skip to main content
10.1145/1080173.1080183acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
Article
Free Access

ACAS: automated construction of application signatures

Published:22 August 2005Publication History

ABSTRACT

An accurate mapping of traffic to applications is important for a broad range of network management and measurement tasks. Internet applications have traditionally been identified using well-known default server network-port numbers in the TCP or UDP headers. However this approach has become increasingly inaccurate. An alternate, more accurate technique is to use specific application-level features in the protocol exchange to guide the identification. Unfortunately deriving the signatures manually is very time consuming and difficult.In this paper, we explore automatically extracting application signatures from IP traffic payload content. In particular we apply three statistical machine learning algorithms to automatically identify signatures for a range of applications. The results indicate that this approach is highly accurate and scales to allow online application identification on high speed links. We also discovered that content signatures still work in the presence of encryption. In these cases we were able to derive content signature for unencrypted handshakes negotiating the encryption parameters of a particular connection.

References

  1. I. Androutsopoulos, J. Koutsias, K. Chandrinos, G. Paliouras, and C. Spyropoulos. An evaluation of naive bayesian anti-spam filtering. In Proceedings of the Workshop on Machine Learning in New Information Age, Barcelona, Spain, 2000.Google ScholarGoogle Scholar
  2. A. L. Berger, S. A. Della Pietra, and V. J. Della Pietra. A Maximum Entropy Approach to Natural Language Processing. Computational Linguistics, 22(1):39--71, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. M. Collins, R. E. Schapire, and Y. Singer. Logistic Regression, AdaBoost and Bregman Distances. In Proceedings of COLT'00, pages 158--169, Stanford, CA, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. C. Dewes, A. Wichmann, and A. Feldmann. An analysis of internet chat systems. In Proceedings of ACM SIGCOMM Internet Measurement Conference, October 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. M. Dudik, S. Phillips, and R. E. Schapire. Performance Guarantees for Regularized Maximum Entropy Density Estimation. In Proceedings of COLT'04, Banff, Canada, 2004. Springer Verlag.Google ScholarGoogle ScholarCross RefCross Ref
  6. P. Haffner. Scaling Large Margin Classifiers for Spoken Language Understanding. In Accepted for Publication in Speech Communication, 2005.Google ScholarGoogle Scholar
  7. A. Moore and K. Papagiannaki. Toward the accurate identification of network applications. In Passive & Active Measurement Workshop, Boston, USA, March 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. I. Rish. An empirical study of the naive bayes classifier. In Proceedings of IJCAI-01 workshop on Empirical Methods in AI", pages 41--46, Sicily, Italy, 2001.Google ScholarGoogle Scholar
  9. M. Roughan, S. Sen, O. Spatscheck, and N. Duffield. Class-of-service mapping for qos: A statistical signature-based approach to tp traffic classification. In Proceedings of ACM SIGCOMM Internet Measurement Conderence (IMC'04), Sicily, Italy, October 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. R. E. Schapire. The boosting approach to machine learning: An overview. In MSRI Workshop on Nonlinear Estimation and Classification, 2002.Google ScholarGoogle Scholar
  11. S. Sen, O. Spatscheck, and D. Wang. Accurate, scalable in-network identification of p2p traffic using application signatures. In Proceedings of World Wide Web Conference, NY, USA, May 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. S. Souafi-Bensafi, M. Parizeau, F. Lebourgeois, and H. Emptoz. Bayesian networks classifiers applied to documents. In Proceedings of ICPR, Québec, Canada, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. S. Zander, T. Nguyen, and G. Armitage. Self-learning ip traffic classification based on statistical flow characteristics. In Passive & Active Measurement Workshop, Boston, USA, March 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. D. Zuev and A. Moore. Traffic classification using a statistical approach. In Passive & Active Measurement Workshop, Boston, USA, March 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. ACAS: automated construction of application signatures

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      MineNet '05: Proceedings of the 2005 ACM SIGCOMM workshop on Mining network data
      August 2005
      296 pages
      ISBN:1595930264
      DOI:10.1145/1080173

      Copyright © 2005 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 22 August 2005

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • Article

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader