Traffic analysis is an important issue for network monitoring and security. We focus on identifying protocols for network traffic by analysing the size, timing and direction of network packets. By using these network stream characteristics, we propose a technique for modelling the behaviour of various TCP protocols. This model can be used for recognising protocols even when running under encrypted tunnels. This is complemented with experimental evaluation on real world network data. © Springer-Verlag Berlin Heidelberg 2006.
CITATION STYLE
Gebski, M., Penev, A., & Wong, R. K. (2006). Classification of hidden network streams. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4081 LNCS, pp. 332–341). Springer Verlag. https://doi.org/10.1007/11823728_32
Mendeley helps you to discover research relevant for your work.