Challenges in network application identification

  • Authors:
  • Alok Tongaonkar;Ram Keralapura;Antonio Nucci

  • Affiliations:
  • Narus, Inc.;Narus, Inc.;Narus, Inc.

  • Venue:
  • LEET'12 Proceedings of the 5th USENIX conference on Large-Scale Exploits and Emergent Threats
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

The evolution of the Internet in the last few years has been characterized by dramatic changes to the way users behave, interact and utilize the network. This has posed new challenges to network operators. To deal with the increasing number of threats to enterprise networks, operators need greater visibility and understanding of the applications running in their networks. In years gone by, the biggest challenge in network application identification used to be of providing real-time classification at increasing wire speeds. But now the operators are facing another challenge - the ability to keep pace with the tremendous rate of development of new applications. This problem can be attributed largely to the explosive growth in the number of web and mobile applications. This combined with application hiding techniques like encryption, port abuse, and tunneling have rendered the traditional approaches for application identification ineffective. In this paper, we discuss the challenges facing the network operators and the limitations of current state of the art approaches in both the commercial and the research world in solving these problems.