groups. Since DNS is a stateless protocol, flows with
truncated packets can still be detected. On the other
side, as web is a stateful protocol, the detection of
web flows drops for truncated packets. Though not
shown, FTP results also were different since FTP
protocol has a special behaviour.
Therefore, we can conclude that stateless
protocols are less sensitive to payload truncation
than stateful ones. Thus, optimizing DPI/DFI
methods through payload truncation could be more
effective for stateless and P2P protocols.
For interpreting the differences between flow and
packet results for the same protocol, flow results are
considered more significant since undetected flows
may contain a huge number of packets thus affecting
packet accuracy. We also noticed that flows detected
at higher truncation length mostly contain a huge
number of packets.
6 CONCLUSIONS AND FUTURE
WORK
The effects of truncating packet payloads when
using OpenDPI are explored in this paper. The
experiments has shown that, unless just few bytes
(not more than 128 Bytes) were truncated from the
end of the packet payload, payload truncation for
this method will lead to many unknown packets and
flows decreasing the accuracy of the classification.
The obvious interpretation is that by combining DPI
with other technologies (such as behavioural and
statistical modeling), the task of DPI optimization
through truncation may render the identification
method itself inefficient since the non parsed part of
the data may still be needed for the other added
technology. The truncation can still be useful as an
optimization if, instead of classifying all the traffic,
the target is to select some of them based on the
application content and depending on the nature of
the associated protocol.
An apparent contradiction emerged between the
combination of identification technologies and the
optimization through partial payload inspection
procedures. Tradeoffs should be most probably one
of the next steps to explore. Additional experiments
have to be carried out to analyze the sensitivity to
flow truncation, that is, to consider just a selected
number of packets per flow.
ACKNOWLEDGEMENTS
This work has been supported by Spanish MICINN
under project TEC2008-06663-C03-02.
REFERENCES
Aceto, G., Dainotti, A., de Donato, W., Pescapé, A., 2010.
PortLoad: taking the best of two worlds in traffic
classification, In Proc. of IEEE INFOCOM 2010.
Allot Communications, 2007. Digging Deeper Into Deep
Packet Inspection (DPI). White paper. Available at
http://www.dpacket.org
Carela-Español, V., Barlet-Ros, P., Cabellos-Aparicio, A.,
Solé-Pareta, J., 2010. Analysis of the impact of
sampling on NetFlow traffic classification, Computer
Network (In press), Elsevier.
Dehghani, F., Movahhedinia, N., Khayyambashi, M. R.,
Kianian, S., 2010. Real-time Traffic Classification
Based on Statistical and Payload Content Features, In
Proc. IWISA 2010, pp. 1-4.
Fernandes, S., Antonello, R., Lacerda, T., Santos, A.,
Sadok, D., Westholm, T., 2009. Slimming Down Deep
Packet Inspection Systems, In Proc. INFOCOM
Workshops 2009, pp. 1-6.
Ficara, D., Antichi, G., Di Pietro, A., Giordano, S.,
Procissi, G., Vitucci, F., 2010. Sampling Techniques
to Accelerate Pattern Matching in Network Intrusion
Detection Systems, In Proc. 2010 ICC2010, pp. 1-5.
Ipoque, 2011. http://www.ipoque.com/
Jurga, R. E., Hulbój, M. M., 2008. Packet Sampling for
Network Monitoring, Technical Report, CERN | HP
Procurve openlab project. Available at http://www.zd
netasia.com/whitepaper/packet-sampling-for-network-
monitoring_wp-1828217.htm
La Mantia, G., Rossi, D., Finamore, A., Mellia, M., Meo,
M., 2010. Stochastic Packet Inspection for TCP
Traffic. In Proc. ICC2010, pp. 1-6.
Lin, P., Lin, Y., Lee, T., Lai, Y., 2008. Using String
Matching for Deep Packet Inspection. IEEE
Computer, vol. 41, pp. 23-28.
L7filter, 2011. http://l7-filter.clearfoundation.com/
Nguyen, T., Armitage, G., 2007. A Survey of Techniques
for Internet Traffic Classification using Machine
Learning, IEEE Communications Surveys & Tutorials,
vol. 10, pp. 56-76.
Opendpi, 2011. http://www.opendpi.org/
Rao, A., Udupa, P., 2010. A Hardware Accelerated
System For Deep Packet Inspection, In Proc.
MEMOCODE’10, pp. 89-92.
Snort, 2011. http://www.snort.org
Yang, Y.-H. E., Hoang Le,Prasanna, V. K., 2010. High
Performance Dictionary-Based String Matching for
Deep Packet Inspection. In Proc. of INFOCOM 2010,
pp. 1-5.
Wang, C., Zhou, X., You, F., Chen, H., 2008. Design of
P2P Traffic Identification Based on DPI and DFI, In
Proc. of CNMT2009, pp. 1-4.
Zhang, L., 2010. P2P-based Weighted Behavioral
Characteristics Of Deep Packet Inspection Algorithm,
In Proc. of CMCE 2010, pp. 468-470.
DCNET 2011 - International Conference on Data Communication Networking
56