Skip to main content
Top
Published in: Journal of Network and Systems Management 2/2022

01-04-2022

Detection and Management of P2P Traffic in Networks using Artificial Neural Networksa

Authors: Godfrey A. Mills, Pamela Pomary, Emmanuel Togo, Robert A. Sowah

Published in: Journal of Network and Systems Management | Issue 2/2022

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Peer-to-Peer (P2P) technology is a popular tool for sharing files and multimedia services on networks. While the technology has been serving a good purpose of facilitating sharing of large volumes of data on networks, in other aspects, it has also become a potential source through which attackers could ride on to launch various malicious attacks on the networks. In networks with limited bandwidth resources, uncontrolled P2P activities may also come with problems of congestion in such networks. As P2P continues to evolve on the internet in more complex forms, the need for dynamic mechanisms with the ability to learn the evolving P2P behavior will be essential for accurate monitoring and detection of the P2P traffic to minimize its effects on networks. Supervised machine learning classifiers have been used in recent times, as potential tools for monitoring and detection of the P2P traffic. Incidentally, the capabilities of such classifiers decline over time due to the changing dynamics of the P2P features, making it necessary for the classifiers to undergo continuous retraining in order to maintain their capability of providing effective detection of new P2P traffic features in real-time operations. This paper presents a hybrid machine-learning framework that combines the capabilities of self-organizing map (SOM) model with a multilayer perceptron (MLP) network to achieve real-time detection of P2P traffic in networks. The SOM model generates sets of clustered features contained in the traffic flows and organizes the features into P2P and non-P2P, which are used for training the MLP model for subsequent detection and control of the P2P traffic. The proposed P2P detection framework was tested using real traffic data from the University of Ghana campus network. The test results revealed an average detection rate of 99.89% of the observed instances of P2P traffic in the experimental data. The good detection rate from the detection framework suggests its capability to serve as a potential tool for dynamic monitoring, detection, and control of P2P traffic to manage bandwidth resources and isolation of undesirable P2P-driven traffic in networks.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Kegel, D., Srisuresh, P., Ford, B.: State of Peer-to-Peer (P2P) Communication across Network Address Translators (NATs). Proceedings of USENIX Annual Technical Conference, pp. 179–192, (2005). Kegel, D., Srisuresh, P., Ford, B.: State of Peer-to-Peer (P2P) Communication across Network Address Translators (NATs). Proceedings of USENIX Annual Technical Conference, pp. 179–192, (2005).
2.
go back to reference Ripeanu, M.: Peer-to-peer architecture case study—Gnutella network. Proceedings of First International Conference on Peer-to-Peer Computing. Linkoping, Sweden. pp. 99–100, (2001). Ripeanu, M.: Peer-to-peer architecture case study—Gnutella network. Proceedings of First International Conference on Peer-to-Peer Computing. Linkoping, Sweden. pp. 99–100, (2001).
3.
go back to reference Zhang, D., Zheng, C., Zhang, H., Yu, H.: Identification and analysis of skype peer-to-peer traffic. International Conference on Internet and Web Applications and Services, IEEE Computer Society, pp. 200–206 (2010). Zhang, D., Zheng, C., Zhang, H., Yu, H.: Identification and analysis of skype peer-to-peer traffic. International Conference on Internet and Web Applications and Services, IEEE Computer Society, pp. 200–206 (2010).
4.
go back to reference Silverston, T., Fourmaux, O., Botta, A., Dainotti, A., Pescape, A., Ventre, G., Salamatian, K.: Traffic analysis of peer-to-peer IPTV communities. Comput. Netw. 53, 470–484 (2009)CrossRef Silverston, T., Fourmaux, O., Botta, A., Dainotti, A., Pescape, A., Ventre, G., Salamatian, K.: Traffic analysis of peer-to-peer IPTV communities. Comput. Netw. 53, 470–484 (2009)CrossRef
5.
