International audienceThe automatic detection of applications associated with net-work traffic is an essential step for network security and traffic engineering. Unfortunately, simple port-based clas-sification methods are not always efficient and systematic analysis of packet payloads is too slow. Most recent re-search proposals use flow statistics to classify traffic flows once they are finished, which limit their applicability for on-line classification. In this paper, we evaluate the feasibility of application identification at the beginning of a TCP con-nection. Based on an analysis of packet traces collected on eight different networks, we find that it is possible to distin-guish the behavior of an application from the observation of ...
The early identification of applications through the observation and fast analysis of the associated...
The early identification of applications through the observation and fast analysis of the associated...
The early identification of applications through the observation and fast analysis of the associated...
The early detection of applications associated with TCP flows is an essential step for network secur...
The identification of application flows is a critical task in order to manage bandwidth requirements...
There is widespread interest in the research community for new IP traffic classification techniques,...
There is widespread interest in the research community for new IP traffic classification techniques,...
There is widespread interest in the research community for new IP traffic classification techniques,...
There is widespread interest in the research community for new IP traffic classification techniques,...
There is widespread interest in the research community for new IP traffic classification techniques,...
International audienceThe early detection of applications associated with TCP flows is an essential ...
Abstract—The early identification of applications through the observation and fast analysis of the a...
We address the problem of classifying Internet packet flows according to the application level proto...
Abstract—To manage and monitor their networks in a proper way, network operators are often intereste...
The early identification of applications through the observation and fast analysis of the associated...
The early identification of applications through the observation and fast analysis of the associated...
The early identification of applications through the observation and fast analysis of the associated...
The early identification of applications through the observation and fast analysis of the associated...
The early detection of applications associated with TCP flows is an essential step for network secur...
The identification of application flows is a critical task in order to manage bandwidth requirements...
There is widespread interest in the research community for new IP traffic classification techniques,...
There is widespread interest in the research community for new IP traffic classification techniques,...
There is widespread interest in the research community for new IP traffic classification techniques,...
There is widespread interest in the research community for new IP traffic classification techniques,...
There is widespread interest in the research community for new IP traffic classification techniques,...
International audienceThe early detection of applications associated with TCP flows is an essential ...
Abstract—The early identification of applications through the observation and fast analysis of the a...
We address the problem of classifying Internet packet flows according to the application level proto...
Abstract—To manage and monitor their networks in a proper way, network operators are often intereste...
The early identification of applications through the observation and fast analysis of the associated...
The early identification of applications through the observation and fast analysis of the associated...
The early identification of applications through the observation and fast analysis of the associated...
The early identification of applications through the observation and fast analysis of the associated...