posted on 2024-07-13, 07:35authored bySebastian Zander, Nigel Williams, Grenville Armitage
Public traffic traces are often obfuscated for privacy reasons, leaving network historians with only port numbers from which to identify past application traffic trends. However, it is misleading to make assumptions simply based on default port numbers for many applications. Traffic classification based on machine learning could provide a solution. By training a classifier using representative traffic samples, we can differentiate between distinct, but possibly similar, applications in previously anonymised trace files. Using popular peer-to-peer and online game applications as examples, we show that their traffic flows can be separated after-the-fact without using port numbers or packet payload. We also address how to obtain negative training examples, propose an approach that works with any existing machine-learning algorithm, and present a preliminary evaluation based on real traffic data.
History
Available versions
PDF (Published version)
Journal title
Passive and Active Measurement (PAM) Conference, Australia, 30-31 March 2006
Conference name
Passive and Active Measurement PAM Conference, Australia, 30-31 March 2006