go back to reference Bhatia, M., Rai, M.K.: Identifying P2P traffic: a survey. Peer-to-Peer Netw. Appl. 10, 1182–1203 (2017)CrossRef Bhatia, M., Rai, M.K.: Identifying P2P traffic: a survey. Peer-to-Peer Netw. Appl. 10, 1182–1203 (2017)CrossRef
6.
go back to reference Kolbe, H. J., Kettig, O., Golic, E.: Monitoring the impact of P2P users on a broadband operator’s network. 2009 IFIP/IEEE International Sym;osium on Integrated Network Management, Long Island, NY, pp. 351–358 (2009). Kolbe, H. J., Kettig, O., Golic, E.: Monitoring the impact of P2P users on a broadband operator’s network. 2009 IFIP/IEEE International Sym;osium on Integrated Network Management, Long Island, NY, pp. 351–358 (2009).
7.
go back to reference Li, J.: On peer-to-peer (P2P) content delivery. Peer-to-Peer Netw. Appl. 1, 45–63 (2008)CrossRef Li, J.: On peer-to-peer (P2P) content delivery. Peer-to-Peer Netw. Appl. 1, 45–63 (2008)CrossRef
8.
go back to reference Ceptureanu, E.G., Ceptureanu, S.I., Herteliu, C., Cerqueti, R.: Sustainable consumption behaviours in P2P accommodation platforms: an exploratory study. Soft. Comput. 24, 13863–13870 (2020)CrossRef Ceptureanu, E.G., Ceptureanu, S.I., Herteliu, C., Cerqueti, R.: Sustainable consumption behaviours in P2P accommodation platforms: an exploratory study. Soft. Comput. 24, 13863–13870 (2020)CrossRef
9.
go back to reference Trevisan, M., Giordano, D., Drago, I., Munafo, M.M., Mellia, M.: Five years at the edge: Watching internet from the ISP network. IEEE/ACM Trans. Netw. 28(2), 561–574 (2020)CrossRef Trevisan, M., Giordano, D., Drago, I., Munafo, M.M., Mellia, M.: Five years at the edge: Watching internet from the ISP network. IEEE/ACM Trans. Netw. 28(2), 561–574 (2020)CrossRef
10.
go back to reference Garcia-Dorado, J.L., Finamore, A., Mellia, M., Meo, M., Munafo, M.: Characterization of ISP traffic: trends user habits and access technology impact. IEEE Trans. Netw. Serv. Manag. 9(2), 142–155 (2012)CrossRef Garcia-Dorado, J.L., Finamore, A., Mellia, M., Meo, M., Munafo, M.: Characterization of ISP traffic: trends user habits and access technology impact. IEEE Trans. Netw. Serv. Manag. 9(2), 142–155 (2012)CrossRef
11.
go back to reference Awasthi, S.K., Singh, Y.N.: Simplified Biased Contribution Index (SBCI): a mechanism to make P2P network fair and efficient for resource sharing. J. Parallel Distrib. Comput. 124, 106–118 (2019)CrossRef Awasthi, S.K., Singh, Y.N.: Simplified Biased Contribution Index (SBCI): a mechanism to make P2P network fair and efficient for resource sharing. J. Parallel Distrib. Comput. 124, 106–118 (2019)CrossRef
12.
go back to reference Lu, H., Wu, C.: Identification of P2P traffic in campus network. 2010 International Conference on Computer Application and Systems Modelling pp. V1–21–V1–23 (2010). Lu, H., Wu, C.: Identification of P2P traffic in campus network. 2010 International Conference on Computer Application and Systems Modelling pp. V1–21–V1–23 (2010).
13.
go back to reference Togo, E.: Optimizing internet bandwidth of campus network through peer-to-peer traffic management. Master of Engineering Dissertation, Department of Computer Engineering, University of Ghana, Legon. (2013). Togo, E.: Optimizing internet bandwidth of campus network through peer-to-peer traffic management. Master of Engineering Dissertation, Department of Computer Engineering, University of Ghana, Legon. (2013).
14.
go back to reference ITU publications: Measuring Digital developments Facts and Figures 2020. ITU Publications (2020). ITU publications: Measuring Digital developments Facts and Figures 2020. ITU Publications (2020).
