![]() |
Networked Systems SeminarTalk #5: Thursday, Feb 7th, 2008Calit2 3008, 2pm |
Traffic Classification and User Profiling: A Novel ApproachMichalis FaloutsosUC Riverside |
About the Talk:
Who uses the network? What kind of applications do we see? Can we detect
attacks and viruses? Can we detect when a user is under attack? Monitoring
network traffic and detecting unwanted applications has become a challenging
problem, since many applications obfuscate their traffic using unregistered
port numbers or payload encryption. Apart from some notable exceptions, most
traffic monitoring tools use two types of approaches: (a) keeping traffic
statistics such as packet sizes and inter-arrivals, flow counts, byte volumes,
etc or (b) analyzing packet content.
In this talk, we provide an overview of our work to answer the above questions. More specifically, we address the problems of traffic classification, and host profiling. We present a fundamentally different approach to classifying traffic flows according to the applications that generate them. In contrast to previous methods, our novel graph-based approach is based on observing and identifying patterns of host behavior at the transport layer and the network wide behavior of the community of interacting nodes. [slides] |
About the Speaker:
|