Our previous work demonstrated the possibility of distinguishing several groups of traffic with accuracy of over 99%. Today, most of the traffic is generated by web browsers, which provide different kinds of services based on the HTTP protocol: web browsing, file downloads, audio and voice streaming through third-party plugins, etc. This paper suggests and evaluates two approaches to distinguish various types of HTTP traffic based on the content: distributed among volunteers' machines and centralized running in the core of the network. We also assess the accuracy of the centralized classifier for both the HTTP traffic and mixed HTTP/non-HTTP traffic. In the latter case, we achieved the accuracy of 94%. Finally, we provide graphical characte...
To overcome the drawbacks of existing methods for traffic classification (by ports, Deep Packet Insp...
The Internet, while emerging as the key component for allsorts of communication, is far from well-un...
The task of network management and monitoring relies on an accurate characterization of network traf...
Monitoring of the network performance in high-speed Internet infrastructure is a challenging task, a...
HTTP constitutes a dominant part of the Internet traffic. Today's web traffic mostly consists of HTT...
Classification and accounting of computer network traffic is an important task of Internet Service P...
Understanding Internet traffic is crucial in order to facilitate academic research and practical net...
Recently, HTTP based Botnet threat has become a serious problem for computer security experts as bot...
The prevalence of HTTP web traffic on the Internet has long transcended the layer 7 classification, ...
speed Internet infrastructures is a challenging task. However, precise assessments must take into ac...
Recently,HTTP based Botnet threat has become a serious problem for computer security experts as bots...
Botnet use is on the rise, with a growing number of botmasters now switching to the HTTP-based C&C i...
AbstractWith the advancement of technology and communication system, use of internet is giving at a ...
International audienceTraffic analysis is a compound of strategies intended to find relationships, p...
Characterising network traffic is a critical step for detecting network intrusion or misuse. The tra...
To overcome the drawbacks of existing methods for traffic classification (by ports, Deep Packet Insp...
The Internet, while emerging as the key component for allsorts of communication, is far from well-un...
The task of network management and monitoring relies on an accurate characterization of network traf...
Monitoring of the network performance in high-speed Internet infrastructure is a challenging task, a...
HTTP constitutes a dominant part of the Internet traffic. Today's web traffic mostly consists of HTT...
Classification and accounting of computer network traffic is an important task of Internet Service P...
Understanding Internet traffic is crucial in order to facilitate academic research and practical net...
Recently, HTTP based Botnet threat has become a serious problem for computer security experts as bot...
The prevalence of HTTP web traffic on the Internet has long transcended the layer 7 classification, ...
speed Internet infrastructures is a challenging task. However, precise assessments must take into ac...
Recently,HTTP based Botnet threat has become a serious problem for computer security experts as bots...
Botnet use is on the rise, with a growing number of botmasters now switching to the HTTP-based C&C i...
AbstractWith the advancement of technology and communication system, use of internet is giving at a ...
International audienceTraffic analysis is a compound of strategies intended to find relationships, p...
Characterising network traffic is a critical step for detecting network intrusion or misuse. The tra...
To overcome the drawbacks of existing methods for traffic classification (by ports, Deep Packet Insp...
The Internet, while emerging as the key component for allsorts of communication, is far from well-un...
The task of network management and monitoring relies on an accurate characterization of network traf...