Skip to main content

A Traffic Identification Method and Evaluations for a Pure P2P Application

  • Conference paper
Passive and Active Network Measurement (PAM 2005)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 3431))

Included in the following conference series:

Abstract

Pure P2P applications are widely used nowadays as a file sharing system. In the overlay networks, music and video files are the main items exchanged, and it is known that the traffic volume is much larger than that of classical client/server applications. However, the current status of the P2P application traffic is not well known because of their anonymous communication architectures. In particular, in cases where the application does not use the default service port, and the communication route and the shared file are also encrypted, the identification traffic has not been feasible. To solve this problem, we have developed an identification method for pure Peer-to-Peer communication applications, especially for traffic for Winny, the most popular Peer-to-Peer application in Japan, by using server/client relationships among the peers. We will give some evaluation results for our proposed identification method.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Johns, M.S., Huston, G.: Considerations on the use of a Service Identifier in Packet Headers. In: RFC 3639 (2003)

    Google Scholar 

  2. Gnutella, http://www.gnutella.com/

  3. Kazaa, http://www.kazaa.com/

  4. BitTorrent Protocol, http://bitconjurer.org/BitTorrent

  5. Saroiu, S., Gummadi, P., Gribble, S.D.: Measurement study of peer-to-peer file sharing systems. Multimedia Computing and Networking 2002 (2002)

    Google Scholar 

  6. Sen, S., Wang, J.: Analyzing Peer-To-Peer Traffic Across Large Networks. IEEE/ACM Trans. on Networking 12(2), 219–232 (2004)

    Article  Google Scholar 

  7. Kim, M., Kang, H., Hong, J.W.: Towards Peer-to-Peer Traffic Analysis Using Flows. Proc. of 14h IFIP/IEEE Workshop Distributed Systems: Operations and Management (2003)

    Google Scholar 

  8. WinMX, http://www.winmx.com/

  9. Winny, http://www.nynode.info/

  10. Dewes, C., Wichmann, A., Feldmann, A.: An Analysis of Internet Chat Systems. In: Proc. of ACM SIGCOMM Internet Measurement Workshop 2003, pp. 51–64 (2003)

    Google Scholar 

  11. Gummadi, K.P., Dunn, R.J., Saroiu, S.: Measurement, Modeling and Analysis of a Peer-to-Peer File-Sharing Workload. In: Proc. of ACM SOSP 2003, pp. 314–329 (2003)

    Google Scholar 

  12. Snort, http://www.snort.org/

  13. Barford, P., Kline, J., Plonka, D., Ron, A.: A Signal Analysis of Network Traffic Anomalies. In: Proc. of ACM IMW 2002, pp. 71–82 (2002)

    Google Scholar 

  14. Sen, S., Spatscheck, O., Wang, D.: Accurate, Scalable In-Network Identification of P2P Traffic Using Application Signatures. In: Proc. of ACM WWW 2004 (2004)

    Google Scholar 

  15. Tutschku, K.: A measurement-based traffic profile of the eDonkey filesharing service. In: Barakat, C., Pratt, I. (eds.) PAM 2004. LNCS, vol. 3015, pp. 12–21. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  16. Clarke, I., Sandberg, O., Wiley, B., Hong, T.W.: Freenet: A distributed anonymous information storage and retrieval system. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 46–66. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  17. Safeny, http://www.geocities.co.jp/SiliconValley-SanJose/7063/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ohzahata, S., Hagiwara, Y., Terada, M., Kawashima, K. (2005). A Traffic Identification Method and Evaluations for a Pure P2P Application. In: Dovrolis, C. (eds) Passive and Active Network Measurement. PAM 2005. Lecture Notes in Computer Science, vol 3431. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-31966-5_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-31966-5_5

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-25520-8

  • Online ISBN: 978-3-540-31966-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics