Skip to main content
Erschienen in: Peer-to-Peer Networking and Applications 5/2017

18.06.2016

Identifying P2P traffic: A survey

verfasst von: Max Bhatia, Mritunjay Kumar Rai

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 5/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Peer-to-Peer (P2P) traffic is widely used for the purpose of streaming media, file-sharing, instant messaging, games, software etc., which often involves copyrighted data. From the past decade, P2P traffic has been contributing to major portion of Internet traffic which is still rising and hence is consuming a lot of network traffic bandwidth. It also worsens congestion of network traffic significantly and degrades the performance of traditional client–server applications. Popularity of various P2P applications has led Internet Service Providers (ISPs) to face various challenges regarding efficiently and fairly utilizing network resources. The traditional methods of identifying P2P traffic such as port-based and payload-based are proving ineffective due to their significant limitations and can be bypassed. Hence, new approaches based on statistics or behaviour of network traffic needs to be developed and adopted in order to accurately identify existing and new P2P traffic which emerge over the time. This article presents a survey regarding various strategies involved in identifying P2P traffic. Furthermore, conceptual analysis of network traffic measurement and monitoring is also presented.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Hurley J, Garcia-Palacios E, Sezer S (2009) Classification of P2P and HTTP using specific protocol characteristics. Lecture notes in The Internet of the Future, Proceedings of 15th Open European Summer School and IFIP TC6.6 Workshop, EUNICE 2009, Barcelona, Spain, vol. 5733, pp 31–40 Hurley J, Garcia-Palacios E, Sezer S (2009) Classification of P2P and HTTP using specific protocol characteristics. Lecture notes in The Internet of the Future, Proceedings of 15th Open European Summer School and IFIP TC6.6 Workshop, EUNICE 2009, Barcelona, Spain, vol. 5733, pp 31–40
2.
Zurück zum Zitat Mohammadi M, Raahemi B, Akbari A, Moeinzadeh H, Nasershari B (2011) Genetic-based minimum classification error mapping for accurate identifying Peer-to-Peer applications in the internet traffic. Expert Syst Appl: Int J 38(6):6417–6423CrossRef Mohammadi M, Raahemi B, Akbari A, Moeinzadeh H, Nasershari B (2011) Genetic-based minimum classification error mapping for accurate identifying Peer-to-Peer applications in the internet traffic. Expert Syst Appl: Int J 38(6):6417–6423CrossRef
3.
Zurück zum Zitat Sen S, Wang J (2004) Analyzing peer-to-peer traffic across large networks. IEEE/ACM Trans Networking 12(2):219–232CrossRef Sen S, Wang J (2004) Analyzing peer-to-peer traffic across large networks. IEEE/ACM Trans Networking 12(2):219–232CrossRef
4.
Zurück zum Zitat Dai L, Yang J, Lin L (2010) A comprehensive system for P2P classification. In: 2nd IEEE international conference on network infrastructure and digital content, pp 561–563 Dai L, Yang J, Lin L (2010) A comprehensive system for P2P classification. In: 2nd IEEE international conference on network infrastructure and digital content, pp 561–563
5.
Zurück zum Zitat Chu H, Yi H, Zhang H (2011) A new P2P traffic identification methodology based on flow statistics. In: 3rd IEEE international conference on communication software and networks (ICCSN 2011), pp 277–281 Chu H, Yi H, Zhang H (2011) A new P2P traffic identification methodology based on flow statistics. In: 3rd IEEE international conference on communication software and networks (ICCSN 2011), pp 277–281
6.
Zurück zum Zitat Keralapura R, Nucci A, Chuah C-N (2010) A novel self-learning architecture for p2p traffic classification in high speed networks. Comput Netw 54(7):1055–1068CrossRefMATH Keralapura R, Nucci A, Chuah C-N (2010) A novel self-learning architecture for p2p traffic classification in high speed networks. Comput Netw 54(7):1055–1068CrossRefMATH
7.
Zurück zum Zitat Azzouna NB, Guillemin F (2003) Analysis of ADSL traffic on an IP backbone link. In: IEEE Global Telecommunication Conference (GLOBECOM’03), vol. 7, pp. 3742–3746 Azzouna NB, Guillemin F (2003) Analysis of ADSL traffic on an IP backbone link. In: IEEE Global Telecommunication Conference (GLOBECOM’03), vol. 7, pp. 3742–3746
8.
Zurück zum Zitat Schulze H, Mochalski K (2007) Internet study 2007. Tech. report, ipoque Schulze H, Mochalski K (2007) Internet study 2007. Tech. report, ipoque
9.
Zurück zum Zitat Karagiannis T, Broido A, Brownlee N, Claffy KC, Faloutsos M (2004) File-sharing in the Internet: a characterization of P2P traffic in the backbone. Tech. report Karagiannis T, Broido A, Brownlee N, Claffy KC, Faloutsos M (2004) File-sharing in the Internet: a characterization of P2P traffic in the backbone. Tech. report
10.
Zurück zum Zitat Madhukar A, Williamson C (2006) A longitudinal study of P2P traffic classification. In: Proceedings of 14th IEEE international symposium on modeling, analysis, and simulation of computer and telecommunication systems, Washington, DC, USA, pp. 179–188 Madhukar A, Williamson C (2006) A longitudinal study of P2P traffic classification. In: Proceedings of 14th IEEE international symposium on modeling, analysis, and simulation of computer and telecommunication systems, Washington, DC, USA, pp. 179–188
11.
Zurück zum Zitat Nguyen TTT, Armitage G (2009) A survey of techniques for internet traffic classification using machine learning. In: IEEE Communications surveys and tutorials, vol. 10, no.4 Nguyen TTT, Armitage G (2009) A survey of techniques for internet traffic classification using machine learning. In: IEEE Communications surveys and tutorials, vol. 10, no.4
12.
Zurück zum Zitat Callado A, Kamienski C, Szabo G, Gero B, Kelner J, Fernandes S, Sadok D (2009) A survey on internet traffic identification. IEEE Commun Surv Tutorials 11(3):37–52CrossRef Callado A, Kamienski C, Szabo G, Gero B, Kelner J, Fernandes S, Sadok D (2009) A survey on internet traffic identification. IEEE Commun Surv Tutorials 11(3):37–52CrossRef
13.
