Abstract
Pure P2P applications are widely used nowadays as a file sharing system. In the overlay networks, music and video files are the main items exchanged, and it is known that the traffic volume is much larger than that of classical client/server applications. However, the current status of the P2P application traffic is not well known because of their anonymous communication architectures. In particular, in cases where the application does not use the default service port, and the communication route and the shared file are also encrypted, the identification traffic has not been feasible. To solve this problem, we have developed an identification method for pure Peer-to-Peer communication applications, especially for traffic for Winny, the most popular Peer-to-Peer application in Japan, by using server/client relationships among the peers. We will give some evaluation results for our proposed identification method.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Johns, M.S., Huston, G.: Considerations on the use of a Service Identifier in Packet Headers. In: RFC 3639 (2003)
Gnutella, http://www.gnutella.com/
Kazaa, http://www.kazaa.com/
BitTorrent Protocol, http://bitconjurer.org/BitTorrent
Saroiu, S., Gummadi, P., Gribble, S.D.: Measurement study of peer-to-peer file sharing systems. Multimedia Computing and Networking 2002 (2002)
Sen, S., Wang, J.: Analyzing Peer-To-Peer Traffic Across Large Networks. IEEE/ACM Trans. on Networking 12(2), 219–232 (2004)
Kim, M., Kang, H., Hong, J.W.: Towards Peer-to-Peer Traffic Analysis Using Flows. Proc. of 14h IFIP/IEEE Workshop Distributed Systems: Operations and Management (2003)
WinMX, http://www.winmx.com/
Winny, http://www.nynode.info/
Dewes, C., Wichmann, A., Feldmann, A.: An Analysis of Internet Chat Systems. In: Proc. of ACM SIGCOMM Internet Measurement Workshop 2003, pp. 51–64 (2003)
Gummadi, K.P., Dunn, R.J., Saroiu, S.: Measurement, Modeling and Analysis of a Peer-to-Peer File-Sharing Workload. In: Proc. of ACM SOSP 2003, pp. 314–329 (2003)
Snort, http://www.snort.org/
Barford, P., Kline, J., Plonka, D., Ron, A.: A Signal Analysis of Network Traffic Anomalies. In: Proc. of ACM IMW 2002, pp. 71–82 (2002)
Sen, S., Spatscheck, O., Wang, D.: Accurate, Scalable In-Network Identification of P2P Traffic Using Application Signatures. In: Proc. of ACM WWW 2004 (2004)
Tutschku, K.: A measurement-based traffic profile of the eDonkey filesharing service. In: Barakat, C., Pratt, I. (eds.) PAM 2004. LNCS, vol. 3015, pp. 12–21. Springer, Heidelberg (2004)
Clarke, I., Sandberg, O., Wiley, B., Hong, T.W.: Freenet: A distributed anonymous information storage and retrieval system. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 46–66. Springer, Heidelberg (2001)
Safeny, http://www.geocities.co.jp/SiliconValley-SanJose/7063/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ohzahata, S., Hagiwara, Y., Terada, M., Kawashima, K. (2005). A Traffic Identification Method and Evaluations for a Pure P2P Application. In: Dovrolis, C. (eds) Passive and Active Network Measurement. PAM 2005. Lecture Notes in Computer Science, vol 3431. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-31966-5_5
Download citation
DOI: https://doi.org/10.1007/978-3-540-31966-5_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-25520-8
Online ISBN: 978-3-540-31966-5
eBook Packages: Computer ScienceComputer Science (R0)