Skip to main content
Erschienen in: Telecommunication Systems 1/2013

01.05.2013

Design of a method for encrypted P2P traffic identification using K-means algorithm

verfasst von: Ye Du, Ruhui Zhang

Erschienen in: Telecommunication Systems | Ausgabe 1/2013

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Peer-to-Peer (P2P) plays an important role in the domain of Internet application, such as file sharing and instance communication. However, for the characteristic of bandwidth-intensive, P2P traffic identification is especially important in network management, which has been a hot topic in recent years. Based on the review of shortages of current existed technologies, a k-means algorithm based method was brought forward to identify the P2P traffic. For the reason that K-Means is one of the quickest and simplest clustering methods, it was selected as the core algorithm. In addition, the process of flow-information extraction and the descriptions of selected traffic attribute were also introduced in detail. Since the BT file-sharing traffic mainly runs over TCP, we only extract the flow-information of TCP connections. Finally, the experiments on 3 common used P2P applications, which are BitTorrent, BitSpirit and eMule, demonstrated the validity and efficiency of the method.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Hua, Y., Chiu, D.-M., & Lui, J. C. S. (2009). Profiling and identification of P2P traffic. Computer Networks, 53. Hua, Y., Chiu, D.-M., & Lui, J. C. S. (2009). Profiling and identification of P2P traffic. Computer Networks, 53.
2.
Zurück zum Zitat Hjelmvik, E., & John, W. (2010). Breaking and improving protocol obfuscation. Chalmers: Chalmers University of Technology. Hjelmvik, E., & John, W. (2010). Breaking and improving protocol obfuscation. Chalmers: Chalmers University of Technology.
4.
Zurück zum Zitat Madhukar, A., & Williamson, C. (2006). A longitudinal study of P2P traffic classification. In Proceedings of the 14th IEEE international symposium on modeling, analysis, and simulation, 11–14 September 2006. Madhukar, A., & Williamson, C. (2006). A longitudinal study of P2P traffic classification. In Proceedings of the 14th IEEE international symposium on modeling, analysis, and simulation, 11–14 September 2006.
5.
Zurück zum Zitat Wang, R., Liu, Y., Yang, Y.-x., & Wang, H.-l. (2006). A new method for P2P traffic identification based on support vector machine. In Proceedings of AIML 06 international conference, 13–15 June 2006. Wang, R., Liu, Y., Yang, Y.-x., & Wang, H.-l. (2006). A new method for P2P traffic identification based on support vector machine. In Proceedings of AIML 06 international conference, 13–15 June 2006.
6.
Zurück zum Zitat Aboutorab, N., & Mohammadi, A. (2011). A cross-layer design of wireless IP systems using effective bandwidth and MQAM adaptive modulation. Telecommunications Systems, 46(4), 343–351. CrossRef Aboutorab, N., & Mohammadi, A. (2011). A cross-layer design of wireless IP systems using effective bandwidth and MQAM adaptive modulation. Telecommunications Systems, 46(4), 343–351. CrossRef
7.
Zurück zum Zitat Sen, S., Spatscheck, O., & Wang, D. (2004). Accurate, scalable in-network identification of P2P traffic using application signatures. In Proceedings of the 13th international world wide web conference. Sen, S., Spatscheck, O., & Wang, D. (2004). Accurate, scalable in-network identification of P2P traffic using application signatures. In Proceedings of the 13th international world wide web conference.
8.
Zurück zum Zitat Guo, Z., & Qiu, Z. (2008). Identification peer-to-peer traffic for high speed networks using packet sampling and application signatures. In Proceedings of the 9th international conference on signal processing. Guo, Z., & Qiu, Z. (2008). Identification peer-to-peer traffic for high speed networks using packet sampling and application signatures. In Proceedings of the 9th international conference on signal processing.
9.
Zurück zum Zitat Karagiannis, T., Broido, A., Faloutsos, M., & Klaffy, K. (2004). Transport layer identification of P2P traffic. In Proceedings of the 4th ACM SIGCOMM conference on Internet measurement. Karagiannis, T., Broido, A., Faloutsos, M., & Klaffy, K. (2004). Transport layer identification of P2P traffic. In Proceedings of the 4th ACM SIGCOMM conference on Internet measurement.
10.
Zurück zum Zitat Kim, M.-S., Kang, H.-J., & Hong, J. W. (2003). Towards peer-to-peer traffic analysis using flows. In Proceedings of the 14th IFIP/IEEE international workshop on distributed systems: operations and management. Kim, M.-S., Kang, H.-J., & Hong, J. W. (2003). Towards peer-to-peer traffic analysis using flows. In Proceedings of the 14th IFIP/IEEE international workshop on distributed systems: operations and management.
11.
Zurück zum Zitat Shen, H., & Basar, T. (2011). Pricing under information asymmetry for a large population of users. Telecommunications Systems, 47(1–2), 123–136. CrossRef Shen, H., & Basar, T. (2011). Pricing under information asymmetry for a large population of users. Telecommunications Systems, 47(1–2), 123–136. CrossRef
Metadaten
Titel
Design of a method for encrypted P2P traffic identification using K-means algorithm
verfasst von
Ye Du
Ruhui Zhang
Publikationsdatum
01.05.2013
Verlag
Springer US
Erschienen in
Telecommunication Systems / Ausgabe 1/2013
Print ISSN: 1018-4864
Elektronische ISSN: 1572-9451
DOI
https://doi.org/10.1007/s11235-013-9690-5

Weitere Artikel der Ausgabe 1/2013

Telecommunication Systems 1/2013 Zur Ausgabe

Neuer Inhalt