Techniques to identify applications based on network traffic
First Claim
1. A computer-implemented method, comprising:
- receiving a client application map, the client application map to represent installations of a plurality of different applications on a plurality of client devices;
receiving training network traffic from one or more network interface controllers, the training network traffic exchanged with at least some of the plurality of client devices;
generating a network profile map using machine learning based on the training network traffic and the client application map, the network profile map comprising a first association between a first application of the different applications to a first application-specific traffic pattern of network traffic produced by the first application and a second association between a second application of the different applications to a second application-specific traffic pattern of network traffic produced by the second application; and
using the network profile map to identify one or more of an installation prevalence, market penetration, time-period based usage, or frequency of use of the plurality of different applications in non-training network traffic.
3 Assignments
0 Petitions
Accused Products
Abstract
Techniques to identify applications based on network traffic are described. In one embodiment, an apparatus may comprise a client record component, a traffic monitoring component, a profiling component, and a traffic analysis component. The client record component may be operative to store a client application map, the client application map to represent installations of a plurality of applications on a plurality of client devices. The traffic monitoring component may be operative to monitor training network traffic and additional network traffic on one or more network interfaces, the training network traffic generated by the plurality of client devices. The profiling component may be operative to generate a network profile map using machine learning based on the training network traffic and the client application map. The traffic analysis component may be operative to identify one or more application of the plurality of applications. Other embodiments are described and claimed.
-
Citations
25 Claims
-
1. A computer-implemented method, comprising:
-
receiving a client application map, the client application map to represent installations of a plurality of different applications on a plurality of client devices; receiving training network traffic from one or more network interface controllers, the training network traffic exchanged with at least some of the plurality of client devices; generating a network profile map using machine learning based on the training network traffic and the client application map, the network profile map comprising a first association between a first application of the different applications to a first application-specific traffic pattern of network traffic produced by the first application and a second association between a second application of the different applications to a second application-specific traffic pattern of network traffic produced by the second application; and using the network profile map to identify one or more of an installation prevalence, market penetration, time-period based usage, or frequency of use of the plurality of different applications in non-training network traffic. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 25)
-
-
9. An apparatus, comprising:
-
a processor circuit; a client record component operative on the processor circuit to store a client application map, the client application map to represent installations of a plurality of different applications on a plurality of client devices; a traffic monitoring component operative on the processor circuit to monitor training network traffic on one or more network interface controllers, the training network traffic generated by at least some of the plurality of client devices; and a profiling component operative on the processor circuit to generate a network profile map using machine learning based on the training network traffic and the client application map, the network profile map comprising a first association between a first application of the different applications to a first application-specific traffic pattern of network traffic produced by the first application and a second association between a second application of the different applications to a second application-specific traffic pattern of network traffic produced by the second application, and operative to use the network profile map to identify one or more of an installation prevalence, market penetration, time-period based usage, or frequency of use of the plurality of different applications in non-training network traffic. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. At least one non-transitory computer-readable storage medium comprising instructions that, when executed, cause a system to:
-
receive a client application map, the client application map to represent installations of a plurality of different applications on a plurality of client devices; capture training network traffic for at least some of the plurality of client devices from one or more network interface controllers; generate a network profile map using machine learning based on the training network traffic and the client application map, the network profile map comprising a first association between a first application of the different applications to a first application-specific traffic pattern of network traffic produced by the first application and a second association between a second application of the different applications to a second application-specific traffic pattern of network traffic produced by the second application; and use the network profile map to identify one or more of an installation prevalence, market penetration, time-period based usage, or frequency of use of the plurality of different applications in non-training network traffic. - View Dependent Claims (17, 18, 19, 20)
-
-
21. A computer-implemented method, comprising:
-
receiving a network profile map, the network profile map comprising a first association between a first application of a plurality of different applications to a first application-specific traffic pattern of network traffic produced by the first application and a second association between a second application of the different applications to a second application-specific traffic pattern of network traffic produced by the second application; receiving additional network traffic; identifying one or more applications of the plurality of different applications as having contributed to the additional network traffic based on the network profile map; and using the network profile map to identify one or more of an installation prevalence, market penetration, time-period based usage, or frequency of use of the plurality of different applications in the additional network traffic. - View Dependent Claims (22, 23, 24)
-
Specification