Interdisciplinary Information Sciences
Online ISSN : 1347-6157
Print ISSN : 1340-9050
ISSN-L : 1340-9050
Special Issue on Fundamental Aspects and Recent Developments in Multimedia and VLSI Systems
Network Application Identification Using Sequential Transition Patterns of Payload Length
Yuji WAIZUMITsuyoshi SATOKazuyuki TANAKA
Author information
JOURNAL FREE ACCESS

2012 Volume 18 Issue 2 Pages 189-196

Details
Abstract

A person-to-person information sharing is easily realized by P2P networks that servers are not essential. Information leakages, which are caused by malicious accesses for P2P networks, has become new social issues. To prevent information leakage, it is necessary to detect and block traffics of P2P software. Since some P2P softwares can spoof port numbers, it is difficult to detect the traffics sent from P2P softwares by using port numbers. It is more difficult to devise effective countermeasures for detecting the software because their protocol are not public. In this paper, we propose a method to identify applications using sequential transition patterns of payload length. Through real traffic experiment we show that proposed method can quickly and accurately identify network applications.

Content from these authors
© 2012 by the Graduate School of Information Sciences (GSIS), Tohoku University

This article is licensed under a Creative Commons [Attribution 4.0 International] license.
https://creativecommons.org/licenses/by/4.0/
Previous article
feedback
Top