Classification of P2P and HTTP Using Specific Protocol Characteristics

被引:0
|
作者
Hurley, John [1 ]
Garcia-Palacios, Emi [1 ]
Sezer, Sakir [1 ]
机构
[1] Queens Univ Belfast, Inst Elect Commun & Informat Technol ECIT, Belfast BT7 1NN, Antrim, North Ireland
来源
INTERNET OF THE FUTURE | 2009年 / 5733卷
基金
英国工程与自然科学研究理事会;
关键词
Traffic Classification; P2P; HTTP;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A key aspect of traffic classification is the early identification of individual flows which may utilise strategies such as ephemeral ports and transport later encryption to 'hide' on the network. This paper focuses on P2P and HTTP - the two main producers of network traffic - to determine the characteristics of their individual flows. We propose a heuristic based classification system to distinguish HTTP and P2P flows using only the structure of how packets are passed and the lengths of the individual packets. The classification system is then tested on real network traffic and results presented to show it can accurately detect P2P and HTTP within the early part of a TCP flow.
引用
收藏
页码:31 / 40
页数:10
相关论文
共 50 条
  • [1] HTTP(P2P): A transaction based (HTTP) peer-to-peer protocol for the dissemination of web-objects in congested networks
    Mattson, RLR
    Ghosh, S
    2004 IEEE INTERNATIONAL SYMPOSIUM ON CLUSTER COMPUTING AND THE GRID - CCGRID 2004, 2004, : 174 - 181
  • [2] P2P Traffic Classification Using Clustering Technology
    Tseng, Chuan-Mu
    Huang, Guo-Tai
    Liu, Tzong-Jye
    2016 IEEE/SICE INTERNATIONAL SYMPOSIUM ON SYSTEM INTEGRATION (SII), 2016, : 174 - 179
  • [3] P2P and P2P botnet traffic classification in two stages
    Ye, Wujian
    Cho, Kyungsan
    SOFT COMPUTING, 2017, 21 (05) : 1315 - 1326
  • [4] P2P and P2P botnet traffic classification in two stages
    Wujian Ye
    Kyungsan Cho
    Soft Computing, 2017, 21 : 1315 - 1326
  • [5] Analysis of P2P, IRC and HTTP traffic for botnets detection
    Basil AsSadhan
    Abdulmuneem Bashaiwth
    Jalal Al-Muhtadi
    Saleh Alshebeili
    Peer-to-Peer Networking and Applications, 2018, 11 : 848 - 861
  • [6] Analysis of P2P, IRC and HTTP traffic for botnets detection
    AsSadhan, Basil
    Bashaiwth, Abdulmuneem
    Al-Muhtadi, Jalal
    Alshebeili, Saleh
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2018, 11 (05) : 848 - 861
  • [7] Application-level multicast using P2P protocol
    Kim, G
    Han, D
    Son, Y
    Kim, K
    ICOMP '05: Proceedings of the 2005 International Conference on Internet Computing, 2005, : 354 - 360
  • [8] Online Game Protocol for P2P Using Byzantine Agreement
    Wada, Daisuke
    Kitagawa, Junichiro
    Kobayashi, Hiromi
    2009 SECOND INTERNATIONAL CONFERENCE ON THE APPLICATIONS OF DIGITAL INFORMATION AND WEB TECHNOLOGIES (ICADIWT 2009), 2009, : 753 - 758
  • [9] P2P RVM for Distributed Classification
    Khan, Muhammad Umer
    Nanopoulos, Alexandros
    Schmidt-Thieme, Lars
    DATA SCIENCE, LEARNING BY LATENT STRUCTURES, AND KNOWLEDGE DISCOVERY, 2015, : 145 - 155
  • [10] Adaptive Trust Management in P2P Networks using Gossip Protocol
    Zubair, Izza
    Islam, M. Hasan
    2008 INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES, PROCEEDINGS, 2008, : 176 - +