P2P Network Traffic Identification Technologies for Internet

Chapter
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 127)

Abstract

The explosion of P2P file sharing brings such serious problems as network congestion and traffic hindrance caused by excessive occupation of the bandwidth, including the hidden trouble in security. ISP and network operators need to manage P2P traffic to ensure the performance of traditional applications. To accomplish this goal, the system must first identify the P2P traffic. This paper describes the principal P2P traffic identification technologies and indicates the advantages and disadvantages of the P2P traffic identification methods. A variety of methods are combined to detect P2P flow more effectively.

Keywords

Traffic Characteristic Deep Packet Inspection Traffic Identification Internet Traffic Classification Default Port 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Spatscheck, O., Wang, D.: Accurate, Scalable in-network identification of P2P traffic using application signatures. In: Proceedings of the 13th International Conference on World Wide Web, pp. 512–521. ACM Press, New York (2004)Google Scholar
  2. 2.
    Wang, R., Yang, L., Yang, Y., et al.: Solving the app-level classification problem of P2P traffic via optimized support vector machines. In: Proceedings of the 6th International Conference on Intelligent Systems Design and Applications, pp. 534–539. IEEE Computer Society Press, Jinan (2006)CrossRefGoogle Scholar
  3. 3.
    Ohzahata, S., Hagiwara, Y., Terada, M., Kawashima, K.: A traffic identification method and evaluations for a pure P2P application. In: Dovrolis, C. (ed.) PAM 2005. LNCS, vol. 3431, pp. 55–68. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  4. 4.
    Kang, H.J., Kim, M.S., Hong, J.W.: Streaming media and multimedia conferencing traffic analysis using payload examination. ETRI Journal 26(3), 203–217 (2004)CrossRefGoogle Scholar
  5. 5.
    Moore, A.W., Zuev, D.: Internet Traffic Classification Using Bayesian Analysis Techniques. In: ACM SIGMETRICS 2005., pp. 50–60. ACM Press, Banff (2005)CrossRefGoogle Scholar
  6. 6.
    Auld, T., Moore, A.W., Gull, S.F.: Bayesian neural networks for Internet traffic classification. IEEE Transactions on Neural Networks, 223–239 (2007)Google Scholar
  7. 7.
    Constantinou, F., Mavrommatis, P.: Identifying known and unknown peer-to-peer traffic. In: Fifth IEEE International Symposium On Network Computing and Applications, pp. 93–102. IEEE Xplore, Cambridge (2006)CrossRefGoogle Scholar
  8. 8.
    Thomas, K., Broido, A., Faloutsos, M.: Transport layer identification of P2P traffic. In: Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement, pp. 121–134. ACM Press, Taormina (2004)Google Scholar
  9. 9.
    Collins, M.P., Reiter, M.K.: Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol. 4189, pp. 1–17. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  10. 10.
    Zhou, L., Li, Z., Liu, B.: P2P traffic identification by TCP flow analysis. In: Proceedings of International Workshop on Networking, Architecture, and Storages 2006, pp. 47–50. IEEE Computer Society Press, Shenyang (2006)CrossRefGoogle Scholar
  11. 11.
    Karagiannis, T., Papagiannaki, K., Faloutsos, M.: Blinc: multilevel traffic classification in the dark. In: Proceeding of the 2005 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, pp. 229–240. ACM Press, Los Angeles (2005)Google Scholar
  12. 12.
    Saroiu, S., Gummadi, P.K., Gribble, S.D.: A measurement study of peer-to-peer file sharing systems. In: Proceeding of the Multimedia Computing and Networking 2002, pp. 156–170. ACM Press, San Jose (2002)Google Scholar

Copyright information

© Springer-Verlag GmbH Berlin Heidelberg 2012

Authors and Affiliations

  1. 1.Chinese People’s Armed Police Forces AcademyLangfangChina

Personalised recommendations