ACE-Cost: acquisition cost efficient classifier by hybrid decision tree with local SVM leaves
MLDM'11 Proceedings of the 7th international conference on Machine learning and data mining in pattern recognition
Network monitoring for security and forensics
ICISS'06 Proceedings of the Second international conference on Information Systems Security
Audio codec identification from coded and transcoded audios
Digital Signal Processing
Hi-index | 0.00 |
One of the growing problems faced by network administrators is the abuse of computing resources by authorized and unauthorized personnel. The nature of abuse may vary from using unauthorized applications to serving unauthorized content. Proliferation of peer-to-peer networks and wide use of tunnels makes it difficult to detect such abuses and easy to circumvent security policies. This paper presents the design and implementation of a system, called Nabs, that characterizes content types of network ows based solely on the payload which can then be used to identify abuses of computing resources. The proposed method does not depend on packet headers or other simple packet characteristics hence is more robust to circumvention.