Presentation 2013-09-13
A Study on Online Application Identification of Encrypted Traffic
Yuichi KUMANO, Shingo ATA, Nobuyuki NAKAMURA, Yoshihiro NAKAHIRA, Ikuo OKA,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) Application identification in the middle is one of important technique for network operators to manage application based traffic and policy controls. However, due to the increase of encrypted traffic, it is becoming harder to read application specific information from packets. We previously proposed a method of application identification of encrypted traffic, and it can achieve high accuracy as same as the case of normal traffic. However, it requires the offline identification which uses statistics of the whole of flows, and it can't identify flows in real-time. In this paper, we propose a method of application identification in high accuracy and real-time. First, we clarify the sufficient number of packets to identify the application of encrypted traffic with high accuracy. Second, we proposed the method of inferring flow statistics in order to achieve high accuracy even when we can use smaller packets than required packets in identification. According to evaluation of using the real traffic trace, proposed method can achieve high accuracy almost as the same as in offline method by observing smaller packets than required packets in identification.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Application Identification / Real-time / Encrypted Traffic / Flow Statistics
Paper # IN2013-74
Date of Issue

Conference Information
Committee IN
Conference Date 2013/9/5(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information Networks (IN)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) A Study on Online Application Identification of Encrypted Traffic
Sub Title (in English)
Keyword(1) Application Identification
Keyword(2) Real-time
Keyword(3) Encrypted Traffic
Keyword(4) Flow Statistics
1st Author's Name Yuichi KUMANO
1st Author's Affiliation Graduate School of Engineering, Osaka City University()
2nd Author's Name Shingo ATA
2nd Author's Affiliation Graduate School of Engineering, Osaka City University
3rd Author's Name Nobuyuki NAKAMURA
3rd Author's Affiliation Corporate Research & Development Center, Oki Electric Industry Co., Ltd.
4th Author's Name Yoshihiro NAKAHIRA
4th Author's Affiliation Corporate Research & Development Center, Oki Electric Industry Co., Ltd.
5th Author's Name Ikuo OKA
5th Author's Affiliation Graduate School of Engineering, Osaka City University
Date 2013-09-13
Paper # IN2013-74
Volume (vol) vol.113
Number (no) 206
Page pp.pp.-
#Pages 6
Date of Issue