Skip to main content

P2P Protocol Analysis and Blocking Algorithm

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3481))

Abstract

P2P (Peer to Peer) technology provides methods for overcoming many weak points of conventional client-server mechanism, and consequently, many efforts in many fields are made to apply it. On the other side of the coin, these strong points of the P2P technology have been used for bad purposes, causing many problems and concerns. This paper proposes a method to block P2P applications fundamentally in order to eliminate illegal data or files. We use Ethereal, a reliable network packet analysis tool, and analyze the packets receive and send when P2P applications run. Then, in this paper we examine the packet architecture and characteristics of each P2P application, and propose the algorithms that can block P2P applications. When being used for blocking up P2P applications, these proposed algorithms can play important roles in reducing excessive P2P traffic and illegal data sharing.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Graham, I.D., Cleary, J.G.: Cell level measurements of ATM traffic. In: Proceedings of the Australian Telecommunications Networks and Applications Conference, December 1996, pp. 495–500 (1996)

    Google Scholar 

  2. Cisco, White Paper, NetFlow Services and Applications, http://www.cisco.com/warp/public/cc/pd/iosw/ioft/netflct/tech/napps_wp.htm

  3. Phaal, P., Panchen, S., McKee, N.: InMon Corporation’s sFlow: A Method for Monitoring Traffic in Switched and Routed Networks. IETF RFC 3176 (September 2001)

    Google Scholar 

  4. Brownlee, N., Mills, C., Ruth, G.: Traffic Flow Measurement: Architecture. IETF RFC 2722 (October 1999)

    Google Scholar 

  5. Argus, http://www.qosient.com/argus/

  6. Han, S.-H., Kim, M.-S., Ju, H.-T., Hong, J.W.: The Architecture of NG-MON: A Passive Network Monitoring System. In: Feridun, M., Kropf, P.G., Babin, G. (eds.) DSOM 2002. LNCS, vol. 2506. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  7. 소리바다, http://www.soribada.com/

  8. Napster, http://www.napster.com/

  9. Gnutella, http://gnutella.wego.com/

  10. MSN Messenger, Microsoft, http://messenger.msn.co.kr/

  11. Yahoo Messenger Yahoo, http://kr.messenger.yahoo.com/

  12. eDonkey2000, http://www.edonkey2000.com/

  13. Ripeanu, M.: Peer-to-Peer Architecture Case Study: Gnutella Network, Techreports TR-2001-26, University of Chicago (July 2001)

    Google Scholar 

  14. Sen, S., Wang, J.: Analyzing Peer-to-Perr Traffic Across Large Networks. In: IMW 2002 Workshop (2002)

    Google Scholar 

  15. AOL, http://www.aol.com/

  16. Kang, H.-J., Ju, H.-T., Kim, M.-S., Hong, J.W.: Towards Streaming Media Traffic Monitoring and Analysis. In: APNOM 2002, pp. 503–504 (2002)

    Google Scholar 

  17. Ethereal, http://www.ethereal.com/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hwang, SM. (2005). P2P Protocol Analysis and Blocking Algorithm. In: Gervasi, O., et al. Computational Science and Its Applications – ICCSA 2005. ICCSA 2005. Lecture Notes in Computer Science, vol 3481. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11424826_3

Download citation

  • DOI: https://doi.org/10.1007/11424826_3

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-25861-2

  • Online ISBN: 978-3-540-32044-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics