Behavior Based Signature Extraction Method for Internet Application Traffic Identification 


Vol. 38,  No. 5, pp. 368-376, May  2013


PDF
  Abstract

The importance of application traffic identification is emphasized for the efficient network management with recent rapid development of internet. In this paper, we present the application traffic identification method using the behavior based signature to improve the previous limitations. The behavior based signature is made by combining the existing various traffic features, and uses the Inter-Flow unit that is combination of the first request packet of each flow. All signatures have 100% precision when measured the accuracy of 5 applications using at home and abroad to prove the feasibility of the proposed signature.

  Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.


  Cite this article

[IEEE Style]

S. Yoon and M. Kim, "Behavior Based Signature Extraction Method for Internet Application Traffic Identification," The Journal of Korean Institute of Communications and Information Sciences, vol. 38, no. 5, pp. 368-376, 2013. DOI: .

[ACM Style]

Sung-Ho Yoon and Myung-Sup Kim. 2013. Behavior Based Signature Extraction Method for Internet Application Traffic Identification. The Journal of Korean Institute of Communications and Information Sciences, 38, 5, (2013), 368-376. DOI: .

[KICS Style]

Sung-Ho Yoon and Myung-Sup Kim, "Behavior Based Signature Extraction Method for Internet Application Traffic Identification," The Journal of Korean Institute of Communications and Information Sciences, vol. 38, no. 5, pp. 368-376, 5. 2013.