International Journal of Computer Science and Telecommunications
In this paper, the authors present a solution to distinguish the different applications running on port 80 with HTTP protocol; from that helping firewall to detect the attack and to try to prevent it. This paper is relatively a typical problem; by there are many different applications such as game, and download, video, etc. are running on HTTP port 80. Filtering based only on port 80 would not realize which application is un-allowed and which application is allowed.