An Adaptive Trust Sampling Method for P2P Traffic Inspection

نویسندگان

  • Hongwei Chen
  • Dongyang Yu
  • Chunzhi Wang
  • Shuping Wang
چکیده

This paper focuses on the sampling-based Deep Packet Inspection for the traffic of P2P file sharing systems, especially for BitTorrent, and proposes a logarithmic-based Adaptive Trust Sampling (ATS) strategy for P2P traffic identification. In the whole process of sampling identification for P2P traffic, the sampling ratio of the current node in a P2P network can automatically adjust and dynamically vary according to the estimator of P2P traffic ratio of historical cycles. The experimental results show that the Adaptive Trust Sampling strategy can adapt to the dynamic change of sample size, effectively reduce the total sample size, mitigate the consumptions of system resources to some extent, and achieve the purpose of P2P traffic sampling.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Providing an optimal model for gaining public trust in the Complaints System and Inspection Agency's announcements

This research seeks to provide an optimal model for gaining public trust in the Complaints System and Inspection Agency's announcements.In this research, a survey method and a researcher-made questionnaire were used. The study population was consist of customers and users of the complaint handling system and the organization's inspection reports in Mazandaran province comprising equal numbers o...

متن کامل

On the Performance of OpenDPI in Identifying P2P Truncated Flows

This paper aims to show the impact on classification accuracy and the level of computational gain that could be obtained in applying deep packet inspection on truncated peer to peer traffic flows instead of complete ones. Using one of the latest open source classifiers, experiments were conducted to evaluate classification performance on full and truncated network flows for different protocols,...

متن کامل

PeerRush: Mining for Unwanted P2P Traffic

In this paper we present PeerRush, a novel system for the identification of unwanted P2P traffic. Unlike most previous work, PeerRush goes beyond P2P traffic detection, and can accurately categorize the detected P2P traffic and attribute it to specific P2P applications, including malicious applications such as P2P botnets. PeerRush achieves these results without the need of deep packet inspecti...

متن کامل

Silvio VALENTI Dealing with P 2 P traffic in modern networks : measurement , identification and control

P2P applications are certainly to be counted among the most bandwidth greedy users of the Internet, due to their wide diffusion as well as the kind of service they provide (e.g. file-sharing, live-streaming). Therefore, they pose continuously renewing challenges to network operators: P2P traffic must be correctly monitored and managed in order for it to coexist peacefully with traffic of other ...

متن کامل

P2P Network Trust Management Survey

Peer-to-peer applications (P2P) are no longer limited to home users, and start being accepted in academic and corporate environments. While file sharing and instant messaging applications are the most traditional examples, they are no longer the only ones benefiting from the potential advantages of P2P networks. For example, network file storage, data transmission, distributed computing, and co...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014