Home   >   CSC-OpenAccess Library   >    Manuscript Information
Packet Payload Inspection Classifier in the Network Flow Level
N. Kannaiya Raja, K.Arulanandam, P. Umadevi, D.S.Praveen
Pages - 53 - 71     |    Revised - 15-05-2012     |    Published - 20-06-2012
Volume - 4   Issue - 3    |    Publication Date - June 2012  Table of Contents
Flow Classification, Packet Inspection, Traffic Classification, Packet Processing, Bloom Filter
The network have in the world highly congested channels and topology which was dynamically created with high risk. In this we need flow classifier to find the packet movement in the network. In this paper we have to be developed and evaluated TCP/UDP/FTP/ICMP based on payload information and port numbers and number of flags in the packet for highly flow of packets in the network. The primary motivations of this paper all the valuable protocols are used legally to process find out the end user by using payload packet inspection, and also used evaluations hypothesis testing approach. The effective use of tamper resistant flow classifier has used in one network contexts domain and developed in a different Berkeley and Cambridge, the classification and accuracy was easily found through the packet inspection by using different flags in the packets. While supervised classifier training specific to the new domain results in much better classification accuracy, we also formed a new approach to determine malicious packet and find a packet flow classifier and send correct packet to destination address.
1 Google Scholar 
2 CiteSeerX 
3 refSeek 
4 Scribd 
5 PdfSR 
A. W. Moore and D. Zuev, “Internet traffic classification using bayesian analysis techniques” in Proc.ACM SIGMETRICS, Banff, Canada,Jun. 2005, pp. 50–60.
ACTIhttp://www.hpl.hp.co.uk/personal/Norm an_Jouppi/cacti5.html,2010
“Skype testbed traces,” [Online]. Available: http://tstat.tlc.polito.it/ traces-skype.shtml
B. Dipert, “Special Purpose SRAM Smooth the Ride,” June 1999.
CACTI.http://www.hpl.hp.co.uk/persl/Nor an Jouppi/ cacti5.html, 2010.
D.A. Patterson and J.L. Hennessy, Computer Architecture: A Quantitative Approach,Morgan Kaufmann Publishers Inc., 1990.
H. Song, J. Turner, and S. Dharmapurikar, “Packet Classification Using Coarse-Grained Tuple Spaces,” Proc. ACM/IEEE Symp.Architecture for Networking and Comm. Systems (ANCS ’06), pp. 41-50, 2006.
H.C. Deke Guo, J. Wu, and X. Luo,“Theory and NetworkApplications of Dynamic Bloom Filters,”Proc.IEEE INFOCOM’06,pp. 1233-1242, 2006.
Hongbin Lu, Kai Zheng, Bin Liu, Xin Zhang, and Yunhao Liu, A Memory-Efficient Parallel String Matching Architecture for High- Speed Intrusion Detection. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS,VOL.24,NO.10,OCTOBER 2006
I. Kaya and T. Kocak, “Energy-Efficient Pipelined Bloom Filters for Network Intrusion Detection,” Proc. IEEE Int’l Conf. Comm.,pp. 2382-2387, 2006.
J.T. Sailesh Kumar and P. Crowley,Peacock Hashing: Deterministic and Updatable Hashing for High Performance Networking,”Proc. IEEE INFOCOM ’08, pp. 101-105, 2008.
Jan.van.Lunteren,High performance pattern matching for intrusion detection.Proceedings of Infocom’06, 2006.
L. Fan, P. Cao, J. Almeida, and A.Z. Broder, “Summary Cache: A Scalable Wide-Area Web Cache Sharing Protocol,” IEEE/ACM Trans. Networking, vol. 8, no. 3, pp. 281- 293,June 2000.
M. Mitzenmacher and S. Vadhan, “Why Simple Hash Functions Work: Exploiting the Entropy in a Data Stream,” Proc. 19th Ann.ACM-SIAMSymp.Discrete Algorithms (SODA ’08), pp. 746-755, 2008.
M.Waldvogel, G.Varghese, J.Turner, and B.Plattner,“Scalable High Speed IP Routing Lookups,”Proc.ACM SIGCOMM’97,pp. 25-36, 1997.
N. Cristianini and J. Shawe-Taylor, An Introduction to Support Vector Machines and Kernel-Based Learning Methods. New York: Cambridge Univ. Press, 1999.
S. Dharmapurikar and J. Lockwood, “Fast and Scalable Pattern Matching for Network Intrusion Detection Systems,” IEEE J. Selected Areas in Comm., vol. 24, no. 10, pp.1781-1792, Oct. 2006.
S. Dharmapurikar, P. Krishnamurthy, and D.E. Taylor, “Longest Prefix Matching Using Bloom Filters,” Proc. SIGCOMM ’03, pp. 201-212, 2003.
S. Dharmapurikar, P. Krishnamurthy,and D.E. Taylor, “Longest Prefix Matching Using Bloom Filters,” Proc. SIGCOMM’03, pp. 201-212, 2003.
S.Kumar and P.Crowley,“Segmented Hash:An Efficient Hash Table Implementation for High Performance Networking Subsystems,” Proc. ACM Symp. Architecture for Networking and Comm.Systems (ANCS ’05), pp. 91-103, 2005
T.S.SarangDharmapurikar,P.Krishnamurthy,andJ.Lockwood,“Deep Packet Inspection Using Parallel Bloom Filters,”Proc. 37th Ann. AC M/IEEEI nt’lSymp . Microarchitectuepp.52-61, 2004.
Tian Song, Wei Zhang, Dongsheng Wang,Yibo Xue, A Memory Efficient Multiple Pattern Matching Architecture for Network Security.Proceedings of IEEE Infocom, 2008
W. Li and A. Moore. A machine learning approach for efficient traffic classification.In Proc.IEEE MASCOTS, 2007.
W.-C.F.F.Chang and K. Li,“ApproximateCaches for Packet Classific ati on ,”Proc.IEEE INFOCOM ’04, vol. 4, pp. 2196-2207, Mar. 2004.
Wireshark Wireshark go deep.http ://www. wireshark.org/.
Associate Professor N. Kannaiya Raja
Arulmigu Meenakshi Amman College of Engg - India
Mr. K.Arulanandam
Ganadipathy Tulsi’s Jain, Engineering College, Vellore - India
Mr. P. Umadevi
Arulmigu Meenakshi Amman College of Engg - India
Mr. D.S.Praveen
Arulmigu Meenakshi Amman College of Engg - India

View all special issues >>