Zurück zum Zitat Li W, Canini M, Moore AW, Bolla R (2009) Efficient application identification and the temporal and spatial stability of classification schema. Comput Netw 53(6):790–809CrossRefMATH Li W, Canini M, Moore AW, Bolla R (2009) Efficient application identification and the temporal and spatial stability of classification schema. Comput Netw 53(6):790–809CrossRefMATH
14.
Zurück zum Zitat Williamson C (2001) Internet traffic measurement. IEEE Internet Comput 5(3):70–74CrossRef Williamson C (2001) Internet traffic measurement. IEEE Internet Comput 5(3):70–74CrossRef
15.
Zurück zum Zitat McGregor T (2002) Quality in measurement: beyond the deployment barrier. In: Proceedings of the symposium on applications and the internet workshops (SAINT), IEEE Computer Society, pp 66–73 McGregor T (2002) Quality in measurement: beyond the deployment barrier. In: Proceedings of the symposium on applications and the internet workshops (SAINT), IEEE Computer Society, pp 66–73
16.
Zurück zum Zitat Paxson V (2004) Strategies for sound Internet measurement. In: Proceedings of the ACM SIGCOMM Internet Measurement Conference (IMC 2004), NY, USA, pp 263–271 Paxson V (2004) Strategies for sound Internet measurement. In: Proceedings of the ACM SIGCOMM Internet Measurement Conference (IMC 2004), NY, USA, pp 263–271
25.
Zurück zum Zitat Claffy KC, McCreary S (1999) Internet measurement and data analysis: passive and active measurement. In: American Statistical Association Claffy KC, McCreary S (1999) Internet measurement and data analysis: passive and active measurement. In: American Statistical Association
27.
Zurück zum Zitat Duffield N, LUND C, Thorup M (2005) Estimating flow distributions from sampled flow statistics. IEEE/ACM Trans Netw 13(5):933–946CrossRef Duffield N, LUND C, Thorup M (2005) Estimating flow distributions from sampled flow statistics. IEEE/ACM Trans Netw 13(5):933–946CrossRef
28.
Zurück zum Zitat Claffy KC, Braun H-W, Polyzos GC (1995) A parameterizable methodology for Internet traffic flow profiling. IEEE J Sel Areas Commun 13(8):1481–1494CrossRef Claffy KC, Braun H-W, Polyzos GC (1995) A parameterizable methodology for Internet traffic flow profiling. IEEE J Sel Areas Commun 13(8):1481–1494CrossRef
29.
Zurück zum Zitat Apisdorf J, Claffy KC, Thompson K, Wilder R (1996) OC3MON: flexible, affordable, high performance statistics collection. In: Proceedings of the 10th USENIX conference on systems administration (LISA 1996), USENIX Association, Berkeley, CA, USA, pp. 97–112 Apisdorf J, Claffy KC, Thompson K, Wilder R (1996) OC3MON: flexible, affordable, high performance statistics collection. In: Proceedings of the 10th USENIX conference on systems administration (LISA 1996), USENIX Association, Berkeley, CA, USA, pp. 97–112
30.
Zurück zum Zitat Moore D, Keys K, Koga R, Lagache E, Claffy KC (2001) The CoralReef software suite as a tool for system and network administrators. In: Proceedings of the 15th USENIX conference on system administration (LISA 2001), USENIX Association, Berkeley, CA, USA, pp 133–144 Moore D, Keys K, Koga R, Lagache E, Claffy KC (2001) The CoralReef software suite as a tool for system and network administrators. In: Proceedings of the 15th USENIX conference on system administration (LISA 2001), USENIX Association, Berkeley, CA, USA, pp 133–144
32.
Zurück zum Zitat IETF (2008) Specification of the IP flow information export (IPFIX) protocol for the exchange of IP traffic flow information. In: RFC 5101 IETF (2008) Specification of the IP flow information export (IPFIX) protocol for the exchange of IP traffic flow information. In: RFC 5101
33.
Zurück zum Zitat Allman M, Paxson V (2007) Issues and etiquette concerning use of shared measurement data. In: Proceedings of the 7th ACM SIGCOMM conference on Internet Measurement (IMC 2007), ACM, New York, NY, USA, pp 135–140 Allman M, Paxson V (2007) Issues and etiquette concerning use of shared measurement data. In: Proceedings of the 7th ACM SIGCOMM conference on Internet Measurement (IMC 2007), ACM, New York, NY, USA, pp 135–140
36.
Zurück zum Zitat Jurga RE, Hulbój MM (2007) Packet sampling for network monitoring. Technical report, CERN - HP Procurve openlab project Jurga RE, Hulbój MM (2007) Packet sampling for network monitoring. Technical report, CERN - HP Procurve openlab project
37.
Zurück zum Zitat Sperotto A, Sadre R, Vliet F, Pras A (2009) A labeled data set for flow-based intrusion detection. In: Proceedings of the 9th IEEE international workshop on ip operations and management(IPOM 2009) (Venice, Italy, Oct.), LNCS Series, Springer-Verlag, Berlin Heidelberg, vol. 5843, pp 39–50 Sperotto A, Sadre R, Vliet F, Pras A (2009) A labeled data set for flow-based intrusion detection. In: Proceedings of the 9th IEEE international workshop on ip operations and management(IPOM 2009) (Venice, Italy, Oct.), LNCS Series, Springer-Verlag, Berlin Heidelberg, vol. 5843, pp 39–50
38.
Zurück zum Zitat Zuev D, Moore AW (2005) Traffic classification using a statistical approach. In: Proceedings of the passive and active measurement conference (PAM 2005), LNCS Series, Springer-Verlag, Berlin Heidelberg, vol. 3431, pp 321–324 Zuev D, Moore AW (2005) Traffic classification using a statistical approach. In: Proceedings of the passive and active measurement conference (PAM 2005), LNCS Series, Springer-Verlag, Berlin Heidelberg, vol. 3431, pp 321–324
39.
Zurück zum Zitat Karagiannis T, Papagiannaki K, Faloutsos M (2005) BLINC: multilevel traffic classification in the dark. In: Proceedings of the ACM SIGCOMM conferenece. on applications, technologies, architectures, and protocols for computer communications, ACM, New York, NY, USA, vol. 35, no. 4, pp 229–240 Karagiannis T, Papagiannaki K, Faloutsos M (2005) BLINC: multilevel traffic classification in the dark. In: Proceedings of the ACM SIGCOMM conferenece. on applications, technologies, architectures, and protocols for computer communications, ACM, New York, NY, USA, vol. 35, no. 4, pp 229–240
40.
Zurück zum Zitat Salgarelli L, Gringoli F, Karagiannis T (2007) Comparing traffic classifiers. ACM SIGCOMM Comput Commun Rev 37(3):65–68CrossRef Salgarelli L, Gringoli F, Karagiannis T (2007) Comparing traffic classifiers. ACM SIGCOMM Comput Commun Rev 37(3):65–68CrossRef
41.
Zurück zum Zitat Canini M, Li W, Moore AW, Bolla R (2009) GTVS: boosting the collection of application traffic ground truth. In: Proceedings of the 1st international workshop on traffic monitoring and analysis (TMA’09) (Aachen, Germany), Springer Verlag, Heidelberg, Germany, pp 54–63 Canini M, Li W, Moore AW, Bolla R (2009) GTVS: boosting the collection of application traffic ground truth. In: Proceedings of the 1st international workshop on traffic monitoring and analysis (TMA’09) (Aachen, Germany), Springer Verlag, Heidelberg, Germany, pp 54–63
42.
Zurück zum Zitat Gringoli F, Salgarelli L, Dusi M, Cascarano N, Risso F, Claffy KC (2009) GT: picking up the truth from the ground for Internet traffic. ACM SIGCOMM Comput Commun Rev 39(5):13–18CrossRef Gringoli F, Salgarelli L, Dusi M, Cascarano N, Risso F, Claffy KC (2009) GT: picking up the truth from the ground for Internet traffic. ACM SIGCOMM Comput Commun Rev 39(5):13–18CrossRef
43.
Zurück zum Zitat Szabó G, Orincsay D, Malomsoky S, Szabó I (2008) On the validation of traffic classification algorithms. In: Proceedings of the passive and active measurement conference (PAM 2008) (Cleveland, OH, USA), LNCS Series, Springer-Verlag, Berlin Heidelberg, vol. 4979, pp 72–81 Szabó G, Orincsay D, Malomsoky S, Szabó I (2008) On the validation of traffic classification algorithms. In: Proceedings of the passive and active measurement conference (PAM 2008) (Cleveland, OH, USA), LNCS Series, Springer-Verlag, Berlin Heidelberg, vol. 4979, pp 72–81
44.
Zurück zum Zitat Makhoul J, Kubala F, Schwartz R, Weischedel R (1999) Performance measures for information extraction. In: Proceedings of the DARPA Broadcast News Workshop (Herndon, VA, USA), pp 249–252 Makhoul J, Kubala F, Schwartz R, Weischedel R (1999) Performance measures for information extraction. In: Proceedings of the DARPA Broadcast News Workshop (Herndon, VA, USA), pp 249–252
45.
Zurück zum Zitat Olson DL, Delen D (2008) Advanced data mining techniques, 1st edition, Springer Olson DL, Delen D (2008) Advanced data mining techniques, 1st edition, Springer
46.
Zurück zum Zitat Wang Y (2008) Statistical techniques for network security: modern statistically-based intrusion detection and protection. In: Premier Reference Source, Information Science Reference Wang Y (2008) Statistical techniques for network security: modern statistically-based intrusion detection and protection. In: Premier Reference Source, Information Science Reference
47.
Zurück zum Zitat Raahemi B, Zhong W, Liu J (2008) Peer-to-peer traffic identification by mining IP layer data streams using concept-adapting very fast decision tree. In: Proceedings of the 20th IEEE international conference on tools with artificial intelligence (ICTAI’08), IEEE, vol. 1, pp. 525–532 Raahemi B, Zhong W, Liu J (2008) Peer-to-peer traffic identification by mining IP layer data streams using concept-adapting very fast decision tree. In: Proceedings of the 20th IEEE international conference on tools with artificial intelligence (ICTAI’08), IEEE, vol. 1, pp. 525–532
49.
Zurück zum Zitat Gomes JV, Inacio PRM, Pereira M, Freire MM, Monteiro PP (2013) Detection and classification of peer-to-peer traffic: A survey. In: ACM Computing Surveys (CSUR), NY, USA, vol. 45, no. 3 Gomes JV, Inacio PRM, Pereira M, Freire MM, Monteiro PP (2013) Detection and classification of peer-to-peer traffic: A survey. In: ACM Computing Surveys (CSUR), NY, USA, vol. 45, no. 3
50.
Zurück zum Zitat Moore AW, Papagiannaki K (2005) Toward the accurate identification of network applications. In: Proceedings of the 6th international conference on Passive and Active Network Measurement (PAM 2005), pp 41–54 Moore AW, Papagiannaki K (2005) Toward the accurate identification of network applications. In: Proceedings of the 6th international conference on Passive and Active Network Measurement (PAM 2005), pp 41–54
51.
Zurück zum Zitat Karagiannis T, Broido A, Brownlee N, Claffy KC, Faloutsos M (2004) Is P2P dying or just hiding?. In: Proceedings of the IEEE global telecommunications conference (GLOBECOM’04), vol. 3, pp. 1532–1538 Karagiannis T, Broido A, Brownlee N, Claffy KC, Faloutsos M (2004) Is P2P dying or just hiding?. In: Proceedings of the IEEE global telecommunications conference (GLOBECOM’04), vol. 3, pp. 1532–1538
52.
Zurück zum Zitat Roughan M, Sen S, Spatscheck O, Duffield N (2004) Class-of-service mapping for QoS: A statistical signature-based approach to IP traffic classification. In: Proceedings of the 4th ACM SIGCOMM conference on Internet Measurement (IMC 2004), ACM, New York, NY, USA, pp 135–148 Roughan M, Sen S, Spatscheck O, Duffield N (2004) Class-of-service mapping for QoS: A statistical signature-based approach to IP traffic classification. In: Proceedings of the 4th ACM SIGCOMM conference on Internet Measurement (IMC 2004), ACM, New York, NY, USA, pp 135–148
53.
