DOI QR코드

DOI QR Code

A Classifiable Sub-Flow Selection Method for Traffic Classification in Mobile IP Networks

  • Satoh, Akihiro (Graduate School of Information Sciences, Tohoku University) ;
  • Osada, Toshiaki (Research Institute of Electrical Communication, Tohoku University) ;
  • Abe, Toru (Cyberscience Center, Tohoku University) ;
  • Kitagata, Gen (Research Institute of Electrical Communication, Tohoku University) ;
  • Shiratori, Norio (Research Institute of Electrical Communication, Tohoku University) ;
  • Kinoshita, Tetsuo (Research Institute of Electrical Communication, Tohoku University)
  • Received : 2010.04.30
  • Accepted : 2010.08.23
  • Published : 2010.09.30

Abstract

Traffic classification is an essential task for network management. Many researchers have paid attention to initial sub-flow features based classifiers for traffic classification. However, the existing classifiers cannot classify traffic effectively in mobile IP networks. The classifiers depend on initial sub-flows, but they cannot always capture the sub-flows at a point of attachment for a variety of elements because of seamless mobility. Thus the ideal classifier should be capable of traffic classification based on not only initial sub-flows but also various types of sub-flows. In this paper, we propose a classifiable sub-flow selection method to realize the ideal classifier. The experimental results are so far promising for this research direction, even though they are derived from a reduced set of general applications and under relatively simplifying assumptions. Altogether, the significant contribution is indicating the feasibility of the ideal classifier by selecting not only initial sub-flows but also transition sub-flows.

Keywords

References

  1. D.E. Taylor, "Survey and Taxonomy of Packet Classification Techniques," ACM Computing Surveys, Vol.37, No.3, pp.238-275, Sep., 2005. https://doi.org/10.1145/1108956.1108958
  2. V. Paxson, "Bro: A System for Detecting Network Intruders in Real-Time," Proceedings of the 7th USENIX Security Symposium, pp.31-51, Jan., 1998.
  3. H. Dreger, A. Feldmann, M. Mai, V. Paxson, and R. Sommer, "Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection," Proceedings of the 15th USENIX Security Symposium, pp.257-272, Aug., 2006.
  4. "Internet Assigned Numbers Authority (IANA)," http://www.iana.org/assignments/port-numbers/.
  5. M. Crotti, M. Dusi, F. Gringoli, and L. Salgarelli, "Traffic Classification through Simple Statistical Fingerprinting," ACM SIGCOMM Computer Communication Review, Vol.37, No.1, pp.5-16, Jan., 2007. https://doi.org/10.1145/1198255.1198257
  6. L. Bernaille, R. Teixeira, and K. Salamation, "Early Application Identification," Proceedings of the 2006 ACM CoNEXT Conference, 2006.
  7. M. Tai, S. Ata, and I. Oka, "Environment-Independent Online Real-Time Traffic Identification," Proceedings of the 4th International Conference on Networking and Services, pp.230-235, 2008. https://doi.org/10.1109/ICNS.2008.44
  8. T.T. Nguyen and G. Armitage, "Training on Multiple Sub-Flows to Optimise the Use of Machine Learning Classifiers in Real-World IP Networks," Proceedings of the IEEE 31th Conference on Local Computer Networks, pp.369-376, Nov., 2006. https://doi.org/10.1109/LCN.2006.322122
  9. T.T. Nguyen and G. Armitage, "Clustering to Assist Supervised Machine Learning for Real-Time IP Traffic Classification," Proceedings of the IEEE International Conference on Communications, pp.5857-5862, May, 2008. https://doi.org/10.1109/ICC.2008.1095
  10. D. Johnson, C. Perkins, and J. Arkko, "Mobility Support in IPv6," Internet RFC 3775, Jun., 2004.
  11. V. Devarapalli, R. Wakikawa, A. Petrescu, and P. Thubert, "Network Mobility (NEMO) Basic Support Protocol," Internet RFC 3963, Jan., 2005.
  12. T.T. Nguyen and G. Armitage, "A Survey of Techniques for Internet Traffic Classification Using Machine Learning," IEEE Communications Surveys and Tutorials, Vol.10, No.4, pp.56-76, 4th Quarter 2008. https://doi.org/10.1109/SURV.2008.080406
  13. "Cpmonitor," http://www.cysols.com/.
  14. J. Shlens, "A Tutorial on Principal Component Analysis," Systems Neurobiology Laboratory, Salk Institute for Biological Studies, 2005.
  15. C.V. Wright, F. Monrose, and G.M. Masson, "Using Visual Motifs to Classify Encrypted Traffic," Proceedings of the International Workshop on Visualization for Computer Security, pp.41-50, Nov., 2006. https://doi.org/10.1145/1179576.1179584
  16. L. Bernaille, R. Teixeira, I. Akodkenou, A. Soule, and K. Salamation, "Traffic Classification on the Fly," ACM SIGCOMM Computer Communication Review, Vol.36, No.2, pp.23-26, Apr., 2006. https://doi.org/10.1145/1129582.1129589
  17. A.W. Moore, D. Zuev, and M.L. Crogan, "Discriminators for Use in Flow-Based Classification," Technical Report, Aug., 2005.
  18. A.K. Jain, M.N. Murty, and P.J. Flynn, "Data Clustering: A Review," ACM Computing Surveys, Vol.31, No.3, pp.264-323, Sep., 1999. https://doi.org/10.1145/331499.331504
  19. J.H. Ward, "Hierarchical Grouping to Optimize an Objective Function," Journal of the American Statistical Association, Vol.58, No.301, pp.236-244, 1963. https://doi.org/10.2307/2282967

Cited by

  1. Proxy based seamless connection management method in mobile cloud computing vol.16, pp.4, 2013, https://doi.org/10.1007/s10586-013-0249-8