15.
go back to reference Azzouna, N.B., Guillemin, F.: Impact of peer-to-peer applications on wide area network traffic: an experimental approach. IEEE Global Telecommunications Conference, Globecom 04, Dallas, TX, vol. 3, pp. 1544–1548 (2004). Azzouna, N.B., Guillemin, F.: Impact of peer-to-peer applications on wide area network traffic: an experimental approach. IEEE Global Telecommunications Conference, Globecom 04, Dallas, TX, vol. 3, pp. 1544–1548 (2004).
16.
go back to reference Khattak, S., Ramay, N.R., Riaz Khan, K., Syed Affan, A., Ali Khayam, S.: A Taxonomy of Botnet behaviour, detection, and defense. IEEE Commun. Sur. Tutor. 16(2), 898–924 (2014)CrossRef Khattak, S., Ramay, N.R., Riaz Khan, K., Syed Affan, A., Ali Khayam, S.: A Taxonomy of Botnet behaviour, detection, and defense. IEEE Commun. Sur. Tutor. 16(2), 898–924 (2014)CrossRef
17.
go back to reference Khan, R.U., Kumar, R., Alazab, M., Zhang, X.: A hybrid technique to detect botnets based on P2P traffic similarity. Cybersecurity and Cyberforensic Conference, Melbourne, pp. 136–142 (2019). Khan, R.U., Kumar, R., Alazab, M., Zhang, X.: A hybrid technique to detect botnets based on P2P traffic similarity. Cybersecurity and Cyberforensic Conference, Melbourne, pp. 136–142 (2019).
18.
go back to reference Saad, S., Traore, I., Ghorbani, A., Sayed, B., Zhao, D., Lu, W., Felix, J., Hakimian, P.: Detecting P2P Botnet through network behaviour analysis and machine learning. 2011 Ninth Annual International Conference on Privacy, Security and Trust, Montreal, QC, pp. 174–180 (2011). Saad, S., Traore, I., Ghorbani, A., Sayed, B., Zhao, D., Lu, W., Felix, J., Hakimian, P.: Detecting P2P Botnet through network behaviour analysis and machine learning. 2011 Ninth Annual International Conference on Privacy, Security and Trust, Montreal, QC, pp. 174–180 (2011).
19.
go back to reference Wararkar, P., Kapil, N., Rehani, V., Mehra, Y., Bhatnagar, Y.: Resolving problems based on peer to peer network security issues. Procedia Comput. Sci. Elsevier. 78, 652–659 (2016)CrossRef Wararkar, P., Kapil, N., Rehani, V., Mehra, Y., Bhatnagar, Y.: Resolving problems based on peer to peer network security issues. Procedia Comput. Sci. Elsevier. 78, 652–659 (2016)CrossRef
20.
go back to reference Auld, T., Moore, A.W., Gull, S.F.: Bayesian neural networks for internet traffic classification. Neural Netw. IEEE Trans. 18, 223–239 (2007)CrossRef Auld, T., Moore, A.W., Gull, S.F.: Bayesian neural networks for internet traffic classification. Neural Netw. IEEE Trans. 18, 223–239 (2007)CrossRef
21.
go back to reference Carela-Espanol, V., Barlet-Ros, P., Mula-Valls, O., Sole-Pareta, J.: An autonomic traffic classification system for network operation and management. J. Netw. Syst. Manag. 23, 401–419 (2015)CrossRef Carela-Espanol, V., Barlet-Ros, P., Mula-Valls, O., Sole-Pareta, J.: An autonomic traffic classification system for network operation and management. J. Netw. Syst. Manag. 23, 401–419 (2015)CrossRef
22.
go back to reference Pao, T., Chen, J.: Using UDP packets to detect P2P file sharing. IJCSNS 7(8), 188–192 (2007) Pao, T., Chen, J.: Using UDP packets to detect P2P file sharing. IJCSNS 7(8), 188–192 (2007)
23.
go back to reference Karagiannis, T., Broido, A., Faloutsos, M., Claffy, K.: Transport layer identification of P2P traffic. Proccedings of 4th ACM Sigcomm Internet Measurement Conference, Italy, pp. 121–134, (2004). Karagiannis, T., Broido, A., Faloutsos, M., Claffy, K.: Transport layer identification of P2P traffic. Proccedings of 4th ACM Sigcomm Internet Measurement Conference, Italy, pp. 121–134, (2004).
