An Empirical Model of Network Traffic Classification for Identifying Anonymous Behavior

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2014 by IJETT Journal
Volume-12 Number-2                          
Year of Publication : 2014
Authors : Vasanthi Pampana , J Peter Praveen
  10.14445/22315381/IJETT-V12P212

Citation 

Vasanthi Pampana , J Peter Praveen. "An Empirical Model of Network Traffic Classification for Identifying Anonymous Behavior", International Journal of Engineering Trends and Technology (IJETT), V12(2),60-63 June 2014. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group

Abstract

Optimizing the internet traffic is always an important research issue in the field of network traffic classification, although various approaches available for minimizing the traffic over heads during the network traffic, they are not optimal. In this paper we are proposing an optimized classification approach for internet traffic by analyzing the behavior of the nodes for allowing or dis connection of the incoming node by computing the posterior probabilities of the factors with respect to the node.

References

1) Internet assigned numbers authority (IANA), http://www.iana.org/assignments/port-number (last accessed October, 2009)
2) A. Madhukar, C. Williamson, A longitudinal study of p2p traffic classification, in: MASCOTS ’06: Proceedings of the 14th IEEE International Symposium on Modeling, Analysis, and Simulation, IEEE Computer Society, Washington, DC, USA, 2006, pp. 179–188. doi:http://dx.doi.org/10.1109/MASCOTS.2006.6.
3) J. Klensin, SIMPLE MAIL TRANSFER PROTOCOL, IETF RFC 821, April 2001; http://www.ietf.org/rfc/rfc2821.txt
[4] Bro intrusion detection system - Bro overview, http://broids. org, as of August 14, 2007.
[5] V. Paxson, “Bro: A system for detecting network intruders in real-time,” Computer Networks, no. 31(23-24), pp. 2435– 2463, 1999.
[6] Azzouna, Nadia Ben and Guillemin, Fabrice, Analysis of ADSL Trafficon an IP Backbone Link, IEEE IEEE Global TelecommunicationsConference 2003, San Francisco, USA, December 2003.
[7] Cho, Kenjiro, Fukuda, Kenshue, Esaki, Hiroshi and Kato, Akira, The Impact and Implications of the Growth in Residential User-to-User Traffic, ACM SIGCOMM 2006, Pisa, Italy, September 2006.
[8] Balachandran, Anand; Voelker, Geoffrey M.; Bahl, Paramvir and Ragan,P. Venkat, Characterizing user behavior and network performance in a public wireless LAN, Proceedings of the 2002 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, pp. 195-205, 2002.
[9] Internet assigned numbers authority (IANA), http://www.iana.org/assignments/port-number (last accessed October, 2009)
[10] M. Roughan, S. Sen, O. Spatscheck, and N. Duf?eld. Class-of-Service Mapping for QoS: A statistical signature-based approach to IP traf?c classi?cation. In ACM SIGCOMM Internet Measurement Conference, Taormina, Sicily, Italy, 2004.
[11] A. McGregor, M. Hall, P. Lorier, and J. Brunskill. Flow Clustering Using Machine Learning Techniques. In Proceedings of the Fifth Passive and Active Measurement Workshop (PAM 2004), April 2004.
[12] A. Soule, K. Salamatian, N. Taft, R. Emilion, and K. Papagiannaki. Flow Classi?cation by Histograms or How to Go on Safari in the Internet. In Proceedings of ACM Sigmetrics, New York, NY, June 2004.
[13] F. Hernandez-Campos, ´ A. B. Nobel, F. D. Smith, and K. Jeffay. Statistical clustering of internet communication patterns. In Proceedings of the 35th Symposium on the Interface of Computing Science and Statistics, Computing Science and Statistics, volume 35, July 2003.
[14] A. W. Moore, J. Hall, C. Kreibich, E. Harris, and I. Pratt. Architecture of a Network Monitor. In Passive & Active Measurement Workshop 2003 (PAM2003), La Jolla, CA, April 2003.
[15] A. W. Moore and D. Zuev. Discriminators for use in ?ow-based classi?cation. Technical report, Intel Research, Cambridge, 2005