. It also provides a set of flow sampling parameters which can be tuned, thus is capable of demonstrating the impact on classification accuracy from flow sample size restrictions. Results show that ANTc using Naïve Baye model can work in near real-time without obvious decrease in precision. 1 Introduction Accurate real-time traffic classification is of fundamental importance to network operations, managements and studies. It serves as the input for Intrusion Detection Systems, provides Class-of-Service (CoS) mapping [1] for Quality of Service (QoS) control, and also provides statistics for network monitoring. Currently on the internet there are different types of network applications which have diverse statistical characteristics and QoS requirements. Based upon this diversity, statistical classification methods such as Naïve Bayes method and kernel estimator were applied to network traffic classification [2]. With as few as 10 features collected from traffic flows, up to 96% of precision was achieved to classify the traffic into 10 different application classes. It is fundamentally different from traditional traffic classification approaches in that statistical classification does not rely on specific port numbers and protocol signatures but on the statistical behaviour of a traffic flow, such as average segment size, variance of payload size and initial window size, thus avoiding from inspecting traffic payload which may cause privacy concerns and can be rendered ineffective due to the encryption of packet payload. Statistical classification has shown accurate classification results and also promising prospect to be further applied in real-time traffic classification systems, either working standalone or in combination with other methodologies. In this paper we present ANTc, an online traffic classification framework intended to demonstrate the feasibility of statistical traffic classification operating at near real-time, and further an entry toward accurate real-time classification. ANTc contains a prototype implementation of the above Naïve Bayes methodology that uses the same set of 10 flow features as selected by [2], and also provides a framework that makes it easy to further justify alternative classification methodologies using different features and algorithms later on. Experimental results show that statistical traffic classification methods can provide high accuracy with acceptable computational and memory overheads. Meanwhile, we believe this prototype of ANTc
4 could be further developed into a faster and more accurate real-time statistical traffic classification framework for higher speed networks. The structure of this paper is as follows. The next section reviews some related work. Section 3 presents the architecture design of ANTc. Section 4 discusses classification methodology for real-time. Section 5 presents the experimental results and analysis. Section 6 concludes the paper and outlines future work. 2 Related Work Existing real-time traffic identification systems in application are intrusion detection systems (IDS) such as Snort [3] and Bro [4]. These applications mainly use IP and port information in TCP/UDP header and signatures in the packet payload to identify the traffic of an application. Matching the signature strings in packet payload can be very complex and laborious, therefore further IDS solutions turned to utilise hardware technology such as FPGA to allow traffic identification on high speed networks [5]. However, an essential limitation for traditional mechanisms is that they relied on looking for the explicit symbols (such as protocol information, port number or signatures) of different applications, but in practice applications does not have one-to-one mapping to such symbols or even may not have such symbols. For example, there are currently many applications using port 80 in order to go through firewalls. More interestingly, POP3 and SMTP have been used for remote access and file sharing [6]. Besides, increasing use of packet payload encryption is troublesome for signature matching. Furthermore, prior knowledge of the application (such as port number and signatures it uses) is always required before these systems can effectively identify an application. A far more sophisticated content-based traffic classification methodology was provided in [7] which composes of 9 functional blocks and can approach 100% accuracy with all 9 blocks in operation. The major constraints of such a system probably include the system throughput and not being possible to be applied in real-time. BLINC [8] is another approach based on identifying patterns of host behaviour to classifying traffic flows. This is orthogonal to the methodology used in ANTc that is based on behaviour of traffic flow. In future work we would also hope to combine this method to ANTc by interpreting the host behaviour information into features which can be utilised by ANTc. A preliminary empirical study into different machine learning algorithms was presented in [9]. It focused on comparing the accuracy and performance of the algorithms, and served as a good guide of entrance to apply various machine learning techniques into network traffic classification. However, the authors may have underestimated the complexity of the problem space. For real-time statistical traffic classification, [10] proposed to classify online game flows with a small sliding window based on a model trained on multiple short sub-flows. A number of experiments were presented on identification of online game which is a very specific kind of application. Apart from the experiment results, further investigation would be required to validate this methodology. 3 Architecture A real-time network traffic classification framework based on flow behaviour would theoretically comprise of these following procedures: Packet Capture: to capture packets from a network interface. Flow Demultiplexing: to collect and aggregate packets in each flow into single flow objects. Feature Collection: to collect flow features required for classification from single flow objects.