24.
go back to reference Perenyi, M., Dinh Dang, T., Gefferth, A., Molnar, S.: Identification and analysis of peer-to-peer traffic. J. Commun. 1(7), 36–46 (2006)CrossRef Perenyi, M., Dinh Dang, T., Gefferth, A., Molnar, S.: Identification and analysis of peer-to-peer traffic. J. Commun. 1(7), 36–46 (2006)CrossRef
25.
go back to reference Sen, S., Spatscheck, O., Wang, D.: Accurate, Scalable In-Network Identification of P2P Trac Using Application Signatures. In WWW (2004). Sen, S., Spatscheck, O., Wang, D.: Accurate, Scalable In-Network Identification of P2P Trac Using Application Signatures. In WWW (2004).
26.
go back to reference Bernaille, L., Teixeira, R., Salamatian, K.: Early application identification. Proceedings of 2006 ACM CoNEXT Conference, ACM, New York, Article 6, pp. 1–12 (2006). Bernaille, L., Teixeira, R., Salamatian, K.: Early application identification. Proceedings of 2006 ACM CoNEXT Conference, ACM, New York, Article 6, pp. 1–12 (2006).
27.
go back to reference Jun, Z., Chao, C., Yang, X., Wanlei, Z., Athanasios, V.V.: An effective network classification method using unknown flow detection. IEEE Trans. Netw. Serv. Manag. 10, 133–147 (2013)CrossRef Jun, Z., Chao, C., Yang, X., Wanlei, Z., Athanasios, V.V.: An effective network classification method using unknown flow detection. IEEE Trans. Netw. Serv. Manag. 10, 133–147 (2013)CrossRef
28.
go back to reference Alelyani, S., Tang, J., Liu, H.: Feature selection for clustering: A review. In: Data Clustering, algorithms and applications. Chapman and Hall, CRC Press, pp. 30–55 (2018). Alelyani, S., Tang, J., Liu, H.: Feature selection for clustering: A review. In: Data Clustering, algorithms and applications. Chapman and Hall, CRC Press, pp. 30–55 (2018).
29.
go back to reference Karagiannis, T., Papagiannaki, K., Faloutsos, M.: Blinc: multilevel traffic classification in the dark. SIGCOMM Computer. Commun. Rev. 35, 229–240 (2005)CrossRef Karagiannis, T., Papagiannaki, K., Faloutsos, M.: Blinc: multilevel traffic classification in the dark. SIGCOMM Computer. Commun. Rev. 35, 229–240 (2005)CrossRef
30.
go back to reference Sen, S., Wang, J.: Analyzing peer-to-Peer traffic across large networks. IEEE/ACM Trans. Netw. 12(2), 219–232 (2004)CrossRef Sen, S., Wang, J.: Analyzing peer-to-Peer traffic across large networks. IEEE/ACM Trans. Netw. 12(2), 219–232 (2004)CrossRef
31.
go back to reference Salman, O., Elhajj, I.H., Kayssi, A., Chehab, A.: A review on machine learning-based approaches for internet traffic classification. Ann. Telecommun. 75, 673–710 (2020)CrossRef Salman, O., Elhajj, I.H., Kayssi, A., Chehab, A.: A review on machine learning-based approaches for internet traffic classification. Ann. Telecommun. 75, 673–710 (2020)CrossRef
32.
