期刊文献+

Accurate Classification of P2P Traffic by Clustering Flows 被引量:2

基于簇流的P2P流量精确分类技术(英文)
在线阅读 下载PDF
导出
摘要 P2P traffic has always been a dominant portion of Internet traffic since its emergence in the late 1990s. The method used to accurately classify P2P traffic remains a key problem for Internet Service Producers (ISPs) and network managers. This paper proposes a novel approach to the accurate classification of P2P traffic at a fine-grained level, which depends solely on the number of special flows during small time intervals. These special flows, named Clustering Flows (CFs), are de- fined as the most frequent and steady flows generated by P2P applications. Hence we are able to classify P2P applications by detecting tlle appearance of corresponding CFs. Com- pared to existing approaches, our classifier can realise high classification accuracy by ex- ploiting only several generic properties of flows, instead of extracting sophisticated fea- tures from host behaviours or transport layer data. We validate our framework on a large set of P2P traffic traces using a Support Vector Machine (SVM). Experimental results show that our approach correctly classifies P2P ap- plications with an average true positive rate of above 98% and a negligible false positive rate of about 0.01%. P2P traffic has always been a dominant portion of Internet traffic since its emergence in the late 1990s.The method used to accurately classify P2P traffic remains a key problem for Internet Service Producers(ISPs)and network managers.This paper proposes a novel approach to the accurate classification of P2P traffic at a fine-grained level,which depends solely on the number of special flows during small time intervals.These special flows,named Clustering Flows(CFs),are defined as the most frequent and steady flows generated by P2P applications.Hence we are able to classify P2P applications by detecting the appearance of corresponding CFs.Compared to existing approaches,our classifier can realise high classification accuracy by exploiting only several generic properties of flows,instead of extracting sophisticated features from host behaviours or transport layer data.We validate our framework on a large set of P2P traffic traces using a Support Vector Machine(SVM).Experimental results show that our approach correctly classifies P2P applications with an average true positive rate of above 98%and a negligible false positive rate of about 0.01%.
出处 《China Communications》 SCIE CSCD 2013年第11期42-51,共10页 中国通信(英文版)
基金 supported by the National Natural Science Foundation of China under Grants No.61170286,No.61202486
关键词 traffic classification P2P fine-gr-ained support vector machine 分类精度 P2P 流量 互联网服务 聚类 网络管理人员 假阳性率 支持向量机
  • 相关文献

参考文献21

  • 1GOMES J V, INACIO P R M, PEREIRA M, et al. Detection and Classification of Peer-to-Peer Traffic: A Survey[J]. ACM Computing Surveys (CSUR), 2011,45(3): Article No. 30.
  • 2KARAGIANNIS 1. BROIDO A, BROWNLEE N, et 01. Is P2P Dying or Just Hiding?[C]// Proceedings of 47th Annual IEEE Global Telecommunications Conference 2004 (GLOBECOM'04): November 27-December 3, 2004. Dallas, TX, USA, 2004, 3: 1532-1538.
  • 3MOORE A W, PAPAGIANNAKI K. Toward the Accurate Identification of Network Applications[M]. Passive and Active Network Measurement. Springer Berlin Heidelberg, 2005: 41-54.
  • 4SEN S, SPATSCHECK 0, WANG Dongmei. Ac- curate, Scalable In-Network Identification of P2P Traffic Using Application Signatures[C]// Proceedings of the 13th International Conference on World Wide Web (WWW'04): May 17-22, 2004. New York, NY, USA, 2004: 512- 521.
  • 5DHAMANKAR R, KING R. Protocol Identification via Statistical Analysis (PISA)[J]. White Paper, Tipping Point, 2007.
  • 6HULLAR B, LAKI S, GYORGY A. Early Identification of Peer-to-Peer Traffic[C]/ / Proceedings of 2011 IEEE International Conference on Communications (lCC): June 5-9, 2011. Kyoto, Japan. IEEE Press, 2011: 1-6.
  • 7FINAMORE A, MELLIA M, MEO M, et 01. Kiss: Stochastic Packet Inspection Classifier for UDP Traffic[J]. IEEE/ACM Transactions on Networking, 2010, 18(5): 1505-1515.
  • 8CHEN Luying, CONG Rong, YANG Jie, et 01. P2P Streaming Traffic Classification in High-Speed Networks[J]. China Communications, 2011. 8(5): 70-78.
  • 9杜敏,陈兴蜀,谭骏.A Novel P2P Traffic Identification Algorithm Based on BPSO and Weighted KNN[J].China Communications,2011,8(2):52-58. 被引量:6
  • 10MOORE A, ZUEV D, CROGAN M. Discriminators for Use in Flow-Based Classification[M]. Queen Mary and Westfield College, 2005.