5 Classification: to check these flow features with a pre-trained flow model, in order to predict which application class the flow belongs to. These procedures above form a complete trace of the data flow, and the design of ANTc naturally followed that to become a layered architecture composing of the same four modules (layers). Classification Feature Collection Flow Demultiplexing Packet Capture Classes Features Single Flows Raw Packets Fig. 1 Layered model of ANTc Packet Capture and Flow Demultiplexing are bottom layers of the system, which demultiplex the original traffic into single flow objects for classification and are independent of the classification methods. A simple Packet Capture module included in ANTc utilises the libpcap [11] library, and therefore supports both live network traffic and traffic trace (dump) files. In Flow Demultiplexing layer, currently ANTc only collects packets from the beginning of every TCP flow. Other packets such as UDP and ICMP are ignored in this prototype, as well as those TCP flows where ANTc has not seen the starting of the flow. ANTc concentrates on the beginning of a flow for two reasons: firstly, it is comparably easy to keep track of the state of connection [12] by reading from the beginning of a flow; secondly, the beginning of a flow contains several effective flow features, such as the initial window size. On the other hand, different transport link layer protocols may require totally different Flow Demultiplexing methods, therefore for simplicity we temporarily only support TCP, which composes the majority of Internet traffic [13]. To be operating at near real-time, ANTc should always return the classification result of a flow as soon as a few packets in that flow have arrived. This means it may not collect full TCP flows but an appropriate small number of packets instead. However, with how many packets enough precision can be achieved is still an open problem for research. Hence ANTc allows user to specify the maximum number of packets of a flow sample, and also another maximum flow duration parameter as well, as an alternative to the former. On top of Flow Demultiplexer layer are Feature Collection and Classification layers which are both related to the choice of classification method. Currently ANTc utilises WEKA [14] framework, which covers a wide range of classification algorithms including the Naïve Bayes method we used, in order to enable handy replacement and justification of classification methodology. In the Feature Collection layer 10 features (as shown in table.1 below) are collected and then stored in WEKA data format as the input of classification. Finally in Classification layer ANTc invokes WEKA to classify the flows based on the pre-trained Naïve Bayes kernel model and provides the output results. We will further discuss the Naïve Bayes methodology we used in the next Section. On the other hand, ANTc also provides a template to collect other flow features, so as to simplify the implementation of other classification methodologies using different features and algorithms later on. Some of these modules could be combined together, for example, Feature Collection does not necessarily start only after Flow Demultiplexing ends. However, separating them into different modules maintains the modularity with the cost of some computing redundancy. The benefit from modularity is two-fold: it allows network operators to conveniently add this software to their network monitoring suite, and also allows other researchers to easily apply different methodology or packet capture modules. Although the implementation of the Naïve Bayes method with kernel estimator [2] was already built in, it is only a starting point and we recognise there can be many different approaches. We can use ANTc to facilitate further investigations as to justify the classification methodology for real-time network traffic. The above modules of ANTc are implemented in C while WEKA is Java-based. Therefore JNI [15] is used to invoke WEKA from C.
6 4 Classification Methodology for Real-time The real-time implementation of the classification methodology requires modifications and justifications in several aspects. Real-time traffic classification which aims at providing input for IDS or QoS would require early identification of a traffic flow; this indicates that the classification should be finished with limited information from as few packets as possible rather than the whole flow. Reducing number of packets in flow samples may reduce the computing overhead in collecting the features, as shown in Fig.2. Additionally, reducing the number of features collected will also reduce the computing and memory overhead both in collecting features and in classification. However, on the contrary ideally more information (more packets and more features) on a flow would be required in order to provide higher precision. To solve this contradiction, for a supervised classification system like ours, the challenge is to find a precise classification model for partial flows with limited number of packets. The problem is three dimensional: 1) the model should be built on a concise feature set resulting in limited computing and memory overheads but containing a maximum amount of information in order to correctly classify data samples (network flows) into application classes; 2) for model correctness, the model should be built on sufficient information, i.e. using a sufficient number of correct data samples in each application class to keep it unbiased, 3) the model itself should be of least-possible computational complexity. Our current model is based on the previous Naïve Bayes model in [2]. ANTc collectes 10 features as listed in Table.1 below to classify network traffic into 10 arbitrary classes. The features we used are identical to those selected by [2] and have been