You are not logged in.

Unknown pattern extraction for statistical network protocol identification

Wang, Yu, Chen, Chao and Xiang, Yang 2015, Unknown pattern extraction for statistical network protocol identification, in LCN 2015: Proceedings of the IEEE Local Computer Networks 2015 Annual Conference, IEEE, Piscataway, N.J., pp. 506-509, doi: 10.1109/LCN.2015.7366364.

Attached Files
Name Description MIMEType Size Downloads

Title Unknown pattern extraction for statistical network protocol identification
Author(s) Wang, Yu
Chen, Chao
Xiang, Yang
Conference name IEEE Local Computer Networks. Annual Conference (40th : 2015 : Cleanwater Beach, Fla.))
Conference location Cleanwater Beach, Fla.
Conference dates 26-29 Oct. 2015
Title of proceedings LCN 2015: Proceedings of the IEEE Local Computer Networks 2015 Annual Conference
Editor(s) [Unknown]
Publication date 2015
Conference series IEEE Local Computer Networks Annual Conference
Start page 506
End page 509
Total pages 4
Publisher IEEE
Place of publication Piscataway, N.J.
Keyword(s) network protocol
machine learning
semi-supervised learning
constrained clustering
Summary The past decade has seen a lot of research on statistics-based network protocol identification using machine learning techniques. Prior studies have shown promising results in terms of high accuracy and fast classification speed. However, most works have embodied an implicit assumption that all protocols are known in advance and presented in the training data, which is unrealistic since real-world networks constantly witness emerging traffic patterns as well as unknown protocols in the wild. In this paper, we revisit the problem by proposing a learning scheme with unknown pattern extraction for statistical protocol identification. The scheme is designed with a more realistic setting, where the training dataset contains labeled samples from a limited number of protocols, and the goal is to tell these known protocols apart from each other and from potential unknown ones. Preliminary results derived from real-world traffic are presented to show the effectiveness of the scheme.
ISBN 9781467367714
Language eng
DOI 10.1109/LCN.2015.7366364
Field of Research 080503 Networking and Communications
Socio Economic Objective 970108 Expanding Knowledge in the Information and Computing Sciences
HERDC Research category E1 Full written paper - refereed
ERA Research output type E Conference publication
Grant ID DP150103732
LP120200266
Copyright notice ©2015, IEEE
Persistent URL http://hdl.handle.net/10536/DRO/DU:30084591

Document type: Conference Paper
Collection: School of Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Scopus Citation Count Cited 0 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 59 Abstract Views, 2 File Downloads  -  Detailed Statistics
Created: Fri, 01 Jul 2016, 11:42:06 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.