Skip to main content
USENIX
  • Conferences
  • Students
Sign in
  • LEET '12 Home
  • Registration Information
  • Organizers
  • Workshop Program
  • Hotel & Travel Information
  • Students
  • Questions?
  • For Participants
  • Call for Papers
  • Past Proceedings

sponsors

General Sponsor

twitter

Tweets by @usenix

usenix conference policies

  • Event Code of Conduct
  • Conference Network Policy
  • Statement on Environmental Responsibility Policy

You are here

Home » Challenges in Network Application Identification
Tweet

connect with us

http://twitter.com/usenix

Challenges in Network Application Identification

Authors: 

Alok Tongaonkar, Ram Keralapura, and Antonio Nucci, Narus, Inc.

Abstract: 

The evolution of the Internet in the last few years has been characterized by dramatic changes to the way users behave, interact and utilize the network. This has posed new challenges to network operators. To deal with the increasing number of threats to enterprise networks, operators need greater visibility and understanding of the applications running in their networks. In years gone by, the biggest challenge in network application identification used to be of providing real-time classification at increasing wire speeds. But now the operators are facing another challenge - the ability to keep pace with the tremendous rate of development of new applications. This problem can be attributed largely to the explosive growth in the number of web and mobile applications. This combined with application hiding techniques like encryption, port abuse, and tunneling have rendered the traditional approaches for application identification ineffective. In this paper, we discuss the challenges facing the network operators and the limitations of current state of the art approaches in both the commercial and the research world in solving these problems.

 

Alok Tongaonkar, Narus, Inc.

Ram Keralapura, Narus, Inc.

Antonio Nucci, Narus, Inc.

Open Access Media

USENIX is committed to Open Access to the research presented at our events. Papers and proceedings are freely available to everyone once the event begins. Any video, audio, and/or slides that are posted after the event are also free and open to everyone. Support USENIX and our commitment to Open Access.

BibTeX
@inproceedings {181294,
author = {Alok Tongaonkar and Ram Keralapura and Antonio Nucci},
title = {Challenges in Network Application {Identification}},
booktitle = {5th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 12)},
year = {2012},
address = {San Jose, CA},
url = {https://www.usenix.org/conference/leet12/workshop-program/presentation/tongaonkar},
publisher = {USENIX Association},
month = apr,
}
Download
Tongaonkar PDF

Presentation Video

Presentation Audio

MP3 Download OGG Download

Download Audio

  • Log in or    Register to post comments

General Sponsors

© USENIX

  • Privacy Policy
  • Contact Us