proven to be effective on classifying full flows. The only difference in our implementation is we collect features from limited number of packets at the beginning of a flow rather than full flow samples. Fig.2 shows the relationship between different packet number limits and the computing overhead of these features, which is approximately linear. As we are focusing on the beginning of flows, we generate our model also using the beginning of flows limited by the same maximum packet number as we use in classification. This is a natural solution based on the simple rule that the training data and testing data should always match up with each other. Name Collecting Time Memory Overhead Complexity Push_packets_server During capture O (1) O (1) initial_window_bytes_server During capture O (1) O (1) initial_window_bytes_client During capture O (1) O (1) average_segment_size_server During capture and after end O (1) O (n) Ip_data_bytes_median_client After end O (n) O (n 2 ) actual_data_packets_client During capture O (1) O (n) data_bytes_variance_server After end O (n) O (n) minimum_segment_size_client During capture O (1) O (n) RTT_samples_client During capture O (1) O (n) push_packets_client During capture O (1) O (1) Table. 1. List of features used in the Naive Bayes classifier. Details of these features is available in [16] 5 Experimental Results Our dataset comprises of two non-consecutive days of internet traffic. Day2 is eight months after Day1. These datasets were collected using a high speed monitoring box [17] installed on the Internet connection of the network of Genome Campus. The campus is a research-facility with about 1,000
7 employees and is connected to the Internet via a full-duplex Gigabit Ethernet link. Every packet on each direction of the link was captured along with its full payload. Then the packets were classified by hand into 10 application classes as the base for experimentations, namely WWW, , ATTACK, P2P, DATABASE, MULTIMEDIA, SERVICE, INTERACTION, GAMES and BULK. The compositions of the Day1 and Day2 datasets are shown in Table.2. Fig. 2. Feature Collection Time vs. Flow Sample Size Total WWW MAIL ATT P2P DB MMED SERV INTR GAME BULK Day Day Table. 2. Datasets from two non-consecutive days with an 8 months interval. In the experiment we tested with five different flow sample length limits, namely 5, 10, 25, 50 and 100 packets. First we collected the Stratified Cross Validation [14] results from Weka for either day s dataset. The total accuracy values of the models are calculated based on these results, as well as the precision and recall values for the three largest application classes, WWW, and BULK. Fig. 3. Stratified Cross Validation of Day1 and Day2 Model From the results we can find the overall accuracy for Day1 and Day2 using different packet limits. With as few as 5 packets the overall accuracy either dataset can reach 90% and with 25 packets day1 can reach up to 93% while day2 achieves surprisingly 97% accuracy. For comparison study we also tested full flow sampling using the same Naïve Bayes methodology (same features) built on the same datasets. These result in 96.5% and 95.8% accuracy for day1 and day2 respectively.
8 Therefore, even the feature set we used for real-time beginning-of-flow samples are the same as those had been selected for full flow samples in [2], the results from these features can be regarded as of the same level of accuracy. Furthermore, in order to validate the temporal stasis of the model, we test using cross validation between the two datasets. Accuracy may decay with time due to emergence of new applications the transformation of Internet traffic. Although some level of decrease in the total accuracy can be seen in our results, the model is still capable of providing useful information on a flow. For example, the recall value of WWW traffic is still very high which means the prediction of a flow to be of WWW can be to some extent reliable. In comparison, sampling full flows result in 94% and 92% accuracy respectively. Fig. 4. Cross validation between Day1 and Day2 datasets. 6 Conclusions and Future Work There are multiple important factors in online traffic classification system, such as: accuracy, completeness, latency and throughput. The challenges in improving the overall performance as well as in balancing between these factors shape a sophisticated problem space. We acknowledge that our experiments in real-time classification research presented in this paper are early attempts which may be coarse-grained and unsophisticated. We also note that there are downsides of current statistical approaches as well. For example, statistical techniques would practically require the information of at least a few packets before it can make a reliable prediction on an unknown flow object. This means the latency in statistical traffic classification is probably higher than traditional header-based and signature-based mechanisms. The way to solve this problem leaves an open area for future work, and is largely depended on the purpose of the real-time traffic classification system. However, a more sophisticated traffic classification combining the strength of different approaches (flow-based, host-behaviour based and header/signature-based) is very promising to counter this problem. This can be a challenge but not a limitation for statistical traffic classification systems to be operating at real-time. In this paper we presented the architecture of ANTc: a statistical traffic classification framework operating at quasi-realtime. Based on ANTc, we also discussed the real-time implementation of a Naïve Bayesian classification methodology by collecting features at the beginning of flows. Our experimental results show that this classification method can achieve the same level of accuracy as it is used in offline traffic classification.
