Abstract
In order to reveal the influence of different traffic classes on the Internet, backbone traffic was collected within an eight month period on backbone links of the Swedish University Network (SUNET). The collected data was then classified according to network application. In this study, three traffic classes (P2P, Web and malicious) are compared in terms of traffic volumes and signaling behavior. Furthermore, longitudinal trends and diurnal differences are highlighted. It is shown that traffic volumes are increasing considerably, with P2P-traffic clearly dominating. In contrast, the amount of malicious and attack traffic remains constant, even not exhibiting diurnal patterns. Next, P2P and Web traffic are shown to differ significantly in connection establishment and termination behavior. Finally, an analysis of TCP option usage revealed that Selective Acknowledgment (SACK), even though deployed by most web-clients, is still neglected by a number of popular web-servers.
This is a preview of subscription content, access via your institution.
Buying options
Preview
Unable to display preview. Download preview PDF.
References
Moore, A.W., Papagiannaki, K.: Toward the Accurate Identification of Network Applications. In: Dovrolis, C. (ed.) PAM 2005. LNCS, vol. 3431, pp. 41–54. Springer, Heidelberg (2005)
Sen, S., Spatscheck, O., Wang, D.: Accurate, scalable in-network identification of p2p traffic using application signatures. In: WWW 2004: Proceedings of the 13th Int. World Wide Web Conference, New York, USA (2004)
Crotti, M., Dusi, M., Gringoli, F., Salgarelli, L.: Traffic classification through simple statistical fingerprinting. Computer Communication Review 37 (2007)
Karagiannis, T., Broido, A., Faloutsos, M., Claffy, K.: Transport layer identification of p2p traffic. In: IMC 2004: Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, Taormina, Sicily, Italy (2004)
Gerber, A., Houle, J., Nguyen, H., Roughan, M., Sen, S.: P2p the gorilla in the cable. National Cable and Telecommunications Association (2003)
Sen, S., Jia, W.: Analyzing peer-to-peer traffic across large networks. IEEE/ACM Transactions on Networking 12 (2004)
Mori, T., Uchida, M., Goto, S.: Flow analysis of internet traffic: World wide web versus peer-to-peer. Systems and Computers in Japan 36 (2005)
Perenyi, M., Trang Dinh, D., Gefferth, A., Molnar, S.: Identification and analysis of peer-to-peer traffic. Journal of Communications 1 (2006)
John, W., Tafvelin, S.: Heuristics to classifiy internet backbone traffic based on connection patterns. In: ICOIN 2008: Proceedings of the 22nd International Conference on Information Networking, Busan, Korea (2008)
Plissonneau, L., Costeux, J.L., Brown, P.: Analysis of peer-to-peer traffic on adsl. In: Dovrolis, C. (ed.) PAM 2005. LNCS, vol. 3431, pp. 69–82. Springer, Heidelberg (2005)
John, W., Tafvelin, S.: (SUNET OC 192 Traces (collection)), http://imdc.datcat.org/collection/1-04L9-9=SUNET+OC+192+Traces
John, W., Tafvelin, S.: Analysis of internet backbone traffic and header anomalies observed. In: IMC 2007: Proceedings of the 7th ACM SIGCOMM conference on Internet measurement, San Diego, CA, USA (2007)
Arlitt, M., Williamson, C.: An analysis of tcp reset behaviour on the internet. Computer Communication Review 35 (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
John, W., Tafvelin, S., Olovsson, T. (2008). Trends and Differences in Connection-Behavior within Classes of Internet Backbone Traffic. In: Claypool, M., Uhlig, S. (eds) Passive and Active Network Measurement. PAM 2008. Lecture Notes in Computer Science, vol 4979. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-79232-1_20
Download citation
DOI: https://doi.org/10.1007/978-3-540-79232-1_20
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-79231-4
Online ISBN: 978-3-540-79232-1
eBook Packages: Computer ScienceComputer Science (R0)