TY - JFULL AU - Yuji Waizumi and Yuya Tsukabe and Hiroshi Tsunoda and Yoshiaki Nemoto PY - 2009/1/ TI - Network Application Identification Based on Communication Characteristics of Application Messages T2 - International Journal of Information and Communication Engineering SP - 2394 EP - 2400 VL - 3 SN - 1307-6892 UR - https://publications.waset.org/pdf/7713 PU - World Academy of Science, Engineering and Technology NX - Open Science Index 36, 2009 N2 - A person-to-person information sharing is easily realized by P2P networks in which servers are not essential. Leakage of information, which are caused by malicious accesses for P2P networks, has become a new social issues. To prevent information leakage, it is necessary to detect and block traffics of P2P software. Since some P2P softwares can spoof port numbers, it is difficult to detect the traffics sent from P2P softwares by using port numbers. It is more difficult to devise effective countermeasures for detecting the software because their protocol are not public. In this paper, a discriminating method of network applications based on communication characteristics of application messages without port numbers is proposed. The proposed method is based on an assumption that there can be some rules about time intervals to transmit messages in application layer and the number of necessary packets to send one message. By extracting the rule from network traffic, the proposed method can discriminate applications without port numbers. ER -