go back to reference Lopez-Martin, M., Carro, B., Sanchez-Esguevillas, A., Lloret, J.: Network traffic classifier with convolutional and recurrent neural networks for Internet of Things. IEEE Access 5, 18042–18050 (2017)CrossRef Lopez-Martin, M., Carro, B., Sanchez-Esguevillas, A., Lloret, J.: Network traffic classifier with convolutional and recurrent neural networks for Internet of Things. IEEE Access 5, 18042–18050 (2017)CrossRef
33.
go back to reference Pacheco, F., Expósito, E., Gineste, M., Baudoin, C., Aguilar, J.: Towards the deployment of machine learning solutions in network traffic classification: a systematic survey. Commun. Surv. Tutor. IEEE Commun. Soc. 21(2), 1988–2014 (2018)CrossRef Pacheco, F., Expósito, E., Gineste, M., Baudoin, C., Aguilar, J.: Towards the deployment of machine learning solutions in network traffic classification: a systematic survey. Commun. Surv. Tutor. IEEE Commun. Soc. 21(2), 1988–2014 (2018)CrossRef
34.
go back to reference Haykin, S.: Artificial Neural Network: A Comprehensive Foundation, 3rd edn. Prentice Hall, Hoboken (2007) Haykin, S.: Artificial Neural Network: A Comprehensive Foundation, 3rd edn. Prentice Hall, Hoboken (2007)
35.
go back to reference Safari Khatouni, A., Seddigh, N., Nandi, B., Zincir-Heywood, N.: Machine learning based classification accuracy of encrypted service channels: Analysis of various factors. J. Netw. Syst. Manag. 29(8), 5 (2021) Safari Khatouni, A., Seddigh, N., Nandi, B., Zincir-Heywood, N.: Machine learning based classification accuracy of encrypted service channels: Analysis of various factors. J. Netw. Syst. Manag. 29(8), 5 (2021)
36.
go back to reference Agrawal, S., Sohi, B.S.: Feature optimization and performance evaluation of machine learning algorithms for identification of P2P traffic. J. Adv. Inf. Technol. 3(2), 107–114 (2012) Agrawal, S., Sohi, B.S.: Feature optimization and performance evaluation of machine learning algorithms for identification of P2P traffic. J. Adv. Inf. Technol. 3(2), 107–114 (2012)
37.
go back to reference Tan, J., Chen, X., Du, M., Zhu, K.: A novel internet traffic identification approach using wavelet packet decomposition and neural network. J. Central South Univ. 19(8), 2218–2230 (2012)CrossRef Tan, J., Chen, X., Du, M., Zhu, K.: A novel internet traffic identification approach using wavelet packet decomposition and neural network. J. Central South Univ. 19(8), 2218–2230 (2012)CrossRef
38.
go back to reference Wang, C., Zhang, H., Ye, Z.: A peer-to-peer traffic identification method based on wavelet and particle swarm optimization algorithm. Int. J. Wavelets Multiresolut. Inf. Process. 13(6), 87–88 (2015)MathSciNetMATHCrossRef Wang, C., Zhang, H., Ye, Z.: A peer-to-peer traffic identification method based on wavelet and particle swarm optimization algorithm. Int. J. Wavelets Multiresolut. Inf. Process. 13(6), 87–88 (2015)MathSciNetMATHCrossRef
39.
go back to reference Zhu, Y., Zheng, Y.: Traffic identification and traffic analysis based on support vector machine. Neural Comput. Appl. 32, 1903–1911 (2020)CrossRef Zhu, Y., Zheng, Y.: Traffic identification and traffic analysis based on support vector machine. Neural Comput. Appl. 32, 1903–1911 (2020)CrossRef
40.
go back to reference Yuan, R., Li, Z., Guan, X., Xu, L.: An SVM based machine learning method for accurate internet traffic classification. Inf. Syst. Front. 12, 149–156 (2010)CrossRef Yuan, R., Li, Z., Guan, X., Xu, L.: An SVM based machine learning method for accurate internet traffic classification. Inf. Syst. Front. 12, 149–156 (2010)CrossRef
41.
