HFBP: Identifying P2P Traffic by Host Level and Flow Level Behavior Profiles

نویسندگان

  • Jinghua Yan
  • Xiaohui Fan
چکیده

Recently, Peer-to-peer (P2P) networks have been widely applied in streaming media, instant messaging, file sharing and other fields, which have occupied more and more network bandwidth. Accurately identify P2P traffic is very important to management and control P2P traffic. In this paper, we introduce HFBP, a novel P2P identification scheme based on the host level and flow level behavior profiles of P2P traffic. HFBP consists of two stages. In the first stage, we calculate the probability that a host takes part in P2P application by matching its behavior with some host level behavior rules. In the second stage, we compute the probability that a flow belonging to P2P application by comparing the statistical features of each flow in the host with several flow feature profiles. We evaluate HFBP using real traffic traces. The identification accuracy achieves 93.1% and 95.1% in terms of flow and byte respectively. The experimental results prove that HFBP obtains satisfactory performance in identifying P2P traffic.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

P2P Traffic Identification Based on Host and Flow Behaviour Characteristics

Peer-to-Peer (P2P) networks have been widely applied in file sharing, streaming media, instant messaging and other fields, which have attracted large attention. At the same time P2P networks traffic worsens the congestion of a network significantly. In order to better manage and control P2P traffic, it is important to identify P2P traffic accurately. In this paper we propose a novel P2P identif...

متن کامل

Graption: Graph-based P2P Traffic Classification at the Internet Backbone

Abstract—Monitoring network traffic and classifying applications are essential functions for network administrators. Current traffic classification methods can be grouped in three categories: (a) flow-based (e.g., packet sizing/timing features), (b) payloadbased, and (c) host-based. Methods from all three categories have limitations, especially when it comes to detecting new applications, and c...

متن کامل

Identifying and Analyzing Stop and Go Traffic based on Asymmetric Theory of Driving Behavior in Acceleration and Deceleration

Stop and go traffic that leads to oscillate traffic flow frequently is observed on congestion flow. Unexpected reasons such as lane – changing maneuvers, lower speeds of leader vehicle and moving bottleneck cause stop and go traffic and amplifying delay and environment impacts. Stop and go traffic exactly can’t be modeled by traffic models, and also car following models based on kinematic flow ...

متن کامل

Silvio VALENTI Dealing with P 2 P traffic in modern networks : measurement , identification and control

P2P applications are certainly to be counted among the most bandwidth greedy users of the Internet, due to their wide diffusion as well as the kind of service they provide (e.g. file-sharing, live-streaming). Therefore, they pose continuously renewing challenges to network operators: P2P traffic must be correctly monitored and managed in order for it to coexist peacefully with traffic of other ...

متن کامل

A Novel P2P Traffic Identification Model Based on Ensemble Learning

Peer-to-peer (P2P) traffic has occupied major fraction of all internet traffic. Hence, P2P flow identification becomes an important problem for network management. In our work, we propose an ensemble classification approach for P2P traffic identification, which integrates six DTNB(combination of naive Bayes and decision tables) algorithm and dynamic weighted integration method. The proposed P2P...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • JNW

دوره 8  شماره 

صفحات  -

تاریخ انتشار 2013