The explosion of P2P file sharing brings such serious problems as network congestion and traffic hindrance caused by excessive occupation of the bandwidth, including the hidden trouble in security. ISP and network operators need to manage P2P traffic to ensure the performance of traditional applications. To accomplish this goal, the system must first identify the P2P traffic. This paper describes the principal P2P traffic identification technologies and indicates the advantages and disadvantages of the P2P traffic identification methods. A variety of methods are combined to detect P2P flow more effectively.
Swipe to navigate through the chapters of this book
Please log in to get access to this content
To get access to this content you need the following product:
- P2P Network Traffic Identification Technologies for Internet
- Springer Berlin Heidelberg
- Sequence number