9 ANTc is a simple framework but is starting to be a powerful tool in exploring the whole problem space. Allowing collecting different feature sets, using different classifiers and tuning flow sampling parameters, ANTc can easily facilitate further investigations into identifying a best-suitable feature set and a highly effective classification algorithm for real-time classification. Furthermore, ANTc would be equipped with much more built-in contents in the near future, so as to form a complete research platform for traffic classification on high speed networks. References 1. M Roughan, S Sen, O Spatscheck, N Duffield. Class-of-service mapping for QoS: a statistical signature-based approach to IP traffic classification. In Proceedings of the 4th ACM SIGCOMM conference on Internet measurement. Taormina, Sicily, Italy, A. W. Moore and D. Zuev. Internet Traffic Classification Using Bayesian Analysis Techniques. In Proceedings of ACM SIGMETRICS Banff, Alberta, Canada. 3. M. Roesch. Snort - Lightweight Intrusion Detection for Networks. In Proceedings of 13 th LISA Conference, Seattle, Washington, USA. November 7-12, V. Paxson. Bro: A System for Detecting Network Intruders in Real-time. In Computer Networks (Amsterdam, Netherlands, 1999), 31(23-24), H. Song, J. W. Lockwood. Efficient Packet Classification for Network Intrusion Detection using FPGA. In Proceedings of International Symposium on Field-Programmable Gate Arrays (FPGA'05), Monterey, CA, Feb 20-22, GetByMail, 7. A. Moore, K. Papagiannaki. Toward the Accurate Identification of Network Applications. In Proceedings of Sixth Passive and Active Measurement Workshop (PAM 2005), March/April 2005, Boston, MA 8. T. Karagiannis, K. Papagiannaki, M. Faloutsos. BLINC: multilevel traffic classification in the dark. In Proceedings of ACM SIGCOMM Philadelphia, Pennsylvania, USA. 9. N. Williams, S. Zander, G. Armitage "A Preliminary Performance Comparison of Five Machine Learning Algorithms for Practical IP Traffic Flow Classification", (accepted 21 August 2006, to appear) in SIGCOMM Computer Communication Review, October T.T.T. Nguyen, G. Armitage. Training on multiple sub-flows to optimise the use of Machine Learning classifiers in real-world IP networks. To appear in IEEE 31st Conference on Local Computer Networks, Tampa, Florida, USA, November TCPDUMP, J. Postel. Transmission Control Protocol. RFC C. Fraleigh et al. Packet-Level Traffic Measurements from the Sprint IP Backbone. In IEEE Network, Waikato Environment for Knowledge Analysis (WEKA), JNI, A. Moore, D. Zuev, M. Crogan. Discriminators for use in flow-based classification. Technical Report, Queen Mary University of London, A. Moore et al. Architecture of a Network Monitor, In Proceedings of the Fourth Passive and Active Measurement Workshop (PAM 2003), April 2003.
An apparatus for P2P classification in Netflow traces
An apparatus for P2P classification in Netflow traces Andrew M Gossett, Ioannis Papapanagiotou and Michael Devetsikiotis Electrical and Computer Engineering, North Carolina State University, Raleigh, USA
Signature-aware Traffic Monitoring with IPFIX 1
Signature-aware Traffic Monitoring with IPFIX 1 Youngseok Lee, Seongho Shin, and Taeck-geun Kwon Dept. of Computer Engineering, Chungnam National University, 220 Gungdong Yusonggu, Daejon, Korea, 305-764
CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA
CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA Professor Yang Xiang Network Security and Computing Laboratory (NSCLab) School of Information Technology Deakin University, Melbourne, Australia http://anss.org.au/nsclab
Improving the Database Logging Performance of the Snort Network Intrusion Detection Sensor
-0- Improving the Database Logging Performance of the Snort Network Intrusion Detection Sensor Lambert Schaelicke, Matthew R. Geiger, Curt J. Freeland Department of Computer Science and Engineering University
A Preliminary Performance Comparison of Two Feature Sets for Encrypted Traffic Classification
A Preliminary Performance Comparison of Two Feature Sets for Encrypted Traffic Classification Riyad Alshammari and A. Nur Zincir-Heywood Dalhousie University, Faculty of Computer Science {riyad, zincir}@cs.dal.ca
Encrypted Internet Traffic Classification Method based on Host Behavior
Encrypted Internet Traffic Classification Method based on Host Behavior 1,* Chengjie GU, 1 Shunyi ZHANG, 2 Xiaozhen XUE 1 Institute of Information Network Technology, Nanjing University of Posts and Telecommunications,
Keywords Attack model, DDoS, Host Scan, Port Scan
