Misclassification of Game Traffic based on Port Numbers: A Case Study using Enemy Territory
نویسنده
چکیده
The identification of game traffic in the Internet is very useful for a number of tasks. For trend analysis it is important to find out how much game traffic is in the Internet and how much traffic certain games contribute. To provide better than best effort QoS for game traffic in the network it is necessary to identify game traffic before it can be prioritised. Traditionally, network applications have been classified based on port numbers. It has been argued that purely relying on port numbers does result in significant number of unidentified flows for applications such as peer-to-peer file sharing and game traffic. While this has already been shown for peer-to-peer traffic no such studies exist for game traffic. In this paper we focus on one particular game and estimate how much of the traffic cannot be identified when solely relying on port number based identification. We find that the number of game flows using nondefault port numbers is significant. Our evaluation is based on real traffic captured at clients and public game servers. KeywordsNetwork Application Identification, Game Traffic
منابع مشابه
Enemy Territory Traffic Analysis
We analyse the network traffic of the online multiplayer first person shooter game Enemy Territory. The game is based on the Quake 3 game engine but has more complex gaming rules. The data analysed is taken from a public game server run at CAIA, and corresponds to real gaming traffic. Measuring the packet length, inter-arrival time and bandwidth in both directions, this paper describes the impa...
متن کاملDistribution of IP Source Addresses Experienced By Wolfenstein Enemy Territory Game Servers
Online multiplayer first person shooter (FPS) games typically limit themselves to between 4 and 30+ concurrent players, seemingly limiting the number of source IP addresses seen over time. However, this report demonstrates how common FPS game servers usually ‘experience’ traffic from hundreds of unique IP source addresses every minute, regardless of an individual game server’s popularity or loc...
متن کاملClient RTT and Hop Count Distributions viewed from an Australian ‘Enemy Territory’ Server
Network game servers experience traffic caused by actual game players and by remote clients simply probing the game server’s current status. Game clients probe game servers for information such as the current map and number of current players on the server to enable players to find suitable games. The number of clients that probe a given server is orders of magnitudes higher than the number of ...
متن کاملMeasuring the auto-correlation of server to client traffic in First Person Shooter games
Modelling traffic generated by Internet based multiplayer computer games has attracted a great deal of attention in the past few years. In part this has been driven by a desire to properly simulate the network impact of highly interactive online game genres such as the first person shooter (FPS). Past work has dealt with packet size and packet interarrival times without consideration of packet ...
متن کاملFeature Extraction to Identify Network Traffic with Considering Packet Loss Effects
There are huge petitions of network traffic coming from various applications on Internet. In dealing with this volume of network traffic, network management plays a crucial rule. Traffic classification is a basic technique which is used by Internet service providers (ISP) to manage network resources and to guarantee Internet security. In addition, growing bandwidth usage, at one hand, and limit...
متن کامل