Accurate Classification of P2P Traffic by Clustering Flows

被引:0
|
作者
He Jie [1 ]
Yang Yuexiang [2 ]
Qiao Yong [1 ]
Tang Chuan [2 ]
机构
[1] Natl Univ Def Technol, Coll Comp, Changsha 410073, Hunan, Peoples R China
[2] Natl Univ Def Technol, Informat Ctr, Changsha 410073, Hunan, Peoples R China
基金
中国国家自然科学基金;
关键词
traffic classification; P2P; fine-grained; support vector machine;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
P2P traffic has always been a dominant portion of Internet traffic since its emergence in the late 1990s. The method used to accurately classify P2P traffic remains a key problem for Internet Service Producers (ISPs) and network managers. This paper proposes a novel approach to the accurate classification of P2P traffic at a fine-grained level, which depends solely on the number of special flows during small time intervals. These special flows, named Clustering Flows (CFs), are defined as the most frequent and steady flows generated by P2P applications. Hence we are able to classify P2P applications by detecting the appearance of corresponding CFs. Compared to existing approaches, our classifier can realise high classification accuracy by exploiting only several generic properties of flows, instead of extracting sophisticated features from host behaviours or transport layer data. We validate our framework on a large set of P2P traffic traces using a Support Vector Machine (SVM). Experimental results show that our approach correctly classifies P2P applications with an average true positive rate of above 98% and a negligible false positive rate of about 0.01%.
引用
收藏
页码:42 / 51
页数:10
相关论文
共 50 条
  • [31] Abacus: Accurate behavioral classification of P2P-TV traffic
    Bermolen, Paola
    Mellia, Marco
    Meo, Michela
    Rossi, Dario
    Valenti, Silvio
    COMPUTER NETWORKS, 2011, 55 (06) : 1394 - 1411
  • [32] The method of P2P traffic detecting for P2P harmful contents prevention
    Lee, HG
    Nam, TY
    Jang, JS
    7th International Conference on Advanced Communication Technology, Vols 1 and 2, Proceedings, 2005, : 777 - 780
  • [33] On the resilience of P2P botnet footprints in the presence of legitimate P2P traffic
    Daneshgar, Fateme Faraji
    Abbaspour, Maghsoud
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (13)
  • [34] Identifying P2P traffic: A survey
    Max Bhatia
    Mritunjay Kumar Rai
    Peer-to-Peer Networking and Applications, 2017, 10 : 1182 - 1203
  • [35] Survey on P2P Traffic Managements
    Luo, Yingru
    PROCEEDINGS OF THE 2011 2ND INTERNATIONAL CONGRESS ON COMPUTER APPLICATIONS AND COMPUTATIONAL SCIENCE, VOL 2, 2012, 145 : 191 - 196
  • [36] Profiling and identification of P2P traffic
    Hu, Yan
    Chiu, Dah-Ming
    Lui, John C. S.
    COMPUTER NETWORKS, 2009, 53 (06) : 849 - 863
  • [37] Traffic Anomaly Detection in the Presence of P2P Traffic
    Ali, Sardar
    Wu, Kui
    Khan, Hassan
    2014 IEEE 39TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2014, : 482 - 485
  • [38] Identifying P2P traffic: A survey
    Bhatia, Max
    Rai, Mritunjay Kumar
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2017, 10 (05) : 1182 - 1203
  • [39] A Novel Method of P2P Traffic Classification Based on TCP Flow Analysis
    Peng Jiangfen
    Zhou Yajian
    Wang Cong
    Yang Yixian
    2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL II, 2010, : 492 - 495
  • [40] File-aware P2P traffic classification: An aid to network management
    Song, Tian
    Zhou, Zhou
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2013, 6 (03) : 325 - 339