go back to reference Cao, J., Wang, D., Qu, Z., Sun, H., Li, B., Chen, C.-L.: An improved network traffic classification model based on a support vector machine. Symmetry 12(301), 1–21 (2020) Cao, J., Wang, D., Qu, Z., Sun, H., Li, B., Chen, C.-L.: An improved network traffic classification model based on a support vector machine. Symmetry 12(301), 1–21 (2020)
42.
go back to reference Alauthman, M., Aslam, N., Al-kasassbeh, M., Khan, S., AlQerem, A., Choo, K.-M.R.: An efficient reinforcement learning-based botnet fdetection approach. J. Network Comput. Appl. 150, 102479 (2020)CrossRef Alauthman, M., Aslam, N., Al-kasassbeh, M., Khan, S., AlQerem, A., Choo, K.-M.R.: An efficient reinforcement learning-based botnet fdetection approach. J. Network Comput. Appl. 150, 102479 (2020)CrossRef
43.
go back to reference Tauriainen, A.: A Self-Learning System for P2P Traffic Classification. Helsinki University of Technology, Helsinki (2005) Tauriainen, A.: A Self-Learning System for P2P Traffic Classification. Helsinki University of Technology, Helsinki (2005)
44.
go back to reference Le, D.C., Zincir-Heywood, N., Heywood, M.I.: Unsupervised monitoring of network and service behaviour using self organizing maps. J. Cyber Sec. Mobility 8(1), 15–52 (2019)CrossRef Le, D.C., Zincir-Heywood, N., Heywood, M.I.: Unsupervised monitoring of network and service behaviour using self organizing maps. J. Cyber Sec. Mobility 8(1), 15–52 (2019)CrossRef
45.
go back to reference Keralapura, R., Nucci, A., Chuah, C.-N.: A novel self-learning architecture for P2P traffic classification in high speed networks. Comput. Netw. 54(8), 1055–1068 (2010)MATHCrossRef Keralapura, R., Nucci, A., Chuah, C.-N.: A novel self-learning architecture for P2P traffic classification in high speed networks. Comput. Netw. 54(8), 1055–1068 (2010)MATHCrossRef
46.
go back to reference Zarei, R., Monemi, A., Marsono, M.N.: Automated dataset generation for training peer-to-peer machine learning classifiers. J. Netw. Syst. Manag. 23, 89–110 (2015)CrossRef Zarei, R., Monemi, A., Marsono, M.N.: Automated dataset generation for training peer-to-peer machine learning classifiers. J. Netw. Syst. Manag. 23, 89–110 (2015)CrossRef
47.
go back to reference NFDUMP Netflow processing tools, Version 1.6.13 (2017). NFDUMP Netflow processing tools, Version 1.6.13 (2017).
48.
go back to reference Hongli, Z., Gang, L., Mahmoud, Q.T., Zhang, Y., Xiangzhan, Y.: Feature selection for optimizing traffic classification. Comput. Commun. 35(12), 1457–1471 (2012)CrossRef Hongli, Z., Gang, L., Mahmoud, Q.T., Zhang, Y., Xiangzhan, Y.: Feature selection for optimizing traffic classification. Comput. Commun. 35(12), 1457–1471 (2012)CrossRef
49.
go back to reference WEKA machine learning software tool, Version 3–6 (2017). WEKA machine learning software tool, Version 3–6 (2017).
50.
go back to reference Witten, I. H., Frank, E., Hall, M. A., Pal C. J.: WEKA Workbench, Data Mining: Practical Machine Learning Tools and Techniques. Morgan Kaufmann, 4th Ed. (2016). Witten, I. H., Frank, E., Hall, M. A., Pal C. J.: WEKA Workbench, Data Mining: Practical Machine Learning Tools and Techniques. Morgan Kaufmann, 4th Ed. (2016).