Volume 4, Issue 6, June 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com DDOS Detection
Traffic Analysis of Mobile Broadband Networks
Traffic Analysis of Mobile Broadband Networks Geza Szabo,Daniel Orincsay,Balazs Peter Gero,Sandor Gyori,Tamas Borsos TrafficLab, Ericsson Research, Budapest, Hungary Email:{geza.szabo,daniel.orincsay,
A statistical approach to IP-level classification of network traffic
A statistical approach to IP-level classification of network traffic Manuel Crotti, Francesco Gringoli, Paolo Pelosato, Luca Salgarelli DEA, Università degli Studi di Brescia, via Branze, 38, 25123 Brescia,
Traffic Classification with Sampled NetFlow
Traffic Classification with Sampled NetFlow Valentín Carela-Español, Pere Barlet-Ros, Josep Solé-Pareta Universitat Politècnica de Catalunya (UPC) {vcarela,pbarlet,pareta}@ac.upc.edu Abstract The traffic
Forensic Network Traffic Analysis
Forensic Network Traffic Analysis Noora Al Khater Department of Informatics King's College London London, United Kingdom [email protected] Richard E Overill Department of Informatics King's College
Near Real Time Online Flow-based Internet Traffic Classification Using Machine Learning (C4.5)
Near Real Time Online Flow-based Internet Traffic Classification Using Machine Learning (C4.5) Abuagla Babiker Mohammed Faculty of Electrical Engineering (FKE) Deprtment of Microelectronics and Computer
Extensible Network Configuration and Communication Framework
Extensible Network Configuration and Communication Framework Todd Sproull and John Lockwood Applied Research Laboratory Department of Computer Science and Engineering: Washington University in Saint Louis
Lightweight Detection of DoS Attacks
Lightweight Detection of DoS Attacks Sirikarn Pukkawanna *, Vasaka Visoottiviseth *, Panita Pongpaibool * Department of Computer Science, Mahidol University, Rama 6 Rd., Bangkok 10400, THAILAND E-mail:
Dynamic Rule Based Traffic Analysis in NIDS
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 14 (2014), pp. 1429-1436 International Research Publications House http://www. irphouse.com Dynamic Rule Based
Performance Evaluation of Computer Networks
, 2013 Performance Evaluation of Computer Networks Week 9 (Part 1) Performance Measurement Mujdat Soyturk, Ph.D. Asst. Prof. Objectives Appreciate the role of measurement in building and maintaining high-performance
ATCM: A Novel Agent-based Peer-to-Peer Traffic Control Management
Journal of Computational Information Systems 7: 7 (2011) 2307-2314 Available at http://www.jofcis.com ATCM: A Novel Agent-based Peer-to-Peer Traffic Control Management He XU 1,, Suoping WANG 2, Ruchuan
CYBER SCIENCE 2015 AN ANALYSIS OF NETWORK TRAFFIC CLASSIFICATION FOR BOTNET DETECTION
CYBER SCIENCE 2015 AN ANALYSIS OF NETWORK TRAFFIC CLASSIFICATION FOR BOTNET DETECTION MATIJA STEVANOVIC PhD Student JENS MYRUP PEDERSEN Associate Professor Department of Electronic Systems Aalborg University,
QAME Support for Policy-Based Management of Country-wide Networks
QAME Support for Policy-Based Management of Country-wide Networks Clarissa C. Marquezan, Lisandro Z. Granville, Ricardo L. Vianna, Rodrigo S. Alves Institute of Informatics Computer Networks Group Federal
Network Based Intrusion Detection Using Honey pot Deception
Network Based Intrusion Detection Using Honey pot Deception Dr.K.V.Kulhalli, S.R.Khot Department of Electronics and Communication Engineering D.Y.Patil College of Engg.& technology, Kolhapur,Maharashtra,India.
Online Classification of Network Flows
2009 Seventh Annual Communications Networks and Services Research Conference Online Classification of Network Flows Mahbod Tavallaee, Wei Lu and Ali A. Ghorbani Faculty of Computer Science, University
Internet Traffic Measurement
Internet Traffic Measurement Internet Traffic Measurement Network Monitor Placement Measurement Analysis Tools Measurement Result Reporting Probing Mechanism Vantage Points Edge vs Core Hardware vs Software
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
A Research Study on Packet Sniffing Tool TCPDUMP
A Research Study on Packet Sniffing Tool TCPDUMP ANSHUL GUPTA SURESH GYAN VIHAR UNIVERSITY, INDIA ABSTRACT Packet sniffer is a technique of monitoring every packet that crosses the network. By using this
Internet Management and Measurements Measurements
Internet Management and Measurements Measurements Ramin Sadre, Aiko Pras Design and Analysis of Communication Systems Group University of Twente, 2010 Measurements What is being measured? Why do you measure?
