Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and unit for classifying traffic in IP networks

A business and equipment technology, applied in the field of IP telecommunication network or enterprise network, which can solve the problems of inability to distinguish work files, work files, legal provision, and large number of downloads.

Inactive Publication Date: 2014-02-12
ALCATEL LUCENT SAS
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Second, the number of potentially illegal downloads is very large
Thus, for example, the Superior Court of Paris (Case No. 0504090091) recognized in its judgment of December 8, 2005 that the peer-to-peer software kazaa, which allows access to more than one billion music files, cannot distinguish between copyrighted work files and Work files in the public domain
[0009] Fifth, general-purpose processing of Internet streams cannot cope with privacy-preserving legally provided
Filtering on Internet user stations cannot observe and analyze traffic or systematically filter streams or locate radar

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and unit for classifying traffic in IP networks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] describe first figure 1 .

[0053] For example data stream 1 of Internet traffic is captured. This capture FO is for example performed with or by packet capture software, such as tcpdump or wireshark, which recognizes the most commonly used protocols, such as Winpcap. Where applicable, all traffic is replicated eg at routers.

[0054] In order to simplify the description, in the remainder of this specification, it is considered that the captured Internet traffic includes two types of traffic, namely:

[0055] - a service that is not a service of the application to be characterized,

[0056] - Encrypted traffic (which is therefore not detectable by the DPI), or whose signature is unknown and whose decision tree is initially generated statistically, so that this traffic can be subsequently detected. This can be the case for disrupted traffic of eMule peer-to-peer applications.

[0057] After capturing F0, the captured elements are stored in two databases 2, 3, each c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The method involves capturing a data flow (1) e.g. Internet traffic, and performing deep packet inspection. Predetermined parameters e.g. packet size, are extracted from the captured data flow. Traffics are classified using a decision tree e.g. C4.5 or C5.0 type decision tree, while concerning the traffics e.g. encrypted traffics, that are not identified by the inspection operation. The decision tree is generated by a generation module (7). An independent claim is also included for an installation for classifying traffics on a telecommunication network.

Description

technical field [0001] The present invention relates to the field of IP telecommunication networks or enterprise networks, in particular to traffic control with respect to identification, classification and filtering applications. [0002] The invention relates in particular to techniques for classifying applications with encrypted streams, such as peer-to-peer applications (in particular VoIP Skype), corporate VPNs (Virtual Private Networks), applications for https tunneling. Background technique [0003] Although technically possible, open, free and unrestricted access to copyrighted works is illegal, economically dangerous and must be eliminated. While Napster does not allow the sharing of music files in MP3 format, the peer-to-peer network currently specifically allows the exchange of videos, games and software. High speed means that a long movie can be downloaded in a few minutes. [0004] Evidence of illegal downloading is difficult to establish for legal and technic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/26H04L12/24H04L29/06
CPCH04L43/026H04L41/142H04L43/18H04L63/0227H04L63/1416
Inventor L·可勒维A·马丁H·艾拉-阿比德A·安西奥
Owner ALCATEL LUCENT SAS