Abstract
Classifying host roles based on network traffic behavior is valuable for network security analysis and detecting security policy violation. Behavior-based network security analysis has advantages over traditional approaches such as code patterns or signatures. Modeling host roles based on network flow data is challenging because of the huge volume of network traffic and overlap among host roles. Many studies of network traffic classification have focused on classifying applications such as web, peer-to-peer, and DNS traffic. In general, machine learning approaches have been applied on classifying applications, security awareness, and anomaly detection. In this paper, we present a supervised machine learning approach that use On-Line Support Vector Machine and Decision Tree to classify host roles. We collect sFlow data from main gateways of a large campus network. We classify different roles, namely, clients versus servers, regular web non-email servers versus web email servers, clients at personal offices versus public places of laboratories and libraries, and personal office clients from two different colleges. We achieved very high classification accuracy, i.e., 99.2% accuracy in classifying clients versus servers, 100% accuracy in classifying regular web non-email servers versus web email servers, 93.3% accuracy in classifying clients at personnel offices versus public places, and 93.3% accuracy in classifying clients at personal offices from two different colleges.
Original language | English |
---|---|
Pages | 53-60 |
Number of pages | 8 |
DOIs | |
State | Published - 2013 |
Event | 2013 1st ACM Workshop on High Performance and Programmable Networking, HPPN 2013 - New York, NY, United States Duration: 18 Jun 2013 → 18 Jun 2013 |
Conference
Conference | 2013 1st ACM Workshop on High Performance and Programmable Networking, HPPN 2013 |
---|---|
Country/Territory | United States |
City | New York, NY |
Period | 18/06/13 → 18/06/13 |
Keywords
- machine learning
- network traffic classific
- sFlow