Exploiting Stateful Inspection of Network Security in Reconfigurable Hardware
Exploiting Stateful Inspection of Network Security in Reconfigurable Hardware Shaomeng Li, Jim Tørresen, Oddvar Søråsen Department of Informatics University of Oslo N-0316 Oslo, Norway {shaomenl, jimtoer,
Statistical traffic classification in IP networks: challenges, research directions and applications
Statistical traffic classification in IP networks: challenges, research directions and applications Luca Salgarelli A joint work with M. Crotti, M. Dusi, A. Este and F. Gringoli
Realtime Classification for Encrypted Traffic
Realtime Classification for Encrypted Traffic Roni Bar-Yanai 1, Michael Langberg 2,, David Peleg 3,, and Liam Roditty 4 1 Cisco, Netanya, Israel [email protected] 2 Computer Science Division, Open University
A Passive Method for Estimating End-to-End TCP Packet Loss
A Passive Method for Estimating End-to-End TCP Packet Loss Peter Benko and Andras Veres Traffic Analysis and Network Performance Laboratory, Ericsson Research, Budapest, Hungary {Peter.Benko, Andras.Veres}@eth.ericsson.se
How To Identify Different Operating Systems From A Set Of Network Flows
Passive OS detection by monitoring network flows Siebren Mossel University of Twente P.O. Box 217, 7500AE Enschede The Netherlands [email protected] ABSTRACT` Network flow monitoring is a way of monitoring
Hadoop Technology for Flow Analysis of the Internet Traffic
Hadoop Technology for Flow Analysis of the Internet Traffic Rakshitha Kiran P PG Scholar, Dept. of C.S, Shree Devi Institute of Technology, Mangalore, Karnataka, India ABSTRACT: Flow analysis of the internet
Intrusion Detection Systems (IDS)
Intrusion Detection Systems (IDS) What are They and How do They Work? By Wayne T Work Security Gauntlet Consulting 56 Applewood Lane Naugatuck, CT 06770 203.217.5004 Page 1 6/12/2003 1. Introduction Intrusion
ECE 578 Term Paper Network Security through IP packet Filtering
ECE 578 Term Paper Network Security through IP packet Filtering Cheedu Venugopal Reddy Dept of Electrical Eng and Comp science Oregon State University Bin Cao Dept of electrical Eng and Comp science Oregon
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand
Packet Sampling and Network Monitoring
Packet Sampling and Network Monitoring CERN openlab Monthly Technical Meeting 13 th November, 2007 Milosz Marian Hulboj [email protected] Ryszard Erazm Jurga [email protected] What is Network
Research on Errors of Utilized Bandwidth Measured by NetFlow
Research on s of Utilized Bandwidth Measured by NetFlow Haiting Zhu 1, Xiaoguo Zhang 1,2, Wei Ding 1 1 School of Computer Science and Engineering, Southeast University, Nanjing 211189, China 2 Electronic
DRAFT 18-09-2003. 2.1 Gigabit network intrusion detection systems
An Intrusion Detection System for Gigabit Networks (Working paper: describing ongoing work) Gerald Tripp Computing Laboratory, University of Kent. CT2 7NF. UK e-mail: [email protected] This draft
Monitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX
Monitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX Martin Elich 1,3, Matěj Grégr 1,2 and Pavel Čeleda1,3 1 CESNET, z.s.p.o., Prague, Czech Republic 2 Brno University of Technology,
A Flow-based Method for Abnormal Network Traffic Detection
A Flow-based Method for Abnormal Network Traffic Detection Myung-Sup Kim, Hun-Jeong Kang, Seong-Cheol Hong, Seung-Hwa Chung, and James W. Hong Dept. of Computer Science and Engineering POSTECH {mount,
Bro at 10 Gps: Current Testing and Plans
U.S. Department of Energy Bro at 10 Gps: Current Testing and Plans Office of Science Brian L. Tierney Lawrence Berkeley National Laboratory Bro s Use at LBL Operational 24 7 since 1996 Monitors traffic
Countermeasure for Detection of Honeypot Deployment
Proceedings of the International Conference on Computer and Communication Engineering 2008 May 13-15, 2008 Kuala Lumpur, Malaysia Countermeasure for Detection of Honeypot Deployment Lai-Ming Shiue 1, Shang-Juh
CHAPETR 3. DISTRIBUTED DEPLOYMENT OF DDoS DEFENSE SYSTEM
59 CHAPETR 3 DISTRIBUTED DEPLOYMENT OF DDoS DEFENSE SYSTEM 3.1. INTRODUCTION The last decade has seen many prominent DDoS attack on high profile webservers. In order to provide an effective defense against
Early Recognition of Encrypted Applications
Early Recognition of Encrypted Applications Laurent Bernaille with Renata Teixeira Laboratoire LIP6 CNRS Université Pierre et Marie Curie Paris 6 Can we find the application inside an SSL connection? Network
A Real-Time Network Traffic Based Worm Detection System for Enterprise Networks
A Real-Time Network Traffic Based Worm Detection System for Enterprise Networks Long-Quan Zhao 1, Seong-Chul Hong 1, Hong-Taek Ju 2 and James Won-Ki Hong 1 1 Dept. of Computer Science and Engineering,
Aggregating Distributed Sensor Data for Network Intrusion Detection
Aggregating Distributed Sensor Data for Network Intrusion Detection JOHN C. McEACHEN, CHENG KAH WAI, and VONDA L. OLSAVSKY Department of Electrical and Computer Engineering Naval Postgraduate School Monterey,
Transparent Optimization of Grid Server Selection with Real-Time Passive Network Measurements. Marcia Zangrilli and Bruce Lowekamp
Transparent Optimization of Grid Server Selection with Real-Time Passive Network Measurements Marcia Zangrilli and Bruce Lowekamp Overview Grid Services Grid resources modeled as services Define interface
The Applications of Deep Learning on Traffic Identification
The Applications of Deep Learning on Traffic Identification Zhanyi Wang [email protected] Abstract Generally speaking, most systems of network traffic identification are based on features. The features
Second-generation (GenII) honeypots
Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. [email protected] Abstract Honeypots are security resources which trap malicious activities, so they
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP Aakanksha Vijay M.tech, Department of Computer Science Suresh Gyan Vihar University Jaipur, India Mrs Savita Shiwani Head Of
packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.
Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System
KEITH LEHNERT AND ERIC FRIEDRICH
MACHINE LEARNING CLASSIFICATION OF MALICIOUS NETWORK TRAFFIC KEITH LEHNERT AND ERIC FRIEDRICH 1. Introduction 1.1. Intrusion Detection Systems. In our society, information systems are everywhere. They
OpenFlow Based Load Balancing
OpenFlow Based Load Balancing Hardeep Uppal and Dane Brandon University of Washington CSE561: Networking Project Report Abstract: In today s high-traffic internet, it is often desirable to have multiple
A Review on Network Intrusion Detection System Using Open Source Snort
, pp.61-70 http://dx.doi.org/10.14257/ijdta.2016.9.4.05 A Review on Network Intrusion Detection System Using Open Source Snort Sakshi Sharma and Manish Dixit Department of CSE& IT MITS Gwalior, India [email protected],
UNITE: Uniform hardware-based Network Intrusion detection Engine
UNITE: Uniform hardware-based Network Intrusion detection Engine S. Yusuf and W. Luk and M. K. N. Szeto and W. Osborne Department of Computing, Imperial College London, 180 Queen s Gate, London SW7 2BZ
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
Improving Quality of Service
Improving Quality of Service Using Dell PowerConnect 6024/6024F Switches Quality of service (QoS) mechanisms classify and prioritize network traffic to improve throughput. This article explains the basic
Accelerate In-Line Packet Processing Using Fast Queue
Accelerate In-Line Packet Processing Using Fast Queue Chun-Ying Huang 1, Chi-Ming Chen 1, Shu-Ping Yu 1, Sheng-Yao Hsu 1, and Chih-Hung Lin 1 Department of Computer Science and Engineering, National Taiwan
Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic.
Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic. A Network and Data Link Layer infrastructure Design to Improve QoS in Voice and video Traffic Jesús Arturo Pérez,
Network Traffic Classification and Demand Prediction
Chapter 12 Network Traffic Classification and Demand Prediction Mikhail Dashevskiy and Zhiyuan Luo Reliable classification of network traffic and accurate demand prediction can offer substantial benefits
Voice Over IP Performance Assurance
Voice Over IP Performance Assurance Transforming the WAN into a voice-friendly using Exinda WAN OP 2.0 Integrated Performance Assurance Platform Document version 2.0 Voice over IP Performance Assurance
Two State Intrusion Detection System Against DDos Attack in Wireless Network
Two State Intrusion Detection System Against DDos Attack in Wireless Network 1 Pintu Vasani, 2 Parikh Dhaval 1 M.E Student, 2 Head of Department (LDCE-CSE) L.D. College of Engineering, Ahmedabad, India.
Introduction of Intrusion Detection Systems
Introduction of Intrusion Detection Systems Why IDS? Inspects all inbound and outbound network activity and identifies a network or system attack from someone attempting to compromise a system. Detection:
CONTROL SYSTEM FOR INTERNET BANDWIDTH BASED ON JAVA TECHNOLOGY
CONTROL SYSTEM FOR INTERNET BANDWIDTH BASED ON JAVA TECHNOLOGY SEIFEDINE KADRY, KHALED SMAILI Lebanese University-Faculty of Sciences Beirut-Lebanon E-mail: [email protected] ABSTRACT This paper presents
Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application. Author: Fung, King Pong
Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application Author: Fung, King Pong MSc in Information Technology The Hong Kong Polytechnic University June 1999 i Abstract Abstract of dissertation
Proxy Server, Network Address Translator, Firewall. Proxy Server
Proxy Server, Network Address Translator, Firewall 1 Proxy Server 2 1 Introduction What is a proxy server? Acts on behalf of other clients, and presents requests from other clients to a server. Acts as
Trends and Differences in Connection-behavior within Classes of Internet Backbone Traffic
MonNet a project for network and traffic monitoring Trends and Differences in Connection-behavior within Classes of Internet Backbone Traffic Wolfgang John, Sven Tafvelin and Tomas Olovsson Department
How is SUNET really used?
