Skip to main content
Log in

An early recognition algorithm for BitTorrent traffic based on improved K-means

  • Published:
Journal of Central South University of Technology Aims and scope Submit manuscript

Abstract

In response to the deficiencies of BitTorrent, the concept of density radius was proposed, and the distance from the maximum point of radius density to cluster center as a cluster radius was taken to solve the too large cluster radius resulted from the discrete points and to reduce the false positive rate of early recognition algorithms. Simulation results show that in the actual network environment, the improved algorithm, compared with K-means, will reduce the false positive rate of early identification algorithm from 6.3% to 0.9% and has a higher operational efficiency.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. SEN S, WANG J. Analyzing peer-to-peer trafficacross large networks [J]. IEEE/ACM Transactions on Networking, 2004, 12(2): 219–232.

    Article  Google Scholar 

  2. Ernesto. Bittorrent continues to dominate internet traffic [EB/OL]. 2009-04-20. http://torrentfreak.com/bittorrent-dominates-internet-traffic-070901/.

  3. KARAGIANNIS T, BROIDO A, BROWNLEE N, CLAFFY K, FALOUTSOS M. Is P2P dying or just hiding? [C]// Proceeding of Global Telecommunications Conference 2004. New York: ACM Press, 2004: 1532–1538.

    Google Scholar 

  4. LI Jiang-tao, JIANG Yong-ling. Survey of P2P traffic identification and engineering technology [J]. Telecommunications Science, 2005, 21(3): 57–61. (in Chinese)

    Google Scholar 

  5. MADHUKAR A, WILLIAMSON C. A longitudinal study of P2P traffic classification [C]// Proceedings of the International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems. Heidelberg: Springer, 2006: 179–188.

    Google Scholar 

  6. SEN S, SPATSCHECK O, WANG D. Accurate, scalable in-network identification of P2P traffic using application signatures [C]// Proceedings of the 13th International Conference on World Wide Web. New York: ACM Press, 2004: 512–521.

    Google Scholar 

  7. LIU Gang, FANG Bin-xing, HU Ming-zeng, ZHANG Hong-li. Capture method and self-similarity assess of bittorrent traffic [J]. Application Research of Computers, 2006, 23(5): 205–206. (in Chinese)

    Google Scholar 

  8. DU Li, YU Jun-xiang, WANG Xiao-jing. A coarse-grained differentiated routing algorithm inmulti-protocol label switching traffic engineering [J]. Journal of Central South University: Science and Technology, 2010, 17(6): 1258–1263. (in Chinese)

    Article  Google Scholar 

  9. ZANDER S, NGUYEN T, ARMITAGE G. Automated traffic classification and application identification using machine learning [C]// Proceedings of the IEEE Conference on Local Computer Networks 30th Anniversary. Sydney: IEEE Society, 2005: 250–257.

    Chapter  Google Scholar 

  10. EKMAN J, ARLITT M, MAHANTI A. Traffic classification using clustering algorithms [C]// Proceedings of the Special Interest Group on Data Communication. New York: ACM Press, 2006: 281–286.

    Google Scholar 

  11. KARAGIANNIS T, PAPAGIANNAKI D, FALOUTSOS M. Blinc: Multilevel traffic classification in the dark [C]// Proceedings of the 2005 SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication. New York: ACM Press, 2005: 229–240.

    Chapter  Google Scholar 

  12. MCGREGOR A, HALL M, LORIER P, BRUNSKILL J. Flow clustering using machine learning techniques [C]// Proceedings of the Personalised Ambient Monitoring. Heidelberg: Springer, 2005: 205–214.

    Google Scholar 

  13. JUNIOR G P S, MAIA J E B, HOLANDA R, DE SOUSA J N. P2P Traffic identification using cluster analysis [C]// Proceedings of the International Symposium on Global Information Infrastructure. New York, 2007: 128–133.

  14. LU Gang, ZHANG Hong-Li, YE Lin. P2P traffic identification [J]. Journal of Software, 2011, 22(6): 1281–1298. (in Chinese)

    Article  Google Scholar 

  15. BERNAILLE L, TEIXEIRA R. Early recognition of encrypted applications [C]// Proceedings of the International Symposium on Passive and Active Measurement. Heidelberg: Springer, 2007: 165–175.

    Google Scholar 

  16. BERNAILLE L, TEIXEIRA R, SALAMATIAN K. Early application identification [C]// Proceedings of the 2006 ACM CoNEXT Conference. New York: ACM Press, 2006: 70–82.

    Google Scholar 

  17. BERNAILLE L, TEIXEIRA R, AKODKENOU I, SOULE A, SALAMATIAN K. Traffic classification on the fly [C]// Proceedings of the Special Interest Group on Data Communication. New York: ACM Press, 2006: 23–26.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Li-jun Cai  (蔡立军).

Additional information

Foundation item: Project(2011FJ3034) supported by the Planned Science and Technology Program of Hunan Province, China; Project(61070194) supported by the National Natural Science Foundation of China

Rights and permissions

Reprints and permissions

About this article

Cite this article

Rong, Hg., Li, Mw. & Cai, Lj. An early recognition algorithm for BitTorrent traffic based on improved K-means. J. Cent. South Univ. Technol. 18, 2061–2067 (2011). https://doi.org/10.1007/s11771-011-0943-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11771-011-0943-8

Key words

Navigation