TY - JOUR
T1 - Using Burstiness for Network Applications Classification
AU - Oudah, Hussein
AU - Ghita, Bogdan
AU - Bakhshi, Taimur
AU - Alruban, Abdulrahman
AU - Walker, David J.
PY - 2019/8/20
Y1 - 2019/8/20
N2 - Network traffic classification is a vital task for service operators, network engineers, and security specialists to manage network traffic, design networks, and detect threats. Identifying the type/name of applications that generate traffic is a challenging task as encrypting traffic becomes the norm for Internet communication. Therefore, relying on conventional techniques such as deep packet inspection (DPI) or port numbers is not efficient anymore. This paper proposes a novel flow statistical-based set of features that may be used for classifying applications by leveraging machine learning algorithms to yield high accuracy in identifying the type of applications that generate the traffic. The proposed features compute different timings between packets and flows. This work utilises tcptrace to extract features based on traffic burstiness and periods of inactivity (idle time) for the analysed traffic, followed by the C5.0 algorithm for determining the applications that generated it. The evaluation tests performed on a set of real, uncontrolled traffic, indicated that the method has an accuracy of 79% in identifying the correct network application.
AB - Network traffic classification is a vital task for service operators, network engineers, and security specialists to manage network traffic, design networks, and detect threats. Identifying the type/name of applications that generate traffic is a challenging task as encrypting traffic becomes the norm for Internet communication. Therefore, relying on conventional techniques such as deep packet inspection (DPI) or port numbers is not efficient anymore. This paper proposes a novel flow statistical-based set of features that may be used for classifying applications by leveraging machine learning algorithms to yield high accuracy in identifying the type of applications that generate the traffic. The proposed features compute different timings between packets and flows. This work utilises tcptrace to extract features based on traffic burstiness and periods of inactivity (idle time) for the analysed traffic, followed by the C5.0 algorithm for determining the applications that generated it. The evaluation tests performed on a set of real, uncontrolled traffic, indicated that the method has an accuracy of 79% in identifying the correct network application.
UR - https://pearl.plymouth.ac.uk/context/secam-research/article/1243/viewcontent/e5758437.pdf
U2 - 10.1155/2019/5758437
DO - 10.1155/2019/5758437
M3 - Article
SN - 2090-7141
VL - 2019
SP - 1
EP - 10
JO - Journal of Computer Networks and Communications
JF - Journal of Computer Networks and Communications
IS - 0
ER -