MonNet a project for network and traffic monitoring How is SUNET really used? Results of traffic classification on backbone data Wolfgang John and Sven Tafvelin Dept. of Computer Science and Engineering
A Fast Pattern-Matching Algorithm for Network Intrusion Detection System
A Fast Pattern-Matching Algorithm for Network Intrusion Detection System Jung-Sik Sung 1, Seok-Min Kang 2, Taeck-Geun Kwon 2 1 ETRI, 161 Gajeong-dong, Yuseong-gu, Daejeon, 305-700, Korea [email protected]
Stateful Inspection Technology
Stateful Inspection Technology Security Requirements TECH NOTE In order to provide robust security, a firewall must track and control the flow of communication passing through it. To reach control decisions
Cisco Integrated Services Routers Performance Overview
Integrated Services Routers Performance Overview What You Will Learn The Integrated Services Routers Generation 2 (ISR G2) provide a robust platform for delivering WAN services, unified communications,
USING LOCAL NETWORK AUDIT SENSORS AS DATA SOURCES FOR INTRUSION DETECTION. Integrated Information Systems Group, Ruhr University Bochum, Germany
USING LOCAL NETWORK AUDIT SENSORS AS DATA SOURCES FOR INTRUSION DETECTION Daniel Hamburg,1 York Tüchelmann Integrated Information Systems Group, Ruhr University Bochum, Germany Abstract: The increase of
Ethernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
INTRUSION DETECTION SYSTEMS and Network Security
INTRUSION DETECTION SYSTEMS and Network Security Intrusion Detection System IDS A layered network security approach starts with : A well secured system which starts with: Up-to-date application and OS
Enabling Open-Source High Speed Network Monitoring on NetFPGA
Network Operations and Management Symposium (NOMS) 2012 Enabling Open-Source High Speed Network Monitoring on NetFPGA Gianni Antichi, Stefano Giordano Email: @iet.unipi.it Department of Information
Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool
Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool Mukta Garg Assistant Professor, Advanced Educational Institutions, Palwal Abstract Today s society
How to (passively) understand the application layer? Packet Monitoring
How to (passively) understand the application layer? Packet Monitoring 1 What to expect? Overview / What is packet monitoring? How to acquire the data Handling performance bottlenecks Analyzing the transport
HTTPS Traffic Classification
HTTPS Traffic Classification Wazen M. Shbair, Thibault Cholez, Jérôme François, Isabelle Chrisment Jérôme François Inria Nancy Grand Est, France [email protected] NMLRG - IETF95 April 7th, 2016
Efficient Security Alert Management System
Efficient Security Alert Management System Minoo Deljavan Anvary IT Department School of e-learning Shiraz University Shiraz, Fars, Iran Majid Ghonji Feshki Department of Computer Science Qzvin Branch,
Network Forensics: Log Analysis
Network Forensics: Analysis Richard Baskerville Agenda P Terms & -based Tracing P Application Layer Analysis P Lower Layer Analysis Georgia State University 1 2 Two Important Terms PPromiscuous Mode
Behaviour Based Worm Detection and Signature Automation
Journal of Computer Science 7 (11): 1724-1728, 2011 ISSN 1549-3636 2011 Science Publications Behaviour Based Worm Detection and Signature Automation 1 Mohammed Anbar, 1 Selvakumar Manickam, 2 Al-Samarraie
Network Defense Tools
Network Defense Tools Prepared by Vanjara Ravikant Thakkarbhai Engineering College, Godhra-Tuwa +91-94291-77234 www.cebirds.in, www.facebook.com/cebirds [email protected] What is Firewall? A firewall
The ISP Column A monthly column on all things Internet
The ISP Column A monthly column on all things Internet Just How Good are You? Measuring Network Performance February 2003 Geoff Huston If you are involved in the operation of an IP network, a question
A Model-based Methodology for Developing Secure VoIP Systems
A Model-based Methodology for Developing Secure VoIP Systems Juan C Pelaez, Ph. D. November 24, 200 VoIP overview What is VoIP? Why use VoIP? Strong effect on global communications VoIP will replace PSTN
Large-Scale TCP Packet Flow Analysis for Common Protocols Using Apache Hadoop
Large-Scale TCP Packet Flow Analysis for Common Protocols Using Apache Hadoop R. David Idol Department of Computer Science University of North Carolina at Chapel Hill [email protected] http://www.cs.unc.edu/~mxrider
