Is P2P dying or just hiding?

被引:0
|
作者
Karagiannis, T [1 ]
Broido, A [1 ]
Brownlee, N [1 ]
Claffy, K [1 ]
Faloutsos, M [1 ]
机构
[1] Univ Calif Riverside, Riverside, CA 92521 USA
关键词
traffic measurements; peer-to-peer; file-sharing;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent reports in the popular media suggest a significant decrease in peer-to-peer (P2P) file-sharing traffic, attributed to the public's response to legal threats. Have we reached the end of the P2P revolution? In pursuit of legitimate data to verify this hypothesis, we embark on a more accurate measurement effort of P2P traffic at the link level. In contrast to previous efforts we introduce two novel elements in our methodology. First, we measure traffic of all known popular P2P protocols. Second, we go beyond the "known port" limitation by reverse engineering the protocols and identifying characteristic strings in the payload. We find that, if measured accurately, P2P traffic has never declined; indeed we have never seen the proportion of p2p traffic decrease over time (any change is an increase) in any of our data sources.
引用
收藏
页码:1532 / 1538
页数:7
相关论文
共 50 条
  • [42] P2P“海盗”
    魏杰
    互联网周刊, 2007, (22) : 67 - 67
  • [43] P2P—何去何从?
    陈震
    Internet信息世界, 2001, (02) : 48 - 51
  • [44] An Innovative Hybrid P2P Location Network for P2P Workflow Systems
    Gao, Lei
    Zeng, Guangzhou
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS, 2009, : 61 - 65
  • [45] Research of P2P Offline Download based on Hybrid P2P Network
    Lin, Zhengzhong
    Yan, Jianfeng
    Urano, Yoshinori
    12TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: ICT FOR GREEN GROWTH AND SUSTAINABLE DEVELOPMENT, VOLS 1 AND 2, 2010, : 89 - 92
  • [46] 基于P2P Cache的P2P流量优化技术
    邹嵘
    电信网技术, 2009, (01) : 11 - 15
  • [47] The method of P2P traffic detecting for P2P harmful contents prevention
    Lee, HG
    Nam, TY
    Jang, JS
    7th International Conference on Advanced Communication Technology, Vols 1 and 2, Proceedings, 2005, : 777 - 780
  • [48] 从P2P风险事件看P2P风险防范
    邵书怀
    时代金融, 2018, (35) : 273+276 - 273
  • [49] P2P soft security: On evolutionary dynamics of P2P incentive mechanism
    Wang, Yufeng
    Nakao, Akihiro
    Vasilakos, Athanasios V.
    Ma, Jianhua
    COMPUTER COMMUNICATIONS, 2011, 34 (03) : 241 - 249
  • [50] P2P Network Structure Graph Finding for P2P Botnet Detection
    Yuan, Zhi-chao
    Li, Yuan-long
    Yao, Shan
    Xia, Chun-he
    INTERNATIONAL CONFERENCE ON COMPUTER, NETWORK SECURITY AND COMMUNICATION ENGINEERING (CNSCE 2014), 2014, : 697 - 701