二级参考文献15

  • 1KIM J T,PARK H K,PAIK E H.Security Issues in Peer- to-peer Systems. Proceedings of the 7th International Conference on Advanced Communications Technology . 2005
  • 2GERBER A,,HOULE J,NGUYEN H, et al.P2P, the Gorilla in the Cable. Proceedings of National Cable & Telecommunications Association Conference . 2003
  • 3ZANDER S,NGUYEN T,ARMITAGE G.Automated Traffic Classification and Application Identification Using Machine Learning. Proceedings of the IEEE Conference on Local Computer Networks 30th Anniversary . 2005
  • 4LIU Hui,FENG Wenfeng,HUANG Yongfeng, et al.A Peer-to-peer Traffi c Identifi cation Method using Machine Learning. Proceedings of International Conference on Networking, Architecture, and Storage (NAS 2007) . 2007
  • 5ERMAN J,MAHANTI A,ARLITT M, et al.Offline/ Real-time Traffic Classification using Semi-supervised Learning. Performance Evaluation . 2007
  • 6LIU Feng,LI Zhitang,NIE Qingbin.A New Method of P2P Traffic Identification Based on Support Vector Machine at the Host Level. Proceedings of the 2009 International Conference on Information Technology and Computer Science . 2009
  • 7RAAHEMI B,ZHONG Weicai,LIU Jing.Peer-to-peerTraffi c Identifi cation by Mining IP Layer Data Streams Using Concept-adapting very Fast Decision Tree. Proceedings of the 20th IEEE International Conference on Tools with Artifi cial Intelligence . 2008
  • 8AZZOUNA N B,GUILLEMIN F.Impact of peer-to-peer applicationson wide area network traffic:an experimental approach. Proc ofIEEE Globel Telecommunications Conference . 2004
  • 9A.Moore,D.Zuev."Internet traffic classification using Bayesian analysis techniques". Sigmetrics2005 . 2005
  • 10Sen S,Wang J.Analyzing peer-to-peer traffic across large networks. IEEE ACM Transactions on Networking . 2004

共引文献5

同被引文献32

  • 1李玲娟,姬同亮,王汝传.小世界现象在P2P网络中的应用研究[J].南京邮电大学学报(自然科学版),2006,26(4):86-89. 被引量:6
  • 2赫南,李德毅,淦文燕,朱熙.复杂网络中重要性节点发掘综述[J].计算机科学,2007,34(12):1-5. 被引量:138
  • 3KARAGIANNIS T,BROIDO A,BROWNLEE N,et al. Is P2P dying or just hiding?[C] //Proc of the 47th Annual IEEE Global Telecommunications Conference. 2004:1532-1538.
  • 4HULLAR B,LAKI S,GYORGY A. Early identification of peer-to-peer traffic[C] //Proc of IEEE International Conference on Communications. [S. l.] :IEEE Press,2011:1-6.
  • 5LIU Chao-bin,YANG Yue-xiang,TANG Chuan. A classification method of unstructured P2P multicast video streaming based on SVM[C] //Proc of IEEE International Conference on Multimedia Information Networking and Security. 2009:68-72.
  • 6LIU Chao-bin,HE Jie,GUO Qiang. A real-time identification system of unstructured P2P multicast video streaming[C] //Proc of the 4th International Conference on Multimedia Information Networking and Security. 2012.
  • 7YANG Ai-min,JIANG Sheng-yi,DENG He. A P2P network traffic classification method using SVM[C] //Proc of the 9th International Conference on Young Computer Scientists. Washington DC:IEEE Computer Society,2008:398-403.
  • 8STUTZ B D,REJAIE R. Characterizing today’s Gnutella topology,CIS-TR-04-02[R].[S. l.] :University of Oregon,2004.
  • 9LI Juan,VUONG S. An efficient clustered architecture for P2P networks[C] //Proc of the 18th International Conference on Advanced Information Networking and Applications. 2004:278-283.
  • 10RAHBARINIA B,PERDISCI R,LANZI A,et al. PeerRush:mining for unwanted P2P traffic[C] //Proc of the 10th International Conference on Detection of Intrusions and Malware & Vulnerability Assessment. Berlin:Springer,2013:62-82.

引证文献2

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部