World Applied Sciences Journal 5 (2): 150-160, 2008
ISSN 1818-4952
© IDOSI Publications, 2008
Corresponding Author: Ali Asghar Yarifard, Islamic Azad University, Qaenat Branch, Iran
150
The Monitoring System Based on Traffic Classification
1
Ali Asghar Yarifard and
2
Mohammad Hossein Yaghmaee
1
Islamic Azad University, Qaenat Branch, Iran
2
Department of Computer Engineering, Ferdowsi University, Mashhad, Iran
Abstract: Accurate identification and classification of network traffic according to the application that
generated them is at the basis of any modern network management platform. Nowadays, many P2P
applications using dynamic port numbers, masquerading techniques and encryption to avoid detection.
Therefore, simple port-based and systematic analyses of packet payloads methods are rapidly inefficient.
An alternative approach is to classify traffic rely on the fact that different applications have distinct
behavior patterns when they communicate on a network. We present this latter approach to effectively
identify groups of traffic that are similar using only transport layer statistical information. In this study, we
propose a traffic monitoring scheme based on IPFIX standard that employs the clustering algorithms as a
classification tool to classify network traffics using only transport layer's information. We believe that in
order to build an accurate classifier, a good classification model must be used. For building such model, we
considers three unsupervised clustering algorithms, namely K-Means, DBSCAN and SNN, for cluster
training data that the latter has not previously been used for network traffic classification. We evaluate this
algorithm and compare to the previously used K-Means and DBSCAN algorithms, using empirical internet
traces.
Key words: Monitoring system • Traffic classification • IPFIX protocol
INTRODOCTION
The number of application layer protocols and
end-users is increasing rapidly. Because of this
deployment, the efficient management of network
resources is a complicated task. With traditional
network management methods, it is difficult to obtain a
comprehensive view from the state of the network and
simultaneously discover important details from the
network traffics. Traffic classification mechanisms are
useful tools that help the allocation, control and
management of resources in TCP/IP networks and
improve the reliability of Network Intrusion Detection
Systems (NIDS).
Different techniques can be used to classify
network traffic. The simplest method is to identify the
applications that generated each flow by its transport
level source and destination port numbers that has
been very successful in the past [1]. However, standard
services are frequently run on non-standard ports,
for example to circumvent policy restrictions.
Moreover, some increasingly popular applications,
such as peer-to-peer applications using dynamic port
numbers and also started distinguishing themselves by
using port numbers for commonly used protocols
such as HTTP and FTP. Many recent studies confirm
that port-based identification of network traffic is
inefficient [4, 7].
To address aforementioned drawbacks of port-
based classification, other techniques proposed such as
the ones present in many NIDS such as Bro and Snort
[8, 9] rely on the detailed analysis of each packet
payload. In this approach, packet payloads are
inspected to determine whether they contain
characteristic signatures of known applications. This
method is extremely accurate, but some limitations.
First, these techniques only identify traffic for which
signatures are available and are unable to classify any
other traffic. Second, there is a high storage and
computational cost to study every packet that traverses
a link (in particular on very high-speed links). Finally,
payload information is not useful when applications use
encryption. Therefore, this approaches scale poorly to
the capacity of current high-speed networks, limiting
their use to lower bandwidth links
The limitations of port-based and payload-based
analysis have motivated use of transport layer statistics
for traffic classification [3, 5, 7, 15, 18]. These
classification techniques rely on the fact that different
applications typically have distinct behavior patterns
when communicate on a network. For instance, a large
file transfer using FTP would have a longer connection