51.
go back to reference Vesanto, J., Alhoniemi, E.: Clustering of the self-organizing map. IEEE Trans. Neural Netw. 11(3), 586–600 (2002)CrossRef Vesanto, J., Alhoniemi, E.: Clustering of the self-organizing map. IEEE Trans. Neural Netw. 11(3), 586–600 (2002)CrossRef
52.
go back to reference Erman, J., Arlitt, M., Mahanti, A.: Traffic classification using clustering algorithms. MineNet’06: Proceedings of 2006 SIGCOMM workshop on mining network data, pp. 281–286 (2006). Erman, J., Arlitt, M., Mahanti, A.: Traffic classification using clustering algorithms. MineNet’06: Proceedings of 2006 SIGCOMM workshop on mining network data, pp. 281–286 (2006).
53.
go back to reference Takyi, K., Bagga, A., Goopta, P.: Clustering techniques for traffic classification: A comprehensive review. IEEE 7th International conference on reliability, information technologies and optimization (Trends and Future Directions), pp. 224–230 (2018). Takyi, K., Bagga, A., Goopta, P.: Clustering techniques for traffic classification: A comprehensive review. IEEE 7th International conference on reliability, information technologies and optimization (Trends and Future Directions), pp. 224–230 (2018).
54.
go back to reference Herbert, J.P., Tao Yao, J.: A granular computing framework for self-organizing maps. Neurocomputing 9, 2865–2872 (2009)CrossRef Herbert, J.P., Tao Yao, J.: A granular computing framework for self-organizing maps. Neurocomputing 9, 2865–2872 (2009)CrossRef
55.
go back to reference Chaudhary, V., Bhatia, R.S., Ahlawat, A.K.: The self-organizing map learning algorithm with inactive and relative winning frequency of active neurons. HKIE Trans. 21(1), 62–67 (2014)CrossRef Chaudhary, V., Bhatia, R.S., Ahlawat, A.K.: The self-organizing map learning algorithm with inactive and relative winning frequency of active neurons. HKIE Trans. 21(1), 62–67 (2014)CrossRef
56.
go back to reference James, G., Witten, D., Hastie, T., Tibshirani, R.: An Introduction to Statistical Learning with Applications. Springer, New York (2017)MATH James, G., Witten, D., Hastie, T., Tibshirani, R.: An Introduction to Statistical Learning with Applications. Springer, New York (2017)MATH
58.
go back to reference Sowah, R.A., Agebure, M.A., Mills, G.A., Koumadi, K.K., Fiawoo, S.Y.: A new cluster under sampling technique for class imbalance learning. JMLC 6(3), 205–214 (2016) Sowah, R.A., Agebure, M.A., Mills, G.A., Koumadi, K.K., Fiawoo, S.Y.: A new cluster under sampling technique for class imbalance learning. JMLC 6(3), 205–214 (2016)
59.
go back to reference Nobre, J.C., Melchiors, C., Marquezan, C.C., et al.: A survey on the use of P2P technology for network management. J. Netw. Syst. Manag. 26, 189–221 (2018)CrossRef Nobre, J.C., Melchiors, C., Marquezan, C.C., et al.: A survey on the use of P2P technology for network management. J. Netw. Syst. Manag. 26, 189–221 (2018)CrossRef
60.
go back to reference Dos Santos, C.R.P., Famaey, J., Schonwalder, J., Granville, L.Z., Pras, A., De Turck, F.: Taxonomy for the network and service management research field. J. Netw. Syst. Manag. 24(3), 764–787 (2016)CrossRef Dos Santos, C.R.P., Famaey, J., Schonwalder, J., Granville, L.Z., Pras, A., De Turck, F.: Taxonomy for the network and service management research field. J. Netw. Syst. Manag. 24(3), 764–787 (2016)CrossRef
Metadata
Title
Detection and Management of P2P Traffic in Networks using Artificial Neural Networksa
Authors
Godfrey A. Mills
Pamela Pomary
Emmanuel Togo
Robert A. Sowah
Publication date
01-04-2022
Publisher
Springer US
Published in
Journal of Network and Systems Management / Issue 2/2022
Print ISSN: 1064-7570
Electronic ISSN: 1573-7705
DOI
https://doi.org/10.1007/s10922-021-09637-1

Other articles of this Issue 2/2022

Journal of Network and Systems Management 2/2022 Go to the issue

Premium Partner