Zurück zum Zitat Sen S, Spatscheck O, Wang D (2004) Accurate, scalable in network identification of P2P traffic using application signatures. In: Proceedings of the 13th international conference on World Wide Web (WWW 2004), ACM, New York, NY, USA, pp 512–521 Sen S, Spatscheck O, Wang D (2004) Accurate, scalable in network identification of P2P traffic using application signatures. In: Proceedings of the 13th international conference on World Wide Web (WWW 2004), ACM, New York, NY, USA, pp 512–521
54.
Zurück zum Zitat Karagiannis T, Broido A, Faloutsos M, Claffy KC (2004) Transport layer identification of P2P traffic. In: Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, (IMC 2004), pp 121–134 Karagiannis T, Broido A, Faloutsos M, Claffy KC (2004) Transport layer identification of P2P traffic. In: Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, (IMC 2004), pp 121–134
55.
Zurück zum Zitat Wang K, Stolfo SJ (2004) Anomalous payload-based network intrusion detection. In: Lecture Notes in Computer Science, Springer, Berlin, vol. 3224, pp 203–222 Wang K, Stolfo SJ (2004) Anomalous payload-based network intrusion detection. In: Lecture Notes in Computer Science, Springer, Berlin, vol. 3224, pp 203–222
56.
Zurück zum Zitat Song T, Zhou Z (2013) File aware P2P traffic classification: an aid to network management. J Peer-to-Peer Netw Appl (Springer) 6(3):325–339CrossRef Song T, Zhou Z (2013) File aware P2P traffic classification: an aid to network management. J Peer-to-Peer Netw Appl (Springer) 6(3):325–339CrossRef
57.
Zurück zum Zitat Turkett WH, Karode AV, Fulp EW (2008) In-the-dark network traffic classification using support vector machines. In: Proceedings of the 20th National Conference on innovative applications of artificial intelligence (IAAI 2008), AAAI Press, pp 1745–1750 Turkett WH, Karode AV, Fulp EW (2008) In-the-dark network traffic classification using support vector machines. In: Proceedings of the 20th National Conference on innovative applications of artificial intelligence (IAAI 2008), AAAI Press, pp 1745–1750
58.
Zurück zum Zitat Freire EP, Ziviani A, Salles RM (2008) Detecting Skype flows in web traffic. In: Proceedings of the IEEE network operations and management symposium (NOMS 2008), IEEE, pp. 89–96 Freire EP, Ziviani A, Salles RM (2008) Detecting Skype flows in web traffic. In: Proceedings of the IEEE network operations and management symposium (NOMS 2008), IEEE, pp. 89–96
59.
Zurück zum Zitat Freire EP, Ziviani A, Salles RM (2008) Detecting VoIP calls hidden in web traffic. IEEE Trans Netw Serv Manag 5(4):204–214CrossRef Freire EP, Ziviani A, Salles RM (2008) Detecting VoIP calls hidden in web traffic. IEEE Trans Netw Serv Manag 5(4):204–214CrossRef
60.
Zurück zum Zitat Gomes JVP, Inácio PRM, Freire MM, Pereira M, Monteiro PP (2008) Analysis of peer-to-peer traffic using a behavioural method based on entropy. In: Proceedings of the 27th IEEE International Performance Computing and Communications Conference (IPCCC 2008), IEEE Computer Society Press, Austin, Texas, pp. 201–208 Gomes JVP, Inácio PRM, Freire MM, Pereira M, Monteiro PP (2008) Analysis of peer-to-peer traffic using a behavioural method based on entropy. In: Proceedings of the 27th IEEE International Performance Computing and Communications Conference (IPCCC 2008), IEEE Computer Society Press, Austin, Texas, pp. 201–208
61.
Zurück zum Zitat Sun M, Chen J (2011) Research of the traffic characteristics for the real time online traffic classification. J China Univ Posts Telecommun (Elsevier) 18(3):92–98MathSciNetCrossRef Sun M, Chen J (2011) Research of the traffic characteristics for the real time online traffic classification. J China Univ Posts Telecommun (Elsevier) 18(3):92–98MathSciNetCrossRef
62.
Zurück zum Zitat Moore AW, Zuev D (2006) Discriminators for use in flow-based classification. In: Proceedings of the 20th BCS HCI Group Conference (HCI’06), London, UK, Sep 11–15 Moore AW, Zuev D (2006) Discriminators for use in flow-based classification. In: Proceedings of the 20th BCS HCI Group Conference (HCI’06), London, UK, Sep 11–15
63.
Zurück zum Zitat Bernaille L, Teixeira R, Akodkenou I, Soule A, Salamatian K (2006) Traffic classification on the fly. ACM SIGCOMM Comput Commun Rev 36(2):23–26CrossRef Bernaille L, Teixeira R, Akodkenou I, Soule A, Salamatian K (2006) Traffic classification on the fly. ACM SIGCOMM Comput Commun Rev 36(2):23–26CrossRef
64.
Zurück zum Zitat He J, Yang Y, Qiao Y, Deng W (2015) Fine-grained P2P traffic classification by simply counting flows. Front Inf Technol Electron Eng 16(5):391–403CrossRef He J, Yang Y, Qiao Y, Deng W (2015) Fine-grained P2P traffic classification by simply counting flows. Front Inf Technol Electron Eng 16(5):391–403CrossRef
65.
Zurück zum Zitat Yang Kai, Wang B, Zhang Z (2013) A method of identifying P2P live streaming based on union features. In 4th IEEE International Conference on Software Engineering and Service Science (ICSESS), Beijing, pp. 426–429 Yang Kai, Wang B, Zhang Z (2013) A method of identifying P2P live streaming based on union features. In 4th IEEE International Conference on Software Engineering and Service Science (ICSESS), Beijing, pp. 426–429
66.
Zurück zum Zitat Qin T, Wang L, Zhao D, Zhu M (2015) CUFTI: methods for core users finding and traffic identification in P2P systems. J Peer-to-Peer Netw Appl (Springer) 9(2):424–435CrossRef Qin T, Wang L, Zhao D, Zhu M (2015) CUFTI: methods for core users finding and traffic identification in P2P systems. J Peer-to-Peer Netw Appl (Springer) 9(2):424–435CrossRef
67.
Zurück zum Zitat Zhang Q, Ma Y, Zhang P, Wang J, Li X (2004) Netflow Based P2P detection in UDP traffic. In IEEE 5th International Conference on Intelligent Control and Information Processing (ICICIP), Dalian, pp. 250–254 Zhang Q, Ma Y, Zhang P, Wang J, Li X (2004) Netflow Based P2P detection in UDP traffic. In IEEE 5th International Conference on Intelligent Control and Information Processing (ICICIP), Dalian, pp. 250–254
68.
Zurück zum Zitat Perényi M, Dang TD, Gefferth A, Molnár S (2006) Identification and analysis of peer-to-peer traffic. J Commun 1(7):36–46CrossRef Perényi M, Dang TD, Gefferth A, Molnár S (2006) Identification and analysis of peer-to-peer traffic. J Commun 1(7):36–46CrossRef
69.
Zurück zum Zitat John W, Tafvelin S (2008) Heuristics to classify Internet backbone traffic based on connection patterns. In: Proceedings of the international conference on information networking (ICOIN 2008), IEEE, pp. 1–5 John W, Tafvelin S (2008) Heuristics to classify Internet backbone traffic based on connection patterns. In: Proceedings of the international conference on information networking (ICOIN 2008), IEEE, pp. 1–5
70.
Zurück zum Zitat Hong W (2011) A novel method for P2P traffic identification. In: Procedia Engineering (Elsevier), vol. 23, pp. 204–209 Hong W (2011) A novel method for P2P traffic identification. In: Procedia Engineering (Elsevier), vol. 23, pp. 204–209
71.
Zurück zum Zitat Reddy JM, Hota C (2015) Heuristic-based real-time P2P traffic identification. In IEEE international conference on emerging information technology and engineering solutions (EITES), Pune, pp. 38–43 Reddy JM, Hota C (2015) Heuristic-based real-time P2P traffic identification. In IEEE international conference on emerging information technology and engineering solutions (EITES), Pune, pp. 38–43
72.
Zurück zum Zitat Bashir A, Huang C, Nandy B, Seddigh N (2013) Classifying P2P activity in netflow records: a case study on BitTorrent. In IEEE International Conference on Communications (ICC), Budapest, pp. 3018–3023 Bashir A, Huang C, Nandy B, Seddigh N (2013) Classifying P2P activity in netflow records: a case study on BitTorrent. In IEEE International Conference on Communications (ICC), Budapest, pp. 3018–3023
73.
Zurück zum Zitat Mcgregor A, Hall M, Lorier P, Brunskill J (2004) Flow clustering using machine learning techniques. In: Proceedings of the passive and active measurement workshop (PAM 2004) (Antibes Juanles- Pins, France). LNCS Series, Springer-Verlag, Berlin Heidelberg, vol. 3015, pp 205–214 Mcgregor A, Hall M, Lorier P, Brunskill J (2004) Flow clustering using machine learning techniques. In: Proceedings of the passive and active measurement workshop (PAM 2004) (Antibes Juanles- Pins, France). LNCS Series, Springer-Verlag, Berlin Heidelberg, vol. 3015, pp 205–214
74.
Zurück zum Zitat Moore AW, Zuev D (2005) Internet traffic classification using bayesian analysis techniques. ACM SIGMETRICS Perform Eval Rev 33(1):50–60CrossRef Moore AW, Zuev D (2005) Internet traffic classification using bayesian analysis techniques. ACM SIGMETRICS Perform Eval Rev 33(1):50–60CrossRef
75.
Zurück zum Zitat Branch PA, Heyde A, Armitage GJ (2009) Rapid identification of Skype traffic flows. In: Proceedings of the 18th international workshop on network and operating system support for digital audio and video (NOSSDAV’09), ACM, NY, USA, pp 91–96 Branch PA, Heyde A, Armitage GJ (2009) Rapid identification of Skype traffic flows. In: Proceedings of the 18th international workshop on network and operating system support for digital audio and video (NOSSDAV’09), ACM, NY, USA, pp 91–96
76.
Zurück zum Zitat Schmidt SEG, Soysal M (2006) An intrusion detection based approach for the scalable detection of P2P traffic in the national academic backbone network. In: Proceedings of the International Symposium on Computer Networks (ISCN 2006), IEEE, pp. 128–133 Schmidt SEG, Soysal M (2006) An intrusion detection based approach for the scalable detection of P2P traffic in the national academic backbone network. In: Proceedings of the International Symposium on Computer Networks (ISCN 2006), IEEE, pp. 128–133
77.
Zurück zum Zitat Cao J, Chen A, Widjaja I, Zhou N (2008) Online identification of applications using statistical behavior analysis. In: Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM 2008), IEEE, pp. 1–6 Cao J, Chen A, Widjaja I, Zhou N (2008) Online identification of applications using statistical behavior analysis. In: Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM 2008), IEEE, pp. 1–6
78.
Zurück zum Zitat Angevine D, Zincir-heywood AN (2008) A preliminary investigation of Skype traffic classification using a minimalist feature set. In: Proceedings of the 3rd International Conference on Availability, Reliability and Security (ARES 08), IEEE Computer Society Press, pp. 1075–1079 Angevine D, Zincir-heywood AN (2008) A preliminary investigation of Skype traffic classification using a minimalist feature set. In: Proceedings of the 3rd International Conference on Availability, Reliability and Security (ARES 08), IEEE Computer Society Press, pp. 1075–1079
79.
Zurück zum Zitat Wang Y-H, Gau V, Bosaw T, Hwang J-N, Lippman A, Liebennan D, Wu I-C (2008) Generalization performance analysis of flow-based peer-to-peer traffic identification. In: Proceedings of the IEEE Workshop on Machine Learning for Signal Processing (MLSP 2008), IEEE, pp 267–272 Wang Y-H, Gau V, Bosaw T, Hwang J-N, Lippman A, Liebennan D, Wu I-C (2008) Generalization performance analysis of flow-based peer-to-peer traffic identification. In: Proceedings of the IEEE Workshop on Machine Learning for Signal Processing (MLSP 2008), IEEE, pp 267–272
80.
Zurück zum Zitat Dainotti A, de Donato W, Pescape A, Rossi PS (2008) Classification of network traffic via packet-level hidden markov models. In: Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM 2008), IEEE, pp. 1–5 Dainotti A, de Donato W, Pescape A, Rossi PS (2008) Classification of network traffic via packet-level hidden markov models. In: Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM 2008), IEEE, pp. 1–5
81.
Zurück zum Zitat Valenti S, Rossi D, Meo M, Mellia M, Bermolen P (2009) Accurate, fine-grained classification of P2P-TV applications by simply counting packets. In: Proceedings of the 1st international workshop on traffic monitoring and analysis (TMA’09), LNCS Series, vol. 5537. Springer-Verlag, Berlin, Heidelberg, pp. 84–92 Valenti S, Rossi D, Meo M, Mellia M, Bermolen P (2009) Accurate, fine-grained classification of P2P-TV applications by simply counting packets. In: Proceedings of the 1st international workshop on traffic monitoring and analysis (TMA’09), LNCS Series, vol. 5537. Springer-Verlag, Berlin, Heidelberg, pp. 84–92
82.
Zurück zum Zitat Liu H, Feng W, Huang Y, Li X (2007) A peer-to-peer traffic identification method using machine learning. In: Proceedings of the international conference on networking, architecture, and storage (NAS 2007), IEEE, pp. 155–160 Liu H, Feng W, Huang Y, Li X (2007) A peer-to-peer traffic identification method using machine learning. In: Proceedings of the international conference on networking, architecture, and storage (NAS 2007), IEEE, pp. 155–160
83.
Zurück zum Zitat Raahemi B, Kouznetsov A, Hayajneh A, Rabinovitch P (2008) Classification of peer-to-peer traffic using incremental neural networks (fuzzy ARTMAP). In: Proceedings of the Canadian conference on electrical and computer engineering (CCECE 2008), IEEE, pp. 719–724 Raahemi B, Kouznetsov A, Hayajneh A, Rabinovitch P (2008) Classification of peer-to-peer traffic using incremental neural networks (fuzzy ARTMAP). In: Proceedings of the Canadian conference on electrical and computer engineering (CCECE 2008), IEEE, pp. 719–724
84.
Zurück zum Zitat Hu Y, Chiu D-M, Lui JCS (2008) Application identification based on network behavioral profiles. In: Proceedings of the 16th International Workshop on Quality of Service (IWQoS 2008), IEEE, pp. 219–228 Hu Y, Chiu D-M, Lui JCS (2008) Application identification based on network behavioral profiles. In: Proceedings of the 16th International Workshop on Quality of Service (IWQoS 2008), IEEE, pp. 219–228
85.
Zurück zum Zitat Hu Y, Chiu D-M, Lui JCS (2009) Profiling and identification of P2P traffic. Comput Netw 53(6):849–863CrossRefMATH Hu Y, Chiu D-M, Lui JCS (2009) Profiling and identification of P2P traffic. Comput Netw 53(6):849–863CrossRefMATH
86.
Zurück zum Zitat Liu S-M, Sun Z-X (2014) Active learning for P2P traffic identification. In: Journal of Peer-to-Peer Networking and Applications (Springer) Liu S-M, Sun Z-X (2014) Active learning for P2P traffic identification. In: Journal of Peer-to-Peer Networking and Applications (Springer)
87.
Zurück zum Zitat Moore AW, Zuev D (2005) Internet traffic classification using Bayesian analysis techniques. In: Proceedings of the 2005 ACM SIGMETRICS international conference on Measurement and modeling of computer systems, ACM, NY, USA, pp. 50–60 Moore AW, Zuev D (2005) Internet traffic classification using Bayesian analysis techniques. In: Proceedings of the 2005 ACM SIGMETRICS international conference on Measurement and modeling of computer systems, ACM, NY, USA, pp. 50–60
88.
Zurück zum Zitat Jiang D, Tao L (2013) P2P traffic identification research based on the SVM. In: 22nd Wireless and Optical Communication Conference (WOCC, 2013), IEEE, Chongqing, China, pp. 683–686 Jiang D, Tao L (2013) P2P traffic identification research based on the SVM. In: 22nd Wireless and Optical Communication Conference (WOCC, 2013), IEEE, Chongqing, China, pp. 683–686
89.
Zurück zum Zitat Gong J, Wang W, Wang P, Sun Z (2014) P2P traffic identification method based on an improvement incremental SVM learning algorithm. In: Proceeding of international symposium on wireless personal multimedia communications (WPMC 2014), IEEE, Sydney, NSW, pp. 174–179 Gong J, Wang W, Wang P, Sun Z (2014) P2P traffic identification method based on an improvement incremental SVM learning algorithm. In: Proceeding of international symposium on wireless personal multimedia communications (WPMC 2014), IEEE, Sydney, NSW, pp. 174–179
90.
Zurück zum Zitat Deng S, Luo J, Liu Y, Wang X, Yang J (2014) Ensemble learning model for P2P traffic identification. In: 11th international conference on fuzzy systems and knowledge discovery (FSKD 2014), IEEE, Xiamen, pp. 436–440 Deng S, Luo J, Liu Y, Wang X, Yang J (2014) Ensemble learning model for P2P traffic identification. In: 11th international conference on fuzzy systems and knowledge discovery (FSKD 2014), IEEE, Xiamen, pp. 436–440
91.
Zurück zum Zitat Jie H, Yuexiang Y, Yong Q, Chuan T (2013) Accurate classification of P2P traffic by clustering flows. Commun China IEEE 10(11):42–51CrossRef Jie H, Yuexiang Y, Yong Q, Chuan T (2013) Accurate classification of P2P traffic by clustering flows. Commun China IEEE 10(11):42–51CrossRef
92.
Zurück zum Zitat Bozdogan C, Gokcen Y, Zincir I (2015) A preliminary investigation on the identification of peer to peer network applications. In Proceedings of the Companion Publication of the 2015 Annual Conference on Genetic and Evolutionary Computation, ACM, NY, USA, pp. 883–888 Bozdogan C, Gokcen Y, Zincir I (2015) A preliminary investigation on the identification of peer to peer network applications. In Proceedings of the Companion Publication of the 2015 Annual Conference on Genetic and Evolutionary Computation, ACM, NY, USA, pp. 883–888
93.
Zurück zum Zitat Dedinski I, Meer HD, Han L, Mathy L, Pezaros DP, Sventek JS, Xiaoying Z (2005) Cross-layer peer-to-peer traffic identification and optimization based on active networking. In: Proceedings of the 7th annual international working conference on active and programmable networks (IWAN 2005) (Sophia Antipolis, France, Nov.). Springer-Verlag, Berlin Heidelberg, pp. 13–27 Dedinski I, Meer HD, Han L, Mathy L, Pezaros DP, Sventek JS, Xiaoying Z (2005) Cross-layer peer-to-peer traffic identification and optimization based on active networking. In: Proceedings of the 7th annual international working conference on active and programmable networks (IWAN 2005) (Sophia Antipolis, France, Nov.). Springer-Verlag, Berlin Heidelberg, pp. 13–27
94.
Zurück zum Zitat Adami D, Callegari C, Giordano S, Pagano M, Pepe T (2009) A real-time algorithm for Skype traffic detection and classification. In: Proceedings of the 9th international conference on next generation wired/wireless networking (NEW2AN’09) (St. Petersburg, Russia, Sept.), LNCS Series, vol. 5764. Springer-Verlag, Berlin Heidelberg, pp. 168–179 Adami D, Callegari C, Giordano S, Pagano M, Pepe T (2009) A real-time algorithm for Skype traffic detection and classification. In: Proceedings of the 9th international conference on next generation wired/wireless networking (NEW2AN’09) (St. Petersburg, Russia, Sept.), LNCS Series, vol. 5764. Springer-Verlag, Berlin Heidelberg, pp. 168–179
95.
Zurück zum Zitat Yan J, Wu Z, Luo H, Zhang S (2013) P2P traffic identification based on host and flow behaviour characteristics. Cybern Inf Technol 13(3):64–76 Yan J, Wu Z, Luo H, Zhang S (2013) P2P traffic identification based on host and flow behaviour characteristics. Cybern Inf Technol 13(3):64–76
96.
Zurück zum Zitat Ye W, Cho K (2014) Hybrid P2P traffic classification with heuristic rules and machine learning. J Soft Comput, Springer, Berlin Heidelberg 18(9):1815–1827CrossRef Ye W, Cho K (2014) Hybrid P2P traffic classification with heuristic rules and machine learning. J Soft Comput, Springer, Berlin Heidelberg 18(9):1815–1827CrossRef
97.
Zurück zum Zitat Ye W, Cho K (2015) P2P and P2P botnet traffic classification in two stages. In Journal of Soft Computing, Springer Berlin Heidelberg, pp. 1–12 Ye W, Cho K (2015) P2P and P2P botnet traffic classification in two stages. In Journal of Soft Computing, Springer Berlin Heidelberg, pp. 1–12
98.
Zurück zum Zitat Wang D, Zhang L, Yuan Z, Xue Y, Dong Y (2014) Characterizing application behaviors for classifying P2P traffic. In: International Conference on Computing, Networking and Communications (ICNC 2014), IEEE, Honolulu, HI, pp. 21–25 Wang D, Zhang L, Yuan Z, Xue Y, Dong Y (2014) Characterizing application behaviors for classifying P2P traffic. In: International Conference on Computing, Networking and Communications (ICNC 2014), IEEE, Honolulu, HI, pp. 21–25
99.
Zurück zum Zitat Yang Z, Li L, Ji Q, Zhu Y (2012) Cocktail method for BitTorrent traffic identification in real time. J Comput 7(1):85–95MathSciNet Yang Z, Li L, Ji Q, Zhu Y (2012) Cocktail method for BitTorrent traffic identification in real time. J Comput 7(1):85–95MathSciNet
100.
Zurück zum Zitat Korczynski M, Duda A (2014) Markov chain fingerprinting to classify encrypted traffic. In: Proceedings of 2014 IEEE, INFOCOM, Toronto, pp. 781–789 Korczynski M, Duda A (2014) Markov chain fingerprinting to classify encrypted traffic. In: Proceedings of 2014 IEEE, INFOCOM, Toronto, pp. 781–789
101.
Zurück zum Zitat Alshammari R, Zincir-Heywood AN (2015) Identification of VoIP encrypted traffic using a machine learning approach. J King Saud Univ Comput Inf Sci NY, USA 27(1):77–92 Alshammari R, Zincir-Heywood AN (2015) Identification of VoIP encrypted traffic using a machine learning approach. J King Saud Univ Comput Inf Sci NY, USA 27(1):77–92
102.
Zurück zum Zitat Kumano Y, Ata S, Nakamura N, Nakahira Y, Oka I (2014) Towards real-time processing for application identification of encrypted traffic. In: International conference on computing, networking and communications (ICNC), Honolulu, pp. 136–140 Kumano Y, Ata S, Nakamura N, Nakahira Y, Oka I (2014) Towards real-time processing for application identification of encrypted traffic. In: International conference on computing, networking and communications (ICNC), Honolulu, pp. 136–140
103.
Zurück zum Zitat Wang X, Yang Y, He J (2014) Identifying P2P network activities on encrypted traffic. In: 13th IEEE international conference on trust, security and privacy in computing and communications (TrustCom), Beijing, pp. 893–899 Wang X, Yang Y, He J (2014) Identifying P2P network activities on encrypted traffic. In: 13th IEEE international conference on trust, security and privacy in computing and communications (TrustCom), Beijing, pp. 893–899
104.
Zurück zum Zitat Du Y, Zhang R (2013) Design of a method for encrypted P2P traffic identification using K-means algorithm. J Telecommun Syst (Springer) 53(1):163–168CrossRef Du Y, Zhang R (2013) Design of a method for encrypted P2P traffic identification using K-means algorithm. J Telecommun Syst (Springer) 53(1):163–168CrossRef
105.
Zurück zum Zitat Datta J, Kataria N, Hubballi N (2015) Network traffic classification in encrypted environment: a case study of google hangout. In 21st IEEE National Conference on Communications (NCC), Mumbai, pp. 1–6 Datta J, Kataria N, Hubballi N (2015) Network traffic classification in encrypted environment: a case study of google hangout. In 21st IEEE National Conference on Communications (NCC), Mumbai, pp. 1–6
106.
Zurück zum Zitat Saroiu S, Gummadi KP, Dunn RJ, Gribble SD, Levy HM (2002) An analysis of Internet content delivery systems. In: Proceedings of the 5th symposium on operating systems design and implementation (OSDI’02), ACM, New York, NY, USA, vol. 36, pp 315–327 Saroiu S, Gummadi KP, Dunn RJ, Gribble SD, Levy HM (2002) An analysis of Internet content delivery systems. In: Proceedings of the 5th symposium on operating systems design and implementation (OSDI’02), ACM, New York, NY, USA, vol. 36, pp 315–327
107.
Zurück zum Zitat Leibowitz N, Bergman A, Ben-shaul R, Shavit A (2002) Are file swapping networks cacheable? Characterizing P2P traffic. In: Proceedings of the 7th international workshop on web content caching and distribution (WCW) Leibowitz N, Bergman A, Ben-shaul R, Shavit A (2002) Are file swapping networks cacheable? Characterizing P2P traffic. In: Proceedings of the 7th international workshop on web content caching and distribution (WCW)
108.
Zurück zum Zitat Gerber A, Houle J, Nguyen H, Roughan M, Sen S (2003) P2P, the gorilla in the cable. In: Proceedings of the national cable & telecommunications association (NCTA), pp 8–11 Gerber A, Houle J, Nguyen H, Roughan M, Sen S (2003) P2P, the gorilla in the cable. In: Proceedings of the national cable & telecommunications association (NCTA), pp 8–11
109.
Zurück zum Zitat Spognardi A, Lucarelli A, Pietro RD (2005) A methodology for P2P file-sharing traffic detection. In: Proceedings of the 2nd international workshop on hot topics in peer-to-peer systems (HOT-P2P’05), IEEE Computer Society, Washington, DC, USA, pp. 52–61 Spognardi A, Lucarelli A, Pietro RD (2005) A methodology for P2P file-sharing traffic detection. In: Proceedings of the 2nd international workshop on hot topics in peer-to-peer systems (HOT-P2P’05), IEEE Computer Society, Washington, DC, USA, pp. 52–61
110.
Zurück zum Zitat Bin L, Zhi-Tang L, Hao T (2007) A methodology for P2P traffic measurement using application signature work-in-progress. In: Proceedings of the 2nd international conference on scalable information systems (InfoScale’07), ICST, Brussels, Belgium Bin L, Zhi-Tang L, Hao T (2007) A methodology for P2P traffic measurement using application signature work-in-progress. In: Proceedings of the 2nd international conference on scalable information systems (InfoScale’07), ICST, Brussels, Belgium
111.
Zurück zum Zitat Dewes C, Wichmann A, Feldmann A (2003) An analysis of Internet chat systems. In: Proceedings of the ACM SIGCOMM internet measurement conference (IMC 2003), ACM, New York, NY, USA, pp. 51–64 Dewes C, Wichmann A, Feldmann A (2003) An analysis of Internet chat systems. In: Proceedings of the ACM SIGCOMM internet measurement conference (IMC 2003), ACM, New York, NY, USA, pp. 51–64
112.
Zurück zum Zitat Guo Z, Qiu Z (2008) Identification peer-to-peer traffic for high speed networks using packet sampling and application signatures. In: Proceedings of the 9th international conference on signal processing (ICSP 2008), IEEE, pp. 2013–2019 Guo Z, Qiu Z (2008) Identification peer-to-peer traffic for high speed networks using packet sampling and application signatures. In: Proceedings of the 9th international conference on signal processing (ICSP 2008), IEEE, pp. 2013–2019
113.
Zurück zum Zitat Cascarano N, Ciminiera L, Risso F (2010) Improving cost and accuracy of DPI traffic classifiers. In: Proceedings of the 2010 ACM symposium on applied computing (SAC 2010), ACM, New York, NY, USA, pp. 641–646 Cascarano N, Ciminiera L, Risso F (2010) Improving cost and accuracy of DPI traffic classifiers. In: Proceedings of the 2010 ACM symposium on applied computing (SAC 2010), ACM, New York, NY, USA, pp. 641–646
114.
Zurück zum Zitat Carvalho DA, Pereira M, Freire MM (2009) Towards the detection of encrypted BitTorrent traffic through deep packet inspection. In: Proceedings of the international conference on security technology (SecTech 2009), communications in computer and information science series, Springer-Verlag, Berlin Heidelberg, vol. 58, pp. 265–272 Carvalho DA, Pereira M, Freire MM (2009) Towards the detection of encrypted BitTorrent traffic through deep packet inspection. In: Proceedings of the international conference on security technology (SecTech 2009), communications in computer and information science series, Springer-Verlag, Berlin Heidelberg, vol. 58, pp. 265–272
115.
Zurück zum Zitat Carvalho DA, Pereira M, Freire MM (2009) Detection of peer-to-peer TV traffic through deep packet inspection. In: Acta da 9a Conference sobre Redes de Computadores (Oeiras, Portugal, Oct.). INESC-ID and Instituto Superior Técnico, 6 Carvalho DA, Pereira M, Freire MM (2009) Detection of peer-to-peer TV traffic through deep packet inspection. In: Acta da 9a Conference sobre Redes de Computadores (Oeiras, Portugal, Oct.). INESC-ID and Instituto Superior Técnico, 6
116.
Zurück zum Zitat Freire MM, Carvalho DA, Pereira M (2009) Detection of encrypted traffic in eDonkey network through application signatures. In: Proceedings of the 1st international conference on advances in P2P systems (AP2PS 2009), IEEE Computer Society Press, Los Alamitos, CA, USA, pp.174–179 Freire MM, Carvalho DA, Pereira M (2009) Detection of encrypted traffic in eDonkey network through application signatures. In: Proceedings of the 1st international conference on advances in P2P systems (AP2PS 2009), IEEE Computer Society Press, Los Alamitos, CA, USA, pp.174–179
117.
Zurück zum Zitat Park B.-C, Won YJ, Kim M.-S, Hong JW (2008) Towards automated application signature generation for traffic identification. In: Proceedings of the IEEE/IFIP Network Operations and Management Symposium (NOMS 2008), IEEE, pp. 160–167 Park B.-C, Won YJ, Kim M.-S, Hong JW (2008) Towards automated application signature generation for traffic identification. In: Proceedings of the IEEE/IFIP Network Operations and Management Symposium (NOMS 2008), IEEE, pp. 160–167
Metadaten
Titel
Identifying P2P traffic: A survey
verfasst von
Max Bhatia
Mritunjay Kumar Rai
Publikationsdatum
18.06.2016
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 5/2017
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-016-0471-2

Weitere Artikel der Ausgabe 5/2017

Peer-to-Peer Networking and Applications 5/2017 Zur Ausgabe

Premium Partner