Skip to Main Content (Press Enter)

Logo CNR
  • ×
  • Home
  • People
  • Outputs
  • Organizations
  • Expertise & Skills

UNI-FIND
Logo CNR

|

UNI-FIND

cnr.it
  • ×
  • Home
  • People
  • Outputs
  • Organizations
  • Expertise & Skills
  1. Outputs

Identification of traffic flows hiding behind TCP port 80

Conference Paper
Publication Date:
2010
abstract:
Beyond Quality of Service and billing, one of the most important applications of traffic identification is in the field of network security. Despite their simplicity, current approaches based on port numbers are highly unreliable. This paper proposes an identification approach, based on a cascade of decision trees. The approach uses the sign pattern and payload size of the first four packets in each flow, thus remaining applicable to encrypted traffic too. The effectiveness of the proposed approach is evaluated on five real traffic traces collected in different time periods and over four different networks. The obtained overall accuracy gives us grounds to consider the adoption of this approach as stand-alone in on-line platforms for network traffic identification or in combination with classical firewall architectures.
Iris type:
04.01 Contributo in Atti di convegno
Keywords:
Computer Security; Identification; TCP
List of contributors:
Gargiulo, Francesco
Authors of the University:
GARGIULO FRANCESCO
Handle:
https://iris.cnr.it/handle/20.500.14243/317164
Published in:
IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS
Series
  • Use of cookies

Powered by VIVO | Designed by Cineca | 26.5.0.0 | Sorgente dati: PREPROD (Ribaltamento disabilitato)