skip to main content
article

BLINC: multilevel traffic classification in the dark

Published:22 August 2005Publication History
Skip Abstract Section

Abstract

We present a fundamentally different approach to classifying traffic flows according to the applications that generate them. In contrast to previous methods, our approach is based on observing and identifying patterns of host behavior at the transport layer. We analyze these patterns at three levels of increasing detail (i) the social, (ii) the functional and (iii) the application level. This multilevel approach of looking at traffic flow is probably the most important contribution of this paper. Furthermore, our approach has two important features. First, it operates in the dark, having (a) no access to packet payload, (b) no knowledge of port numbers and (c) no additional information other than what current flow collectors provide. These restrictions respect privacy, technological and practical constraints. Second, it can be tuned to balance the accuracy of the classification versus the number of successfully classified traffic flows. We demonstrate the effectiveness of our approach on three real traces. Our results show that we are able to classify 80%-90% of the traffic with more than 95% accuracy.

References

  1. B. Aiello, C. Kalmanek, P. McDaniel, S. Sen, O. Spatscheck, and J. Van der Merwe. Analysis of Communities Of Interest in Data Networks. In PAM, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Bro. http://bro-ids.org/.Google ScholarGoogle Scholar
  3. D. Chakrabarti, S. Papadimitriou, D. Modha, and C. Faloutsos. Fully Automatic Cross-associations. In KDD, August 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. k. claffy, H.-W. Braun, and G. Polyzos. A Parametrizable methodology for Internet traffic flow profiling. In JSAC, 1995.Google ScholarGoogle Scholar
  5. C. Dewes, A. Wichmann, and A. Feldmann. An analysis of Internet chat systems. In ACM/SIGCOMM IMC, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. C. Estan, S. Savage, and G. Varghese. Automatically Inferring Patterns of Resource Consumption in Network Traffic. In SIGCOMM, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. F. Hernandez-Campos, A. B. Nobel, F. D. Smith, and K. Jeffay. Statistical Clustering of Internet Communication Patterns. Computing Science and Statistics, 35, July 2003.Google ScholarGoogle Scholar
  8. T. Karagiannis, A.Broido, M. Faloutsos, and kc claffy. Transport layer identification of P2P traffic. In ACM/SIGCOMM IMC, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. T. Karagiannis, A.Broido, N.Brownlee, kc claffy, and M.Faloutsos. Is P2P dying or just hiding? In IEEE Globecom 2004, GI.Google ScholarGoogle Scholar
  10. T. Karagiannis, D. Papagiannaki, and M. Faloutsos. BLINC: Multilevel Traffic Classification in the Dark. Technical report, 2005. http://www.cs.ucr.edu/~tkarag/papers/BLINC_TR.pdf.Google ScholarGoogle Scholar
  11. K. Keys, D. Moore, R. Koga, E. Lagache, M. Tesch, and k. claffy. The architecture of the CoralReef: Internet Traffic monitoring software suite. In PAM, 2001.Google ScholarGoogle Scholar
  12. A. McGregor, M. Hall, P. Lorier, and J. Brunskill. Flow Clustering Using Machine Learning Techniques. In PAM, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  13. A. Moore, J. Hall, C. Kreibich, E. Harris, and I. Pratt. Architecture of a Network Monitor. In PAM, 2003.Google ScholarGoogle Scholar
  14. A. Moore and K. Papagiannaki. Toward the Accurate Identification of Network Applications. In PAM, March 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. A. W. Moore and D. Zuev. Internet Traffic Classification Using Bayesian Analysis Techniques. In ACM SIGMETRICS, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Pastry. http://research.microsoft.com/~antr/Pastry/.Google ScholarGoogle Scholar
  17. Razor. http://razor.sourceforge.net/.Google ScholarGoogle Scholar
  18. M. Roughan, S. Sen, O. Spatscheck, and N. Duffield. Class-of-Service Mapping for QoS: A Statistical Signature-based Approach to IP Traffic Classification. In ACM/SIGCOMM IMC, November 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. S. Sen, O. Spatscheck, and D. Wang. Accurate, Scalable In-Network Identification of P2P Traffic Using Application Signatures. In WWW, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. S. Sen and J. Wang. Analyzing Peer-to-Peer Traffic Across Large Networks. In ACM/SIGCOMM IMW, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. SNORT. http://www.snort.org/.Google ScholarGoogle Scholar
  22. tcpdump. http://www.tcpdump.org/.Google ScholarGoogle Scholar
  23. K. Xu, Z. Zhang, and S. Bhattacharya. Profiling Internet Backbone Traffic: Behavior Models and Applications. In SIGCOMM, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. BLINC: multilevel traffic classification in the dark

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM SIGCOMM Computer Communication Review
      ACM SIGCOMM Computer Communication Review  Volume 35, Issue 4
      Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications
      October 2005
      324 pages
      ISSN:0146-4833
      DOI:10.1145/1090191
      Issue’s Table of Contents
      • cover image ACM Conferences
        SIGCOMM '05: Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications
        August 2005
        350 pages
        ISBN:1595930094
        DOI:10.1145/1080091

      Copyright © 2005 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 22 August 2005

      Check for updates

      Qualifiers

      • article

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader