A VoIP Traffic Identification Scheme Based on Host and Flow Behavior Analysis

2010 ◽  
Vol 19 (1) ◽  
pp. 111-129 ◽  
Author(s):  
Bing Li ◽  
Maode Ma ◽  
Zhigang Jin
Heliyon ◽  
2019 ◽  
Vol 5 (6) ◽  
pp. e01845
Author(s):  
Suresh Kumar Yatirajula ◽  
Anuj Shrivastava ◽  
Vinod Kumar Saxena ◽  
Jagadeeshwar Kodavaty

2018 ◽  
Vol 1082 ◽  
pp. 012015
Author(s):  
M.A. Azmi ◽  
M.K. Abdullah ◽  
M.Z. Abdullah ◽  
Z.M. Ariff ◽  
M.A. Ismail ◽  
...  

2020 ◽  
Vol 2020 ◽  
pp. 1-10
Author(s):  
Jiangtao Zhai ◽  
Huaifeng Shi ◽  
Mingqian Wang ◽  
Zhongjun Sun ◽  
Junjun Xing

With the rapid growth of the encrypted network traffic, the identification to it becomes a hot topic in information security. Since the existing methods have difficulties in identifying the application which the encrypted traffic belongs to, a new encrypted traffic identification scheme is proposed in this paper. The proposed scheme has two levels. In the first level, the entropy and estimation of Monte Carlo π value as features are used to identify the encrypted traffic by C4.5 decision tree. In the second level, the application types are distinguished from the encrypted traffic selected above. First, the variational automatic encoder is used to extract the layer features, which is combined with the frequently-used stream features. Meanwhile, the mutual information is used to reduce the dimensionality of the combination features. Finally, the random forest classifier is used to obtain the optimal result. Compared with the existing methods, the experimental results show that the proposed scheme not only has faster convergence speed but also achieves better performance in the recognition accuracy, recall rate, and F1-Measure, which is higher than 97%.


Author(s):  
HANGYU HU ◽  
XUEMENG ZHAI ◽  
MINGDA WANG ◽  
GUANGMIN HU

Graph-based approaches have been widely employed to facilitate in analyzing network flow connectivity behaviors, which aim to understand the impacts and patterns of network events. However, existing approaches suffer from lack of connectivity-behavior information and loss of network event identification. In this paper, we propose network flow connectivity graphs (NFCGs) to capture network flow behavior for modeling social behaviors from network entities. Given a set of flows, edges of a NFCG are generated by connecting pairwise hosts who communicate with each other. To preserve more information about network flows, we also embed node-ranking values and edge-weight vectors into the original NFCG. After that, a network flow connectivity behavior analysis framework is present based on NFCGs. The proposed framework consists of three modules: a graph simplification module based on diversified filtering rules, a graph feature analysis module based on quantitative or semiquantitative analysis, and a graph structure analysis module based on several graph mining methods. Furthermore, we evaluate our NFCG-based framework by using real network traffic data. The results show that NFCGs and the proposed framework can not only achieve good performance on network behavior analysis but also exhibit excellent scalability for further algorithmic implementations.


2014 ◽  
Vol 454 (1-3) ◽  
pp. 37-45 ◽  
Author(s):  
Kanwarjeet Singh ◽  
S. Latha ◽  
M. Nandagopal ◽  
M.D. Mathew ◽  
K. Laha ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document