TY - JOUR
T1 - An improved TCP protocol machine for flow analysis and network monitoring
AU - Khosravi, Heshmatollah
AU - Fukushima, Masaki
AU - Goto, Shigeki
PY - 2003/2
Y1 - 2003/2
N2 - In the Internet, flow analysis and network monitoring have been studied by various methods. Some methods try to make TCP (Transport Control Protocol) traces more readable by showing them graphically. Others such as MRTG, NetScope, and NetFlow read the traffic counters of the routers and record the data for traffic engineering. Even if all of the above methods are useful, they are made only to perform a single task. This paper describes an improved TCP Protocol Machine, a multipurpose tool that can be used for flow analysis, intrusion detection and link congestion monitoring. It is developed based on a finite state machine (automation). The machine separates the flows into two main groups. If a flow can be mapped to a set of input symbols of the automation, it is valid, otherwise it is invalid. It can be observed that intruders' attacks are easily detected by the use of the protocol machine. Also link congestion can be monitored, by measuring the percentage of valid flows to the total number of flows. We demonstrate the capability of this tool through measurement and working examples.
AB - In the Internet, flow analysis and network monitoring have been studied by various methods. Some methods try to make TCP (Transport Control Protocol) traces more readable by showing them graphically. Others such as MRTG, NetScope, and NetFlow read the traffic counters of the routers and record the data for traffic engineering. Even if all of the above methods are useful, they are made only to perform a single task. This paper describes an improved TCP Protocol Machine, a multipurpose tool that can be used for flow analysis, intrusion detection and link congestion monitoring. It is developed based on a finite state machine (automation). The machine separates the flows into two main groups. If a flow can be mapped to a set of input symbols of the automation, it is valid, otherwise it is invalid. It can be observed that intruders' attacks are easily detected by the use of the protocol machine. Also link congestion can be monitored, by measuring the percentage of valid flows to the total number of flows. We demonstrate the capability of this tool through measurement and working examples.
KW - Finite state machine (FSM)
KW - Intrusion detection
KW - Invalid flow
KW - Network congestion
KW - TCP protocol machine
UR - http://www.scopus.com/inward/record.url?scp=0042510234&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=0042510234&partnerID=8YFLogxK
M3 - Article
AN - SCOPUS:0042510234
SN - 0916-8516
VL - E86-B
SP - 595
EP - 603
JO - IEICE Transactions on Communications
JF - IEICE Transactions on Communications
IS - 2
ER -